EVAL EXAM QUESTIONS AND ANSWERS
What group of users is responsible for a specific set of hosts
a) Organization
b) Plugin
c) Repository
d) Scan Zone - Answers - A) Organization
A Scan Zone
a. Maintains a database of vulnerability data defined by assets or IP addresses
b. Associates an IP address or range of IP addresses with one or more scanners
c. Groups users who are responsible for a specific set of hosts
d. Runs a script file used to collect and interpret vulnerability, compliance, and
configuration
data - Answers - B) Associates an IP address or range of IP addresses with one or
more scanners
What contains vulnerability information, a simplified set of remediation actions and the
algorithm
to test for the presence of the security issue?
a. Audit File
b. Organization
c. Plugin
d. Vulnerability Index - Answers - C) Plugin
Which of the following is NOT a Security Center severity code?
a. Critical
b. Info
c. Low
d. Severe - Answers - d. Severe
Which SecurityCenter role has the ability to launch scans, configure users, vulnerability
policies,
and other objects belonging to their organization?
a. Administrator
b. Executive
c. Scanning Technician
d. Security Manager - Answers - d. Security Manager
Within the Targets section of Active Scan settings, which IP addresses can be
scanned?
a. Both IPv6 and IPv4 addresses simultaneously.
b. Either IPv6 or IPv4 addresses.
c. Only IPv6 addresses.
d. Only IPv4 addresses. - Answers - b. Either IPv6 or IPv4 addresses.
, How often should the SecurityCenter automatically update plugins?
a. Daily
b. Weekly
c. Bi-weekly
d. Monthly - Answers - a. Daily
Which scan type is used to identify online endpoints at a given period?
a. Targeted
b. Compliance
c. Discovery
d. Vulnerability - Answers - c. Discovery
_______ scans are specialized scans performed in response to a newly identified threat
or to validate
compliance with an order.
a. Vulnerability
b. Compliance
c. Discovery
d. Targeted - Answers - d. Targeted
Which type of scan determines all vulnerabilities found on live hosts within a network
enclave?
a. Discovery
b. Vulnerability
c. Compliance
d. Targeted - Answers - b. Vulnerability
What determines what a user can or cannot access from their ACAS account?
a. Authorizations
b. Permissions
c. Credentials
d. Roles - Answers - d. Roles
What component of ACAS performs evaluates processes running on the host or probes
the host's
network services?
a. Nessus scanners
b. Plugins
c. Passive Vulnerability Scanners (PVS)
d. Security Centers - Answers - a. Nessus scanners
What is the weight of a CAT II vulnerability?
a. 0
b. 1
c. 4
What group of users is responsible for a specific set of hosts
a) Organization
b) Plugin
c) Repository
d) Scan Zone - Answers - A) Organization
A Scan Zone
a. Maintains a database of vulnerability data defined by assets or IP addresses
b. Associates an IP address or range of IP addresses with one or more scanners
c. Groups users who are responsible for a specific set of hosts
d. Runs a script file used to collect and interpret vulnerability, compliance, and
configuration
data - Answers - B) Associates an IP address or range of IP addresses with one or
more scanners
What contains vulnerability information, a simplified set of remediation actions and the
algorithm
to test for the presence of the security issue?
a. Audit File
b. Organization
c. Plugin
d. Vulnerability Index - Answers - C) Plugin
Which of the following is NOT a Security Center severity code?
a. Critical
b. Info
c. Low
d. Severe - Answers - d. Severe
Which SecurityCenter role has the ability to launch scans, configure users, vulnerability
policies,
and other objects belonging to their organization?
a. Administrator
b. Executive
c. Scanning Technician
d. Security Manager - Answers - d. Security Manager
Within the Targets section of Active Scan settings, which IP addresses can be
scanned?
a. Both IPv6 and IPv4 addresses simultaneously.
b. Either IPv6 or IPv4 addresses.
c. Only IPv6 addresses.
d. Only IPv4 addresses. - Answers - b. Either IPv6 or IPv4 addresses.
, How often should the SecurityCenter automatically update plugins?
a. Daily
b. Weekly
c. Bi-weekly
d. Monthly - Answers - a. Daily
Which scan type is used to identify online endpoints at a given period?
a. Targeted
b. Compliance
c. Discovery
d. Vulnerability - Answers - c. Discovery
_______ scans are specialized scans performed in response to a newly identified threat
or to validate
compliance with an order.
a. Vulnerability
b. Compliance
c. Discovery
d. Targeted - Answers - d. Targeted
Which type of scan determines all vulnerabilities found on live hosts within a network
enclave?
a. Discovery
b. Vulnerability
c. Compliance
d. Targeted - Answers - b. Vulnerability
What determines what a user can or cannot access from their ACAS account?
a. Authorizations
b. Permissions
c. Credentials
d. Roles - Answers - d. Roles
What component of ACAS performs evaluates processes running on the host or probes
the host's
network services?
a. Nessus scanners
b. Plugins
c. Passive Vulnerability Scanners (PVS)
d. Security Centers - Answers - a. Nessus scanners
What is the weight of a CAT II vulnerability?
a. 0
b. 1
c. 4