1,2,3,4 AND ACAS EXAM 5 Complete
Questions With Verified Answers
\.d - Answer-Select the Task Order for the Implementation of Assured Compliance Assessment
Solution (ACAS) for the Enterprise:
a. 12-0501
b. 13-0294
c. 16-0294
d. 20-0020
\.d - Answer-What is ACAS?
Select the best answer.
a. ACAS is a system that ensures security for the DoD Networks.
b. ACAS is a system that monitors and corrects vulnerabilities to provide security for the DoD
networks.
c. ACAS is the Army Centralized Arial Sensor System.
d. ACAS is a suite of commercial off-the-shelf (COTS) products used to accurately assess the
configuration compliance of DoD enterprise networks and connected system against DoD
standards.
\. Select the component (below) with the letter of the matching description.
,a. Nessus Network Monitor
b. Nessus
c. Tenable.sc
d. Nessus Manager
e. Nessus Agent -
Drag the software tool to the bar beside the matching description of the component .
a. The passive scanner that detects vulnerabilities by sniffing network traffic
b. The tool that probes hosts and does active vulnerability and compliance scanning
c. The central console that provides continuous endpoint security and compliance monitoring
d. The tool that can manage scan data, run scans and pull in data from various Nessus Agents
e. A lightweight program installed on the endpoint that gives you visibility into other IT assets
that connect intermittently to the internet
\.c - Answer-You have just logged in to your new instance of Tenable.sc. You are in California.
The default local time zone is set to EST (New York). Where would you change the time zone to
California in the Tenable.sc?
Select the best answer.
a. Dashboard > Dashboard
b. Username Menu > Feeds
c. Username Menu > Profile
d. Workflow > Tickets
e. Username Menu > Help
, \.b - Answer-You were just directed to update the version of your Tenable.sc. Where would you
see the version of your current Tenable.sc in the tool itself?
Select the best answer.
a. Dashboard > Assurance Report Cards
b. Username Menu > About
c. Workflow > Alerts
d. Reporting > Reports
\.b - Answer-On which website would you look for the ACAS documentation?
Select the best answer.
a. eMASS website
b. Path Repository
c. DEPS portal
d. Cyber Exchange
\.a. A set of proprietary data files that stores scan results and resides on the Tenable.sc
b. A group(s) of users responsible for a secific set(s) of assets
c. A defined static range of IP addresses with an associated Nessus scanner(s)
d. A script file used to collect and interpret vulnerability, compliance, and configuration data -
Answer-Match the building block term with the matching description below.
Drag the definition/description to the bar beside the appropriate building block. Then drop it.
a. Repository
b. Organization