VMO MQF QUESTIONS AND ANSWERS
What is a group of individuals responsible for a set of common assets? - Answer -
Organization
A scan zone is a __________. - Answer -Defined static range of IP addresses with an
associated Nessus scanner(s)
What is a script file used to collect and interpret vulnerability, compliance, and
configuration data? - Answer -Plugin
Which of the following is NOT a SecurityCenter severitycode? - Answer -Severe
What component of ACAS performs the active vulnerability scanning and credentialed
scanning? - Answer -Nessus scanners
What is the weight of a CAT II vulnerability? - Answer -4
What is the weight for a CAT I vulnerability? - Answer -10
Which role allows an end user to view vulnerability data within ACAS with the least
privilege? - Answer -Read-Only
Which SecurityCenter role is responsible for creating groups within an organization? -
Answer -SecurityManager
Which user role resides at the top of a SecurityCenter hierarchy? - Answer -
Administrator
What is the maximum number of repositories you can select per scan? - Answer -One
How often should the SecurityCenter automatically update plugins? - Answer -Daily
Which scan policy is used in a host discovery scan to populate a repository with all
active IP addresses it can reach? - Answer -Host discovery
_____ scans are specialized scans performed in response to a newly identified threat or
to validate compliance with an order. - Answer -Targeted
Which type of scan obtains detailed information by authenticating to the host? - Answer
-Credentialed scan
What two objects must be created prior to building a scan template? - Answer -
Repositories and scan zones
What is a group of individuals responsible for a set of common assets? - Answer -
Organization
A scan zone is a __________. - Answer -Defined static range of IP addresses with an
associated Nessus scanner(s)
What is a script file used to collect and interpret vulnerability, compliance, and
configuration data? - Answer -Plugin
Which of the following is NOT a SecurityCenter severitycode? - Answer -Severe
What component of ACAS performs the active vulnerability scanning and credentialed
scanning? - Answer -Nessus scanners
What is the weight of a CAT II vulnerability? - Answer -4
What is the weight for a CAT I vulnerability? - Answer -10
Which role allows an end user to view vulnerability data within ACAS with the least
privilege? - Answer -Read-Only
Which SecurityCenter role is responsible for creating groups within an organization? -
Answer -SecurityManager
Which user role resides at the top of a SecurityCenter hierarchy? - Answer -
Administrator
What is the maximum number of repositories you can select per scan? - Answer -One
How often should the SecurityCenter automatically update plugins? - Answer -Daily
Which scan policy is used in a host discovery scan to populate a repository with all
active IP addresses it can reach? - Answer -Host discovery
_____ scans are specialized scans performed in response to a newly identified threat or
to validate compliance with an order. - Answer -Targeted
Which type of scan obtains detailed information by authenticating to the host? - Answer
-Credentialed scan
What two objects must be created prior to building a scan template? - Answer -
Repositories and scan zones