ACAS Review QUESTIONS AND
ANSWERS 100% RATED CORRECT
WITH 100% SURE PASS|GRADED A+
A - CORRECT ANSWERS What is ACAS? Select the best answer.
A. ACAS is a network-based security compliance and assessment capability designed to provide
awareness of the security posture and network health of DoD networks.
B. ACAS is a system that ensures security for the DoD networks.
C. ACAS is a system that monitors and corrects vulnerabilities to provide security for the DoD networks.
D. All of the above
**** Module 1-1 ****
D - CORRECT ANSWERS Which of the following best describes the SecurityCenter? Select the
best answer.
A. A topology viewer that provides graphical analysis information
B. The passive scanner that detects vulnerabilities by sniffing network traffic
C. The active scanner that probes hosts
D. The central console that provides continuous asset-based security and compliance monitoring
**** Module 1-1 ****
False - CORRECT ANSWERS True/False
A vulnerability is a weakness or an attack that can compromise your system.
**** Module 1-1 ****
True - CORRECT ANSWERS True/False
The Nessus scanner monitors data at rest, while the PVS monitors data in motion.
**** Module 1-1 ****
,True - CORRECT ANSWERS True/False
PVS detects vulnerabilities based on network traffic instead of actively scanning hosts.
**** Module 1-1 ****
C - CORRECT ANSWERS Which ACAS component performs active vulnerability and
compliance scanning? Select the best answer.
A. 3D Tool
B. PVS
C. Nessus
D. SecurityCenter
**** Module 1-1 ****
True - CORRECT ANSWERS True/False
CMRS is a tool to provide DoD component- and enterprise-level situational awareness by quantitatively
displaying an organization's security posture.
**** Module 1-1 ****
B - CORRECT ANSWERS Select the Task Order for the Implementation of Assured Compliance
Assessment Solution (ACAS) for the Enterprise:
A. 12-501
B. 13-670
C. 13-294
D. 14-0294
**** Module 1-1 ****
A - CORRECT ANSWERS Which page loads by default when you log in to SecurityCenter?
Select the best answer. Select the best answer.
A. Dashboard
, B. Analysis
C. Reporting
D. Scanning
**** Module 1-2 ****
B, E - CORRECT ANSWERS Which of the following pages show the date and time of the most
recent plugin updates? Select all that apply.
A. Alerts
B. Plugins
C. Preferences
D. System Status
E. Feeds
**** Module 1-2 ****
C - CORRECT ANSWERS Which page allows you to set your local time zone? Select the best
answer.
A. Dashboard
B. Feeds
C. Profile
D. Workflow
**** Module 1-2 ****
B - CORRECT ANSWERS What is an organization? Select the best answer.
A. A database of vulnerability data defined by assets or IP addresses
B. A group of individuals who are responsible for a set of common assets
C. A defined static range of IP addresses with an associated Nessus scanner(s)
D. A script file used to collect and interpret vulnerability, compliance, and configuration data
ANSWERS 100% RATED CORRECT
WITH 100% SURE PASS|GRADED A+
A - CORRECT ANSWERS What is ACAS? Select the best answer.
A. ACAS is a network-based security compliance and assessment capability designed to provide
awareness of the security posture and network health of DoD networks.
B. ACAS is a system that ensures security for the DoD networks.
C. ACAS is a system that monitors and corrects vulnerabilities to provide security for the DoD networks.
D. All of the above
**** Module 1-1 ****
D - CORRECT ANSWERS Which of the following best describes the SecurityCenter? Select the
best answer.
A. A topology viewer that provides graphical analysis information
B. The passive scanner that detects vulnerabilities by sniffing network traffic
C. The active scanner that probes hosts
D. The central console that provides continuous asset-based security and compliance monitoring
**** Module 1-1 ****
False - CORRECT ANSWERS True/False
A vulnerability is a weakness or an attack that can compromise your system.
**** Module 1-1 ****
True - CORRECT ANSWERS True/False
The Nessus scanner monitors data at rest, while the PVS monitors data in motion.
**** Module 1-1 ****
,True - CORRECT ANSWERS True/False
PVS detects vulnerabilities based on network traffic instead of actively scanning hosts.
**** Module 1-1 ****
C - CORRECT ANSWERS Which ACAS component performs active vulnerability and
compliance scanning? Select the best answer.
A. 3D Tool
B. PVS
C. Nessus
D. SecurityCenter
**** Module 1-1 ****
True - CORRECT ANSWERS True/False
CMRS is a tool to provide DoD component- and enterprise-level situational awareness by quantitatively
displaying an organization's security posture.
**** Module 1-1 ****
B - CORRECT ANSWERS Select the Task Order for the Implementation of Assured Compliance
Assessment Solution (ACAS) for the Enterprise:
A. 12-501
B. 13-670
C. 13-294
D. 14-0294
**** Module 1-1 ****
A - CORRECT ANSWERS Which page loads by default when you log in to SecurityCenter?
Select the best answer. Select the best answer.
A. Dashboard
, B. Analysis
C. Reporting
D. Scanning
**** Module 1-2 ****
B, E - CORRECT ANSWERS Which of the following pages show the date and time of the most
recent plugin updates? Select all that apply.
A. Alerts
B. Plugins
C. Preferences
D. System Status
E. Feeds
**** Module 1-2 ****
C - CORRECT ANSWERS Which page allows you to set your local time zone? Select the best
answer.
A. Dashboard
B. Feeds
C. Profile
D. Workflow
**** Module 1-2 ****
B - CORRECT ANSWERS What is an organization? Select the best answer.
A. A database of vulnerability data defined by assets or IP addresses
B. A group of individuals who are responsible for a set of common assets
C. A defined static range of IP addresses with an associated Nessus scanner(s)
D. A script file used to collect and interpret vulnerability, compliance, and configuration data