ACAS - Associate Of The Casualty Actuarial Society
ACAS - Associate of the Casualty Actuarial Society
Examen
ACAS Study Final Exam Updated Questions With Verified Answers
34 vues 1 fois vendu
Cours
ACAS - Associate of the Casualty Actuarial Society
Établissement
ACAS - Associate Of The Casualty Actuarial Society
ACAS Study Final Exam Updated Questions With Verified Answers
The central console that provides continuous asset-based security and compliance monitoring is ____________. Correct Answer T
The tool that probes hosts and does active vulnerability and compliance scanning is ____________________...
the tool that probes hosts and does active vulnera
the tool that can manage scan data run scans and
the passive scanner that detects vulnerabilities b
École, étude et sujet
ACAS - Associate of the Casualty Actuarial Society
ACAS - Associate of the Casualty Actuarial Society
Vendeur
S'abonner
SavvyMind
Avis reçus
Aperçu du contenu
ACAS Study Final Exam Updated Questions With Verified Answers
The central console that provides continuous asset-based security and compliance monitoring is ____________. Correct Answer Tenable.sc
The tool that probes hosts and does active vulnerability and compliance scanning is ______________________ Correct Answer Nessus Active Vulnerability Scanner
The tool that can manage scan data, run scans and pull in data from various Nessus Agent is the ________________. Correct Answer Nessus Manager
The Passive Scanner that detects vulnerabilities by sniffing network traffic is the __________________________________________. Correct Answer Nessus Network Monitor
What is ACAS? Correct Answer ACAS is a network-based security compliance and assessment capability designed to provide awareness of the security posture and network health of
DoD networks
What is the task order for the implementation of enterprise use of ACAS? Correct Answer 20-0020
T/F A vulnerability is a weakness of attack that can compromise your system Correct Answer FALSE
A vulnerability is not an attack, it is a weakness
T/F
The Nessus scanner monitors data at rest, while the NNM monitors data in motion Correct Answer TRUE
A lightweight program installed on the host that gives you visibility into other IT assets that connect intermittently to the internet Correct Answer A Nessus Agent
Which page loads by default when you log into Tenable.sc? Correct Answer Dashboard
Which of the following pages displays the update schedule for updating the active and passive plugins on security manager's interface? Correct Answer Feeds
Which page allows you to set your local time zone? Correct Answer Profile What can you do on the plugins page of Tenable.sc? Correct Answer Search for specific plugins, view plugin details and source and upload custom plugins
A group of users responsible for a specific number of assets is an _______________. Correct Answer Organization
A defined static range of IP addresses with an associated Nessus scanner is called a _____________________. Correct Answer Scan Zone
A set of proprietary data files that stores scan results and resides on the Tenable.sc is known as a _____________________. Correct Answer Repository
A script file used to collect and interpret vulnerability, compliance and configuration is a ____________. Correct Answer Plugin
What is the maximum size of a Tenable.sc repository? Correct Answer 32 GB
T/F
The IP address you are scanning must be contained in both the definition of the scan zone and the definition of the repository Correct Answer True
What Tenable.sc role is responsible for setting up scan zones? Correct Answer Administrator
Per the ACAS contract, how can you get your Tenable.sc plugin updates? Correct Answer Automatically from DISA's plugin server or manually form the DoD patch repository
According to the ACAS contract, what are the three allowable options for scanning stand alone networks? Correct Answer 1) Install both Nessus and Tenable on a Lunix system using the ACAS kickstart
2) Configure a windows OS with VM software, installing both Tenable and Nessus on the virtual machines
3) Detach the Nessus system from Tenable and place it in the isolated enclave for scanning. Once Scanning is complete, reattach Nessus to the tenable and manually upload scan results
Components of an actve vulnerability scan consist of: a scan policy, schedule, credentials, scan zone, import repo and ________________. Correct Answer Targets
____________ are administrative-level usernames and passwords (or SSH keypairs) used in authenticated scans? Correct Answer Credentials
Les avantages d'acheter des résumés chez Stuvia:
Qualité garantie par les avis des clients
Les clients de Stuvia ont évalués plus de 700 000 résumés. C'est comme ça que vous savez que vous achetez les meilleurs documents.
L’achat facile et rapide
Vous pouvez payer rapidement avec iDeal, carte de crédit ou Stuvia-crédit pour les résumés. Il n'y a pas d'adhésion nécessaire.
Focus sur l’essentiel
Vos camarades écrivent eux-mêmes les notes d’étude, c’est pourquoi les documents sont toujours fiables et à jour. Cela garantit que vous arrivez rapidement au coeur du matériel.
Foire aux questions
Qu'est-ce que j'obtiens en achetant ce document ?
Vous obtenez un PDF, disponible immédiatement après votre achat. Le document acheté est accessible à tout moment, n'importe où et indéfiniment via votre profil.
Garantie de remboursement : comment ça marche ?
Notre garantie de satisfaction garantit que vous trouverez toujours un document d'étude qui vous convient. Vous remplissez un formulaire et notre équipe du service client s'occupe du reste.
Auprès de qui est-ce que j'achète ce résumé ?
Stuvia est une place de marché. Alors, vous n'achetez donc pas ce document chez nous, mais auprès du vendeur SavvyMind. Stuvia facilite les paiements au vendeur.
Est-ce que j'aurai un abonnement?
Non, vous n'achetez ce résumé que pour €8,89. Vous n'êtes lié à rien après votre achat.