100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
ACAS - 5.3 Course Questions with 100% Correct Answers | Verified | Latest Update 2024, Complete Solutions $7.99
Add to cart

Exam (elaborations)

ACAS - 5.3 Course Questions with 100% Correct Answers | Verified | Latest Update 2024, Complete Solutions

 7 views  0 purchase
  • Course
  • Acas
  • Institution
  • Acas

ACAS - 5.3 Course Questions with 100% Correct Answers | Verified | Latest Update 2024, Complete Solutions

Preview 2 out of 8  pages

  • August 1, 2024
  • 8
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • Acas
  • Acas
avatar-seller
AnswersCOM
ACAS
-
5.3
Course
_________
are
administrative-level
usernames
and
passwords
(or
SSH
keypairs)
used
in
authenticated
scans?
-
ANS-Credentials
A
Passive
Vulnerability
Scanner
is
simply
a
Network
Intrusion
Detection
System
(NIDS)?
-
ANS-False
A
repository
is
defined
by
_________.
-
ANS-IP
address
range,
MDM
data
type
A
vulnerability
is
a
weakness
or
an
attack
that
can
compromise
your
system.
-
ANS-False
(a
vulnerability
does
not
include
an
attack)
Acceptable
audit
files
for
SecurityCenter
include
which
of
the
following?
-
ANS-Tenable
Network
Security
Templates
(SC
Feed),
DISA
STIG
Automated
Benchmarks
(ingested
in
.zip
format),
SCAP
compliant
checklists
from
NIST
(.xccdf)
All
of
the
following
are
benefits
of
PVS,
except
_____.
-
ANS-Eliminating
the
need
for
active
scans
All
of
these
are
examples
of
Dashboard
components
except
which
one?
-
ANS-XY
Axis
Graph
Any
user
can
create
a
new
repository.
-
ANS-False
Asset
lists
are
dynamically
or
statically
generated
lists
of
hosts.
-
ANS-True
Clicking
the
Pushpin
icon
next
to
a
dashboard
name
on
the
Manage
Dashboards
page
will
do
which
of
the
following?
-
ANS-Make
the
dashboard
active/inactive
CMRS
is
a
tool
to
provide
DoD
component-
and
enterprise-level
situational
awareness
by
quantitatively
displaying
an
organization's
security
posture.
-
ANS-True
Compliance
auditing
identifies
deviations
from
a
defined
standard,
whereas,
vulnerability
management
finds
weaknesses
that
could
lead
to
compromise.
-
ANS-True
Components
of
an
Active
Vulnerability
Scan
consist
of:
a
policy,
credentials,
scan
zone,
schedule,
_________,
and
__________.
-
ANS-Repository,
Target
list
Each
SecurityCenter
will
contain
only
one
Administrator,
one
Organization,
and
one
Security
Manager.
-
ANS-False Frequently
used
_____________
can
be
saved
as
_____________
for
use
in
analysis,
dashboards,
reports,
tickets,
and
alerts.
-
ANS-filters,
queries
Groups__________.
-
ANS-Combine
access
rights
to
objects
within
an
organization
for
quick
assignment
to
one
or
more
users.
How
can
you
get
your
SecurityCenter
plugin
updates?
-
ANS-Automatically,
from
DISA's
plugin
server,
Manually
from
the
DoD
Patch
Repository
In
a
low-bandwidth
environment,
which
of
the
following
options
might
you
adjust
to
try
to
improve
scanning
performance?
-
ANS-Max
Simultaneous
Checks
Per
Host,
Max
Simultaneous
Hosts
Per
Scan
In
addition
to
a
Nessus
scanner,
what
are
the
components
of
a
SecurityCenter
compliance
audit?
-
ANS-Compliance
plugins,
Audit
file,
system
or
database
credentials
Local
repositories
can
contain
which
of
the
following
types
of
data?
-
ANS-IP
v4,
IP
v6,
Mobile
Multiple
organizations
can
have
access
to
the
same
repository.
-
ANS-True
Networks
using
Dynamic
Host
Configuration
Protocol
(DHCP)
require
that
this
Active
Scan
setting
be
enabled
to
properly
track
hosts.
-
ANS-Track
hosts
which
have
been
issued
IP
addresses
Once
a
scan
is
running,
you
cannot
pause
or
stop
the
scan
until
it
has
completed
running.
-
ANS-False
PVS
detects
vulnerabilities
based
on
network
traffic
instead
of
actively
scanning
hosts.
-
ANS-True
PVS
monitors
data
at
the
_____
layer?
-
ANS-Packet
Repositories
are
proprietary
data
files
residing
on
the
SecurityCenter
that
store
_______?
-
ANS-Scan
data
Roles
__________.
-
ANS-Define
what
a
user
can
do
(such
as
having
full,
limited,
or
no
scanning
permissions).
Security
Managers
have
the
ability
to
assign
roles
and
responsibilities
for
assets
for
all
organizations
within
the
SecurityCenter.
-
ANS-False

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller AnswersCOM. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $7.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

50843 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$7.99
  • (0)
Add to cart
Added