EXAM 2 QUESTIONS AND ANSWERS
Today is Thursday, and you are getting ready to run your weekly vulnerability scans.
70 70 70 70 70 70 70 70 70 70 70 70 70 70
Your plugins were updated on Monday.
70 70 70 70 70
Select the correct answer based on your status.
70 70 70 70 70 70 70
a. In compliance because active plugins must be updated within 7 days before TASK
70 70 70 70 70 70 70 70 70 70 70 70 70
ORD-mandated scans. 70 70
b. In compliance because active plugins must be updated within 14 days before TAS
70 70 70 70 70 70 70 70 70 70 70 70 70
KORD-mandated scans. 70
c. Out of compliance because active plugins must be updated within 72 hours before
70 70 70 70 70 70 70 70 70 70 70 70 70 70
TASKORD-mandated scans. 70 70
d. Out of compliance because active plugins must be updated within 24 hours before
70 70 70 70 70 70 70 70 70 70 70 70 70 7
TASKORD-mandated scans. - ans-a
0 70 70 70
According to the ACAS contract, what are the allowable options for scanning stand-
70 70 70 70 70 70 70 70 70 70 70 70
alone networks? 70
Select the best answers from the ACAS Standalone Guide.
70 70 70 70 70 70 70 70
a. Install both Nessus and Tenable.sc on a Linux system using Kickstart.
70 70 70 70 70 70 70 70 70 70 70
b. Install both Nessus and Tenable.sc on a 64-
70 70 70 70 70 70 70 70
bit Windows operating system with a virtualization application.
70 70 70 70 70 70 70 70
c. Install Nessus as its own standalone system.
70 70 70 70 70 70 70 70
d. There are no approved standalone options. DISA mandates that you must install al
70 70 70 70 70 70 70 70 70 70 70 70 70
l components on a Linux system, and nothing else. - ans-a b c
70 70 70 70 70 70 70 70 70 70 70 70
Components of an Active Vulnerability Scan consist of a scan policy, schedule, crede
70 70 70 70 70 70 70 70 70 70 70 70
ntials, scan zone, import repository, and __________.
70 70 70 70 70 70
Select the best answer to complete the statement.
70 70 70 70 70 70 70
a. User role
70 70
b. Endpoints/Targets
70
c. Assurance Report Cards
70 70 70
d. Asset Lists - ans-b
70 70 70 70
_________ are administrative level usernames and passwords (or SSH key pairs) us
70 70 70 70 70 70 70 70 70 70 70
ed in authenticated scans?
70 70 70