QUESTIONS AND CORRECT ANSWERS
What is the first step in repairing the Teams error stating, " F.A. Is Not A Constructor"? -
CORRECT ANSWER Is not (Ensure teams is up to date. Not Select Check for updates
Which ACAS component performs active vulnerability and compliance scanning? -
CORRECT ANSWER Nessus
What tool is used to scan systems for OS, appliance and security settings for systems and
devices for CVE vulnerabilities? - CORRECT ANSWER ACAS
ATCTS is the authoritative database tool used to monitor compliance with your Army
training requirements for your cybersecurity duties/positions. - CORRECT
ANSWER True
What access do all CAC holders have to Remedy? - CORRECT ANSWER Service
Level Access
What is a Service Level Agreement? - CORRECT ANSWER Documents in technical
detail a mutually acceptable level of service or package of services negotiated to be delivered
by the service provider to the customer.
Who is responsible for registering the system in ARNLD (Gabriel Nimbus)? - CORRECT
ANSWER System Owner
What DA PAM covers Wireless Security Standards? - CORRECT ANSWER DA PAM
25-2-9
What is the first step after suspecting that an unauthorized disclosure of classified
information has occurred? - CORRECT ANSWER Is not Disconnect Network
Connections
, On the FCW worksheet, what is the cell that is not required? - CORRECT
ANSWER Target Subnet Mask/CIDR
Which of the following is not an Alias for SCCM/MECM? - CORRECT
ANSWER Imaging Center
What is an IAVA? - CORRECT ANSWER An alert issued by DISA about a
vulnerability.
True or False: AESS is the only deployed cybersecurity solution to offer all endpoint security
and management capabilities required by Joint Forces HQ DoDIN/DISA. - CORRECT
ANSWER True
Tasks that require physical hands-on service and other issues too complex to fix over the
phone or via remote tools will be referred to the NEC. - CORRECT ANSWER True
Where are the two main Hardware contracts listed? - CORRECT ANSWER Hardware
Procurement Page under Hardware contracts.
Who does the TSP applies to? - CORRECT ANSWER It applies to all government,
military (U.S. and Coalition) and contractor personnel within the organization who access or
use the NIPRNet or SIPRNet and the resources that are accessible by using the network.
Within the Windows Control Panel, where do you go to rebuild an outlook profile? -
CORRECT ANSWER Mail
What are the four types of assessing findings? - CORRECT ANSWER Not reviewed,
open, not a finding, not applicable.
How many Tiers are in the AESD support structure? - CORRECT ANSWER 4