100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
ACAS - Associate of the Casualty Actuarial Society $10.79   Add to cart

Exam (elaborations)

ACAS - Associate of the Casualty Actuarial Society

 7 views  0 purchase
  • Course
  • ACAS - Associate of the Casualty Actuarial Society
  • Institution
  • ACAS - Associate Of The Casualty Actuarial Society

_________ displays vulnerabilities based on their DoD IAVA and IAVB mappings - ANS The IAVM Summary __________ sorts vulnerabilities by plugin ID count. Columns of plugin ID, total and severity can be sorted by clicking on the column header - ANS The vulnerability summary __...

[Show more]

Preview 2 out of 12  pages

  • August 21, 2024
  • 12
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • ACAS - Associate of the Casualty Actuarial Society
  • ACAS - Associate of the Casualty Actuarial Society
avatar-seller
DocLaura
ACAS Study Questions





_________ displays vulnerabilities based on their DoD IAVA and IAVB mappings - ANS
The IAVM Summary

__________ sorts vulnerabilities by plugin ID count. Columns of plugin ID, total and severity can
be sorted by clicking on the column header - ANS The vulnerability summary

___________ directs the scanner to target a specific range of ports. - ANS Port scan
range

___________ lists the matching addresses, their vulnerability score, the repository the data is
stored in, the CPE value, vulnerability count and a breakdown of the individual severity counts. -
ANS The IP summary

___________ provides a list of actions that may be taken to prioritize tasks that have the
greatest effect to reduce vulnerabilities in systems - ANS

___________ provides a list of actions that may be taken to prioritize tasks that have the
greatest effect to reduce vulnerabilities in systems - ANS The remediation summary

____________ are administrative-level usernames and passwords (or SSH keypairs) used in
authenticated scans? - ANS Credentials

____________ ensures that harmful vulnerabilities are not exercised by the scanner. - ANS
Enabling safe checks

____________ limits the maximum number of plugins a nessus scanner will send to a single
host at one time. - ANS Max simultaneous checks per host

____________ limits the maximum number of targets that a single nessus scanner will scan at
the same time. - ANS Max simultaneous checks per scan

____________ shows the actual findings of a vulnerability scan, including plugin output and
cross references. - ANS The vulnerability detail list

A defined static range of IP addresses with an associated Nessus scanner is called a
_____________________. - ANS Scan Zone

, A group of users responsible for a specific number of assets is an _______________. - ANS
Organization

A lightweight program installed on the host that gives you visibility into other IT assets that
connect intermittently to the internet - ANS A Nessus Agent

A list of IP addresses that requires user intervention in order to change what defines them is a
____________. - ANS Static asset list

A script file used to collect and interpret vulnerability, compliance and configuration is a
____________. - ANS Plugin

A set of proprietary data files that stores scan results and resides on the Tenable.sc is known as
a _____________________. - ANS Repository

Acceptable audit files for tenable.sc include which of the following?

-Tenable Network Security Templates
-DISA STIG/SCAP Automated Benchmarks
-Retina Audits - ANS Tenable Network Security Templates & DISA STIG/SCAP Automated
Benchmarks

According to the ACAS contract, what are the three allowable options for scanning stand alone
networks? - ANS 1) Install both Nessus and Tenable on a Lunix system using the ACAS
kickstart

2) Configure a windows OS with VM software, installing both Tenable and Nessus on the virtual
machines

3) Detach the Nessus system from Tenable and place it in the isolated enclave for scanning.
Once Scanning is complete, reattach Nessus to the tenable and manually upload scan results

All of the following are benefits of the NNM, except ___________.

-Network deployment on several different operating systems
-Monitoring your network between active scans
-Identifying vulnerabilities in areas where you cannot actively scan
-Eliminating the need for active scans - ANS Eliminating the need for active scans

All of these are examples of dashboard components except which one?

A. Table
B. Pie Chart
C. Matrix

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller DocLaura. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $10.79. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

67096 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$10.79
  • (0)
  Add to cart