DISA ACAS FINAL PAPER 2026 QUESTIONS
AND SOLUTIONS EXAMPREP GRADED A+
▶ To get the most accurate results on the security posture of a system,
which of the following actions should be done prior to scanning? Select the
best answer.
a. Log all users out of the system
b. Patch the scanner
c. Reboot the target host
d. Update the plugins. Answer: Update the plugins
▶ According to the Best Practices Guide/ACAS TASKORD, both Discovery
and Vulnerability Scans are to be credentialed.
a. True
b. False. Answer: True
▶ 2-1What two areas in Tenable.sc allow you to analyze scan results?
Select all that apply.
a. Scan Results page
b. Plugins page
c. Vulnerability Analysis page
d. Scan Policies page
e. Profile page. Answer: - Scan Results page
- Vulnerability Analysis page
▶ T/F
Tenable.sc displays vulnerability data at varying levels and views ranging
from the highest-level summary down to a detailed vulnerability list..
Answer: True
, ▶ What vulnerabilities are stored in Tenable.sc's Cumulative view? Select
the best answer.
a. Vulnerabilities discovered from the most recent scan
b. Current vulnerabilities, including those that have been recast, accepted,
or those previously mitigated but found vulnerable on
c. Newly mitigated vulnerabilities
d. Vulnerabilities discovered from the current day's scans. Answer: Current
vulnerabilities, including those that have been recast, accepted, or those
previously mitigated but found vulnerable on rescan
▶ Which of the following Analysis Tools lists the matching addresses, their
vulnerability score, the repository the data is stored in, the CPE value,
vulnerability count, and a breakdown of the individual severity counts
a. IAVM Summary
b. IP Summary
c. Remediation Summary
d. Vulnerability Summary
e. Vulnerability Detail List. Answer: IP Summary
▶ Which definition describes the purpose of the STIG Severity Filter?
Select the best answer
a. Displays vulnerabilities based upon the selected Tenable.sc severity
levels
b. Displays vulnerabilities that fall within the specified CVSS range
c. Displays vulnerabilities that are categorized as Cat 1, Cat 2, Cat 3 STIG
findings
d. Displays vulnerabilities that are categorized as Cat 1, Cat 2, Cat 3 IAVM
findings. Answer: Displays vulnerabilities that are categorized as Cat 1,
Cat 2, Cat 3 IAVM findings
▶ Frequently used _____________ can be saved as _____________ for
use in analysis, dashboards, reports, tickets, and alerts. Select the best
answer to complete the statement.
a. scans, alerts
b. scans, policies
c. filters, queries
AND SOLUTIONS EXAMPREP GRADED A+
▶ To get the most accurate results on the security posture of a system,
which of the following actions should be done prior to scanning? Select the
best answer.
a. Log all users out of the system
b. Patch the scanner
c. Reboot the target host
d. Update the plugins. Answer: Update the plugins
▶ According to the Best Practices Guide/ACAS TASKORD, both Discovery
and Vulnerability Scans are to be credentialed.
a. True
b. False. Answer: True
▶ 2-1What two areas in Tenable.sc allow you to analyze scan results?
Select all that apply.
a. Scan Results page
b. Plugins page
c. Vulnerability Analysis page
d. Scan Policies page
e. Profile page. Answer: - Scan Results page
- Vulnerability Analysis page
▶ T/F
Tenable.sc displays vulnerability data at varying levels and views ranging
from the highest-level summary down to a detailed vulnerability list..
Answer: True
, ▶ What vulnerabilities are stored in Tenable.sc's Cumulative view? Select
the best answer.
a. Vulnerabilities discovered from the most recent scan
b. Current vulnerabilities, including those that have been recast, accepted,
or those previously mitigated but found vulnerable on
c. Newly mitigated vulnerabilities
d. Vulnerabilities discovered from the current day's scans. Answer: Current
vulnerabilities, including those that have been recast, accepted, or those
previously mitigated but found vulnerable on rescan
▶ Which of the following Analysis Tools lists the matching addresses, their
vulnerability score, the repository the data is stored in, the CPE value,
vulnerability count, and a breakdown of the individual severity counts
a. IAVM Summary
b. IP Summary
c. Remediation Summary
d. Vulnerability Summary
e. Vulnerability Detail List. Answer: IP Summary
▶ Which definition describes the purpose of the STIG Severity Filter?
Select the best answer
a. Displays vulnerabilities based upon the selected Tenable.sc severity
levels
b. Displays vulnerabilities that fall within the specified CVSS range
c. Displays vulnerabilities that are categorized as Cat 1, Cat 2, Cat 3 STIG
findings
d. Displays vulnerabilities that are categorized as Cat 1, Cat 2, Cat 3 IAVM
findings. Answer: Displays vulnerabilities that are categorized as Cat 1,
Cat 2, Cat 3 IAVM findings
▶ Frequently used _____________ can be saved as _____________ for
use in analysis, dashboards, reports, tickets, and alerts. Select the best
answer to complete the statement.
a. scans, alerts
b. scans, policies
c. filters, queries