UPDATED Questions and CORRECT
Answers
A Nessus Scanner covers numerous check, including unique Common Vulnerabilities and
Exposures (CVEs), and successfully operates across different environments. What else does it
do? - CORRECT ANSWER - Serves as an active vulnerability scanner, Evaluates
processes running on the host, Probes the host's network services.
What are the standard ACAS Components? - CORRECT ANSWER - Nessus Scanner &
Security Center
What is ACAS? - CORRECT ANSWER - Assured Compliance Assessment Solutions.
How does the Air Force utilize ACAS? - CORRECT ANSWER - Detects known cyber
threats on enterprise assets.
What kind of product is ACAS? - CORRECT ANSWER - COTS
Where does ACAS come from? - CORRECT ANSWER - Tenable Network Security?
What specifically can ACAS through automated network scanning? - CORRECT
ANSWER - Provides vulnerability scanning, application vulnerability scanning,
configuration assessment, device configuration assessment, network discovery, compliance
reporting, & compliance accountability/enforcement.
What are some of the Security Centers capabilities? - CORRECT ANSWER - Provides
complete visibility into the security posture of the IT infrastructure. Evaluates al vulnerability
data across entire IT infrastructure. Analyzes vulnerabilities, provides solutions to said
vulnerabilities. Illustrates vulnerability trends over time, and assesses risk. Actionable context for
effective remediation in prioritized order for assessed systems/devices/risks.