ANSWERS|FREQUENTLY TESTED QUESTIONS AAND
SOLUTIONS|ALREADY GRADED A+|LATEST 2024|GUARANTEED PASS.
What is ACAS?
ACAS is a network-based security compliance and assessment capability
designed to provide awareness of the security posture and network health of
DoD networks.
Which of the following best describes the SecurityCenter?
The central console that provides continuous asset-based security and
compliance monitoring
A vulnerability is a weakness or an attack that can compromise your system.
False (a vulnerability does not include an attack)
The Nessus scanner monitors data at rest, while the PVS monitors data in motion.
True
PVS detects vulnerabilities based on network traffic instead of actively scanning hosts.
True
Which ACAS component performs active vulnerability and compliance scanning?
Nessus
CMRS is a tool to provide DoD component- and enterprise-level situational awareness by
quantitatively displaying an organization's security posture.
True
Select the Task Order for the Implementation of Assured Compliance Assessment Solution (ACAS) for
the Enterprise:
13-670
Which page loads by default when you log in to SecurityCenter? Select the best answer.
Dashboard
Which of the following pages show the date and time of the most recent plugin updates?
Plugins, Feeds
Which page allows you to set your local time zone?
Profile
What is an organization?
a set A group of individuals who are responsible for of common assets
, What is a scan zone?
A defined static range of IP addresses with an associated Nessus scanner(s)
What is the maximum size of a SecurityCenter 5 Repository?
32 GB
The IP address(es) you are scanning must be contained in both the definition of the scan zone and
the definition of the repository.
True
What SecurityCenter role is responsible for setting up scan zones?
Administrator
How can you get your SecurityCenter plugin updates?
Automatically, from DISA's plugin server, Manually from the DoD Patch Repository
The SecurityCenter Plugins menu displays a list of script files used by Nessus and PVS scanners to
collect and interpret vulnerability, compliance, and configuration data.
True
Which of the following are options you can consider for scanning stand-alone networks?
Install both Nessus and SecurityCenter on a Linux Laptop using Kickstart, Install both Nessus and
SecurityCenter in virtual machines on a Windows 7 laptop, Detach a Nessus scanner from its
SecurityCenter for scanning purposes and then reattach to SecurityCenter to upload scan results
Components of an Active Vulnerability Scan consist of: a policy, credentials, scan zone, schedule,
_________, and __________.
Repository, Target list
_________ are administrative-level usernames and passwords (or SSH keypairs) used in
authenticated scans?
Credentials
You can associate multiple credentials with a single scan.
True
Networks using Dynamic Host Configuration Protocol (DHCP) require that this Active Scan setting be
enabled to properly track hosts.
Track hosts which have been issued IP addresses
Which type of scan obtains information by authenticating to the host to access resources not
available over the network.
Credentialed
You may only select one import repository per scan.
True