review) 109 Q&A
Which ACAS component performs active vulnerability and compliance scanning?
Select the best answer.
A. 3D Tool
B. PVS
C. Nessus
D. SecurityCenter
**** Module 1-1 **** - Answer: C
True/False
CMRS is a tool to provide DoD component- and enterprise-level situational
awareness by quantitatively displaying an organization's security posture.
Page 1 of 39
,**** Module 1-1 **** - Answer: True
Select the Task Order for the Implementation of Assured Compliance Assessment
Solution (ACAS) for the Enterprise:
A. 12-501
B. 13-670
C. 13-294
D. 14-0294
**** Module 1-1 **** - Answer: B
Which page loads by default when you log in to SecurityCenter? Select the best
answer. Select the best answer.
A. Dashboard
B. Analysis
C. Reporting
D. Scanning
**** Module 1-2 **** - Answer: A
Which of the following pages show the date and time of the most recent plugin
updates? Select all that apply.
A. Alerts
B. Plugins
Page 2 of 39
,C. Preferences
D. System Status
E. Feeds
**** Module 1-2 **** - Answer: B, E
What is ACAS? Select the best answer.
A. ACAS is a network-based security compliance and assessment capability
designed to provide awareness of the security posture and network health of DoD
networks.
B. ACAS is a system that ensures security for the DoD networks.
C. ACAS is a system that monitors and corrects vulnerabilities to provide security
for the DoD networks.
D. All of the above
**** Module 1-1 **** - Answer: A
Which of the following best describes the Security Center? Select the best answer.
A. A topology viewer that provides graphical analysis information
B. The passive scanner that detects vulnerabilities by sniffing network traffic
C. The active scanner that probes hosts
D. The central console that provides continuous asset-based security and
compliance monitoring
Page 3 of 39
, **** Module 1-1 **** - Answer: D
True/False
A vulnerability is a weakness or an attack that can compromise your system.
**** Module 1-1 **** - Answer: False
True/False
The Nessus scanner monitors data at rest, while the PVS monitors data in motion.
**** Module 1-1 **** - Answer: True
True/False
PVS detects vulnerabilities based on network traffic instead of actively scanning
hosts.
**** Module 1-1 **** - Answer: True
Which page allows you to set your local time zone? Select the best answer.
A. Dashboard
B. Feeds
C. Profile
D. Workflow
**** Module 1-2 **** - Answer: C
Page 4 of 39