ACAS Review Questions with 100% Complete Solutions, Graded A+
Components of an Active Vulnerability Scan consist of: A policy, credentials, scan zone, schedule, ________, and _________. - cORRECT sOLUTION Repository and Target List ______ are administrative level usernames and passwords used in authenticated scans? - cORRECT sOLUTION Credentials True/False: You can associate multiple credentials with a single scan - cORRECT sOLUTION True Networks using DHCP require what Active Scan setting be enabled to properly track hosts - cORRECT sOLUTION Track hosts which have been issued new IP addresses Which type of scan obtains information by authenticating to the host access resources not available over the network - cORRECT sOLUTION Credentialed True/False: You may only select one import repository per scan - cORRECT sOLUTION True True/False: Once a scan is running, you cannot pause or stop it until it is completed - cORRECT sOLUTION False Which Port Scanning Range option tells the scanner to scan only common ports? - cORRECT sOLUTION Default In a low-bandwidth environment, which options might you adjust to try to improve scanning performance? - cORRECT sOLUTION Max Simultaneous Checks Per Host and Max Simultaneous Hosts Per Scan What is the function of Performance Options in the Scan Policy? - cORRECT sOLUTION Determines the impact of a scan related to scan times and network behavior You can configures the targets for you Blackout Window to include... - cORRECT sOLUTION All Systems, Assets, IPs, Mixed Which Scan Policy types allows you to select Plugin Families you want? - cORRECT sOLUTION Custom Advanced Scan What is an organization? - cORRECT sOLUTION A group of individuals who are responsible for a set of common assets What is a scan zone? - cORRECT sOLUTION A defined static range of IP addresses with an associated Nessus scanner What is the maximum size of a SecurityCenter 5 Repository? - cORRECT sOLUTION 32GB True/False: The IP addresses you are scanning must be contained in both the definition of the scan zone and the definition of the repository - cORRECT sOLUTION True What SecurityCenter Role is responsible for setting scan zones? - cORRECT sOLUTION Admin How can you get your SecurityCenter Plugin updates? - cORRECT sOLUTION Automatically from DISA's plugin server or Manually from the DoD Patch Repository True/False: The SecurityCenter Plugins menu displays a list of script files used by Nessus and PVS scanners to collect and interpret vulnerability, compliance, and configuration data. - cORRECT sOLUTION True Which options can you consider for scanning stand-alone networks. - cORRECT sOLUTION Install both Nessus and SecurityCenter on a Linux Laptop using Kickstart or in a virtual machine on a Windows 7 laptop. Also, you may Detach a Nessus scanner from its SecurityCenter for scanning purposed and then reattach to SecurityCenter to upload scan results Which page loads by default when you log in to SecurityCenter? - cORRECT sOLUTION Dashboard Which of the pages show the date and time of the most recent plugin updates? - cORRECT sOLUTION Feeds or Plugins Which page allows you to set your local time zone - cORRECT sOLUTION Profile True/False: Asset lists are dynamically or statically generated lists of hosts - cORRECT sOLUTION True Which type of asset list updates automatically when a scan runs and a repository is updated? - cORRECT sOLUTION Dynamic What is a static asset list? - cORRECT sOLUTION A list of IP addresses that require user intervention in order to change what defines them What two ways can you use to add a dynamic asset list? - cORRECT sOLUTION Use a template or create a set of rules When you create a dynamic asset list, what occurs? - cORRECT sOLUTION SecurityCenter queries the repository to find assets that match the dynamic asset list's rules
Geschreven voor
- Instelling
- ACAS
- Vak
- ACAS
Documentinformatie
- Geüpload op
- 26 juli 2024
- Aantal pagina's
- 15
- Geschreven in
- 2023/2024
- Type
- Tentamen (uitwerkingen)
- Bevat
- Vragen en antwoorden
Onderwerpen
-
acas