ACAS - 5.3 Course Questions With Solutions
Which ACAS component performs active vulnerability and compliance scanning? Nessus
CMRS is a tool to provide DoD component- and enterprise-level situational awareness by
quantitatively displaying an organization's security posture. True
Select the Tas...
Which ACAS component performs active vulnerability and compliance scanning? Nessus
CMRS is a tool to provide DoD component- and enterprise-level situational awareness by
quantitatively displaying an organization's security posture. True
Select the Task Order for the Implementation of Assured Compliance Assessment Solution
(ACAS) for the Enterprise: 13-670
Which page loads by default when you log in to SecurityCenter? Select the best answer.
Dashboard
Which of the following pages show the date and time of the most recent plugin updates?
Plugins, Feeds
Which page allows you to set your local time zone? Profile
What is an organization? A group of individuals who are responsible for a set of common
assets
,ACAS - 5.3 Course Questions With Solutions
What is a scan zone? A defined static range of IP addresses with an associated Nessus
scanner(s)
What is the maximum size of a SecurityCenter 5 Repository? 32 GB
The IP address(es) you are scanning must be contained in both the definition of the scan zone
and the definition of the repository. True
What SecurityCenter role is responsible for setting up scan zones? Administrator
How can you get your SecurityCenter plugin updates? Automatically, from DISA's plugin
server, Manually from the DoD Patch Repository
The SecurityCenter Plugins menu displays a list of script files used by Nessus and PVS scanners
to collect and interpret vulnerability, compliance, and configuration data. True
Which of the following are options you can consider for scanning stand-alone networks?
Install both Nessus and SecurityCenter on a Linux Laptop using Kickstart, Install both
, ACAS - 5.3 Course Questions With Solutions
Nessus and SecurityCenter in virtual machines on a Windows 7 laptop, Detach a Nessus scanner
from its SecurityCenter for scanning purposes and then reattach to SecurityCenter to upload scan
results
Components of an Active Vulnerability Scan consist of: a policy, credentials, scan zone,
schedule, _________, and __________. Repository, Target list
_________ are administrative-level usernames and passwords (or SSH keypairs) used in
authenticated scans? Credentials
You can associate multiple credentials with a single scan. True
Networks using Dynamic Host Configuration Protocol (DHCP) require that this Active Scan
setting be enabled to properly track hosts. Track hosts which have been issued IP
addresses
Which type of scan obtains information by authenticating to the host to access resources not
available over the network. Credentialed
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller UpperClass. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $14.49. You're not tied to anything after your purchase.