EXAM QUESTIONS WITH VERIFIED ANSWERS.
According to the ACAS Best Practices Guide, which Guide would
you use for procedures for publishing vulnerability data to the
Continuous Monitoring & Risk Scoring (CMRS) system.
Select the best answer.
a. ACAS General Requirements Guide
b. ACAS EL7 User Guide
c. ACAS Publishing Guide
d. ACAS ESS Integration Guide
- ANSWER-c
According to the Best Practices Guide, which Plugin is a good
starting point when working issues with scanning an endpoint or
unexpected results.
Select the best answer.
a. 19506
b. 21745
c. 30300
, d. 45678
- ANSWER-a
Match the appropriate definition with the building block.
Drag the definition and drop it beside the term that it describes.
a) Roles
b) Groups
c) Users
- ANSWER-Roles
Define what a user can do (such as having full, limited, or no
scanning permissions)
Groups
Combine access rights to objects within an organization for quick
assignment to one or more users.
Users
Are individual Tenable.sc accounts
Per the Best Practices Guide, what could be some possible
suggestions for reducing scan times.
Select the best answers.