ACAS - Associate Of The Casualty Actuarial Society
ACAS - Associate of the Casualty Actuarial Society
Tentamen (uitwerkingen)
ACAS Study Final Exam Updated Questions With Verified Answers
36 keer bekeken 1 keer verkocht
Vak
ACAS - Associate of the Casualty Actuarial Society
Instelling
ACAS - Associate Of The Casualty Actuarial Society
ACAS Study Final Exam Updated Questions With Verified Answers
The central console that provides continuous asset-based security and compliance monitoring is ____________. Correct Answer T
The tool that probes hosts and does active vulnerability and compliance scanning is ____________________...
the tool that probes hosts and does active vulnera
the tool that can manage scan data run scans and
the passive scanner that detects vulnerabilities b
Geschreven voor
ACAS - Associate of the Casualty Actuarial Society
ACAS - Associate of the Casualty Actuarial Society
Verkoper
Volgen
SavvyMind
Ontvangen beoordelingen
Voorbeeld van de inhoud
ACAS Study Final Exam Updated Questions With Verified Answers
The central console that provides continuous asset-based security and compliance monitoring is ____________. Correct Answer Tenable.sc
The tool that probes hosts and does active vulnerability and compliance scanning is ______________________ Correct Answer Nessus Active Vulnerability Scanner
The tool that can manage scan data, run scans and pull in data from various Nessus Agent is the ________________. Correct Answer Nessus Manager
The Passive Scanner that detects vulnerabilities by sniffing network traffic is the __________________________________________. Correct Answer Nessus Network Monitor
What is ACAS? Correct Answer ACAS is a network-based security compliance and assessment capability designed to provide awareness of the security posture and network health of
DoD networks
What is the task order for the implementation of enterprise use of ACAS? Correct Answer 20-0020
T/F A vulnerability is a weakness of attack that can compromise your system Correct Answer FALSE
A vulnerability is not an attack, it is a weakness
T/F
The Nessus scanner monitors data at rest, while the NNM monitors data in motion Correct Answer TRUE
A lightweight program installed on the host that gives you visibility into other IT assets that connect intermittently to the internet Correct Answer A Nessus Agent
Which page loads by default when you log into Tenable.sc? Correct Answer Dashboard
Which of the following pages displays the update schedule for updating the active and passive plugins on security manager's interface? Correct Answer Feeds
Which page allows you to set your local time zone? Correct Answer Profile What can you do on the plugins page of Tenable.sc? Correct Answer Search for specific plugins, view plugin details and source and upload custom plugins
A group of users responsible for a specific number of assets is an _______________. Correct Answer Organization
A defined static range of IP addresses with an associated Nessus scanner is called a _____________________. Correct Answer Scan Zone
A set of proprietary data files that stores scan results and resides on the Tenable.sc is known as a _____________________. Correct Answer Repository
A script file used to collect and interpret vulnerability, compliance and configuration is a ____________. Correct Answer Plugin
What is the maximum size of a Tenable.sc repository? Correct Answer 32 GB
T/F
The IP address you are scanning must be contained in both the definition of the scan zone and the definition of the repository Correct Answer True
What Tenable.sc role is responsible for setting up scan zones? Correct Answer Administrator
Per the ACAS contract, how can you get your Tenable.sc plugin updates? Correct Answer Automatically from DISA's plugin server or manually form the DoD patch repository
According to the ACAS contract, what are the three allowable options for scanning stand alone networks? Correct Answer 1) Install both Nessus and Tenable on a Lunix system using the ACAS kickstart
2) Configure a windows OS with VM software, installing both Tenable and Nessus on the virtual machines
3) Detach the Nessus system from Tenable and place it in the isolated enclave for scanning. Once Scanning is complete, reattach Nessus to the tenable and manually upload scan results
Components of an actve vulnerability scan consist of: a scan policy, schedule, credentials, scan zone, import repo and ________________. Correct Answer Targets
____________ are administrative-level usernames and passwords (or SSH keypairs) used in authenticated scans? Correct Answer Credentials
Voordelen van het kopen van samenvattingen bij Stuvia op een rij:
√ Verzekerd van kwaliteit door reviews
Stuvia-klanten hebben meer dan 700.000 samenvattingen beoordeeld. Zo weet je zeker dat je de beste documenten koopt!
Snel en makkelijk kopen
Je betaalt supersnel en eenmalig met iDeal, Bancontact of creditcard voor de samenvatting. Zonder lidmaatschap.
Focus op de essentie
Samenvattingen worden geschreven voor en door anderen. Daarom zijn de samenvattingen altijd betrouwbaar en actueel. Zo kom je snel tot de kern!
Veelgestelde vragen
Wat krijg ik als ik dit document koop?
Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.
Tevredenheidsgarantie: hoe werkt dat?
Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.
Van wie koop ik deze samenvatting?
Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper SavvyMind. Stuvia faciliteert de betaling aan de verkoper.
Zit ik meteen vast aan een abonnement?
Nee, je koopt alleen deze samenvatting voor €9,22. Je zit daarna nergens aan vast.