ACAS Study Questions with 100% Complete Solutions, Graded A+
The central console that provides continuous asset-based security and compliance monitoring is ____________. - cORRECT sOLUTION T The tool that probes hosts and does active vulnerability and compliance scanning is ______________________ - cORRECT sOLUTION Nessus Active Vulnerability Scanner The tool that can manage scan data, run scans and pull in data from various Nessus Agent is the ________________. - cORRECT sOLUTION Nessus Manager The Passive Scanner that detects vulnerabilities by sniffing network traffic is the __________________________________________. - cORRECT sOLUTION Nessus Network Monitor What is ACAS? - cORRECT sOLUTION ACAS is a network-based security compliance and assessment capability designed to provide awareness of the security posture and network health of DoD networks What is the task order for the implementation of enterprise use of ACAS? - cORRECT sOLUTION 20-0020 T/F A vulnerability is a weakness of attack that can compromise your system - cORRECT sOLUTION FALSE A vulnerability is not an attack, it is a weakness T/F The Nessus scanner monitors data at rest, while the NNM monitors data in motion - cORRECT sOLUTION TRUE A lightweight program installed on the host that gives you visibility into other IT assets that connect intermittently to the internet - cORRECT sOLUTION A Nessus Agent Which page loads by default when you log into T? - cORRECT sOLUTION Dashboard Which of the following pages displays the update schedule for updating the active and passive plugins on security manager's interface? - cORRECT sOLUTION Feeds Which page allows you to set your local time zone? - cORRECT sOLUTION Profile What can you do on the plugins page of T? - cORRECT sOLUTION Search for specific plugins, view plugin details and source and upload custom plugins A group of users responsible for a specific number of assets is an _______________. - cORRECT sOLUTION Organization A defined static range of IP addresses with an associated Nessus scanner is called a _____________________. - cORRECT sOLUTION Scan Zone A set of proprietary data files that stores scan results and resides on the T is known as a _____________________. - cORRECT sOLUTION Repository A script file used to collect and interpret vulnerability, compliance and configuration is a ____________. - cORRECT sOLUTION Plugin What is the maximum size of a T repository? - cORRECT sOLUTION 32 GB T/F The IP address you are scanning must be contained in both the definition of the scan zone and the definition of the repository - cORRECT sOLUTION True What T role is responsible for setting up scan zones? - cORRECT sOLUTION Administrator Per the ACAS contract, how can you get your T plugin updates? - cORRECT sOLUTION Automatically from DISA's plugin server or manually form the DoD patch repository According to the ACAS contract, what are the three allowable options for scanning stand alone networks? - cORRECT sOLUTION 1) Install both Nessus and Tenable on a Lunix system using the ACAS kickstart
Written for
- Institution
- ACAS
- Course
- ACAS
Document information
- Uploaded on
- July 27, 2024
- Number of pages
- 21
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
acas study questions with 100 complete solutions