Questions and CORRECT Answers
What is ACAS? - CORRECT ANSWER - ACAS is a network-based security compliance
and assessment capability designed to provide awareness of the security posture and network
health of DoD networks.
Which ACAS component performs active vulnerability and compliance scanning? - CORRECT
ANSWER - SecurityCenter
In the SecurityCenter user interface; which menu provides a customizable display of
vulnerability data when you log in to SecurityCenter? - CORRECT ANSWER - Dashboard
What best describes user access attributes within a SecurityCenter organization? - CORRECT
ANSWER - Users automatically inherit the roles and resources assigned to the user that
created them.
Scan Targets can be either IP addresses or _________. - CORRECT ANSWER - Asset
Lists
Which of the four steps for running a scan is NOT performed from the Scanning menu in
SecurityCenter? - CORRECT ANSWER - Create a scan policy
You can only add Dashboard components for the existing queries you have set up in the Support
menu. - CORRECT ANSWER - FALSE
What vulnerabilities are stored in SecurityCenters Cumulative database? - CORRECT
ANSWER - Current vulnerabilities - including those that have been recast; accepted; or
mitigated and found vulnerable from rescan
, Which of the following SecurityCenter resources provide customized views of vulnerability scan
data? - CORRECT ANSWER - Queries
Which SecurityCenter menu option do you use to access vulnerability data? - CORRECT
ANSWER - Analysis
_______limit the results of the vulnerability display and can be added; modified or reset as
desired. - CORRECT ANSWER - Filters
Results of ________can be stored as ________ and referred to later for comparative analysis. -
CORRECT ANSWER - filters; queries
Which SecurityCenter menu option do you use to upload audit files? - CORRECT
ANSWER - Support
Which vulnerability severity level indicates a failed compliance item? - CORRECT
ANSWER - High
SecurityCenter organizations are __________ that have responsibilities for __________. -
CORRECT ANSWER - groups of individuals; a set of common assets
Which SecurityCenter user type creates organizations? - CORRECT ANSWER - Admin
user
Which SecurityCenter user type resides at the top of an organization hierarchy? - CORRECT
ANSWER - Security Manager
What is the main purpose of tiered SecurityCenters? - CORRECT ANSWER -?
Which of the following SecurityCenter resources prescribe plugins and settings for initiating a
scan? - CORRECT ANSWER - Scan Policies