100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
ACAS Study Questions with 100% Correct Answers | Verified | Latest Update 2024, Complete Solutions $7.99   Add to cart

Exam (elaborations)

ACAS Study Questions with 100% Correct Answers | Verified | Latest Update 2024, Complete Solutions

 6 views  0 purchase
  • Course
  • Acas
  • Institution
  • Acas

ACAS Study Questions with 100% Correct Answers | Verified | Latest Update 2024, Complete Solutions

Preview 2 out of 12  pages

  • August 1, 2024
  • 12
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • acas study
  • Acas
  • Acas
avatar-seller
AnswersCOM
ACAS
Study
Questions
_________
displays
vulnerabilities
based
on
their
DoD
IAVA
and
IAVB
mappings
-
ANS-The
IAVM
Summary
__________
sorts
vulnerabilities
by
plugin
ID
count.
Columns
of
plugin
ID,
total
and
severity
can
be
sorted
by
clicking
on
the
column
header
-
ANS-The
vulnerability
summary
___________
directs
the
scanner
to
target
a
specific
range
of
ports.
-
ANS-Port
scan
range
___________
lists
the
matching
addresses,
their
vulnerability
score,
the
repository
the
data
is
stored
in,
the
CPE
value,
vulnerability
count
and
a
breakdown
of
the
individual
severity
counts.
-
ANS-The
IP
summary
___________
provides
a
list
of
actions
that
may
be
taken
to
prioritize
tasks
that
have
the
greatest
effect
to
reduce
vulnerabilities
in
systems
-
ANS-
___________
provides
a
list
of
actions
that
may
be
taken
to
prioritize
tasks
that
have
the
greatest
effect
to
reduce
vulnerabilities
in
systems
-
ANS-The
remediation
summary
____________
are
administrative-level
usernames
and
passwords
(or
SSH
keypairs)
used
in
authenticated
scans?
-
ANS-Credentials
____________
ensures
that
harmful
vulnerabilities
are
not
exercised
by
the
scanner.
-
ANS-Enabling
safe
checks
____________
limits
the
maximum
number
of
plugins
a
nessus
scanner
will
send
to
a
single
host
at
one
time.
-
ANS-Max
simultaneous
checks
per
host
____________
limits
the
maximum
number
of
targets
that
a
single
nessus
scanner
will
scan
at
the
same
time.
-
ANS-Max
simultaneous
checks
per
scan
____________
shows
the
actual
findings
of
a
vulnerability
scan,
including
plugin
output
and
cross
references.
-
ANS-The
vulnerability
detail
list
A
defined
static
range
of
IP
addresses
with
an
associated
Nessus
scanner
is
called
a
_____________________.
-
ANS-Scan
Zone
A
group
of
users
responsible
for
a
specific
number
of
assets
is
an
_______________.
-
ANS-Organization A
lightweight
program
installed
on
the
host
that
gives
you
visibility
into
other
IT
assets
that
connect
intermittently
to
the
internet
-
ANS-A
Nessus
Agent
A
list
of
IP
addresses
that
requires
user
intervention
in
order
to
change
what
defines
them
is
a
____________.
-
ANS-Static
asset
list
A
script
file
used
to
collect
and
interpret
vulnerability,
compliance
and
configuration
is
a
____________.
-
ANS-Plugin
A
set
of
proprietary
data
files
that
stores
scan
results
and
resides
on
the
Tenable.sc
is
known
as
a
_____________________.
-
ANS-Repository
Acceptable
audit
files
for
tenable.sc
include
which
of
the
following?
-Tenable
Network
Security
Templates
-DISA
STIG/SCAP
Automated
Benchmarks
-Retina
Audits
-
ANS-Tenable
Network
Security
Templates
&
DISA
STIG/SCAP
Automated
Benchmarks
According
to
the
ACAS
contract,
what
are
the
three
allowable
options
for
scanning
stand
alone
networks?
-
ANS-1)
Install
both
Nessus
and
Tenable
on
a
Lunix
system
using
the
ACAS
kickstart
2)
Configure
a
windows
OS
with
VM
software,
installing
both
Tenable
and
Nessus
on
the
virtual
machines
3)
Detach
the
Nessus
system
from
Tenable
and
place
it
in
the
isolated
enclave
for
scanning.
Once
Scanning
is
complete,
reattach
Nessus
to
the
tenable
and
manually
upload
scan
results
All
of
the
following
are
benefits
of
the
NNM,
except
___________.
-Network
deployment
on
several
different
operating
systems
-Monitoring
your
network
between
active
scans
-Identifying
vulnerabilities
in
areas
where
you
cannot
actively
scan
-Eliminating
the
need
for
active
scans
-
ANS-Eliminating
the
need
for
active
scans
All
of
these
are
examples
of
dashboard
components
except
which
one?
A.
Table
B.
Pie
Chart
C.
Matrix
D.
XY
Axis
Graph
-
ANS-D.
X/Y
Axsis
Graph

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller AnswersCOM. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $7.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

79271 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$7.99
  • (0)
  Add to cart