Review EXAM WITH MULTIPLE,
CORRECTLY ANSWERED QUESTIONS
ALREADY GRADED A+
A vulnerability will bemarked as mitigated intheTenable.sc repository if asubsequent scan
hh hh hh hh hh hh hh hh hh hh hh hh hh hh
determines that the vulnerability is no longer present on the endpoint.
hh hh hh hh hh hh hh hh hh hh hh
Select the correct answer. hh hh hh
a. True
b. False - ANSWERa hh hh
hh Selectthebestanswer. h h h
a. Active Scan View hh hh
b. VulnerabilitySummary h
c. IP Summary hh
d. Remediation Summary - ANSWERc hh hh hh
Nessus Agentsarelightweight Nessus scanners installed ontheendpoint, accordingto the
hh h hh hh hh hh hh hh h hh hh hh
ACAS Agent Rapid Deployment Guide.
hh hh hh hh hh
Select the best answer. hh hh hh
a. True
b. False - ANSWERa hh hh
Per theBest PracticesGuide,whichof the following statements aretrue? Select the
hh hh hh h h hh hh hh hh hh h hh hh
correct answer(s).
hh hh
a. TheTASKORD defines severaltarget typesonwhich NessusAgents are required to be
hh hh hh hh hh h hh hh h hh hh hh hh
installed.
hh
b. Nessus Agents canbe installed on addition endpoints above TASKORD requirement. hh hh hh hh hh hh hh hh hh hh
c. Per the TASKORDorganizations endpoints whichleverage aNessus Agents must also
hh hh hh hh hh hh hh hh hh hh hh
be scanned with the Nessus active scanner using ACAS Best Practice Guide Agent
hh hh hh hh hh hh hh hh hh hh hh hh hh
Differential scan policy.
hh hh hh
d. Ifyou use Nessus Agents, then you don't need any other scanning tools for ACAS.
hh hh hh hh hh hh hh hh hh hh hh hh hh hh
e. Allthe above - ANSWERa b c hh hh hh hh hh hh
Nessus Agent and Manager use thesame software. hh hh hh hh hh hh hh
,Select the correct answer. hh hh hh
a. True
b. False - ANSWERb hh hh
Per theBest PracticesGuide,whichof thesestatements is true. Select the
hh hh hh h h hh hh h hh hh hh hh
hh correct answers. hh
a. ACAS TASKORD20-0020 FRAGO 3 clarifiesthat only DISA STIGTenable Audit files
hh hh hh hh hh h hh hh hh hh hh hh
are to be used for configuration scanning in ACAS.
hh hh hh hh hh hh hh hh hh
b. DISASCAP-compliant, automated benchmarks arestillacceptablefor ingest into
h hh hh hh hh h h hh hh
CMRS.
hh
c. Auditfiles areproprietary formatted XML files that define howACAS should check for
h hh hh hh hh hh hh hh hh hh hh hh hh
configuration with a specified benchmark.
hh hh hh hh hh
d. Tenable distributesaudit files viathethe Tenable.sc Feed that is usedto update hh h hh hh hh hh hh hh hh hh hh hh hh
Tenable.sc
hh
e. None of the above - ANSWERa c d hh hh hh hh hh hh hh
It has been 20 days since your last configuration (STIG) scan. Per FRAGO 2 of the Task
hh hh hh hh hh hh hh hh hh hh hh hh hh hh hh hh
Order 20-0020,which of the followingstatements reflects yourcurrent compliance status?
hh hh h hh hh hh hh hh hh h hh hh
Select the best answer. hh hh hh
In compliance because configuration scans are only required every 30 days. In
hh hh hh hh hh hh hh hh hh hh hh
compliance because vulnerability scans are only required every 21 days. Out of
hh hh hh hh hh hh hh hh hh hh hh hh
compliance because configuration scans are required every 14 days. Out of
hh hh hh hh hh hh hh hh hh hh hh
compliance because vulnerability scans arerequiredevery singleday. -
hh hh hh hh hh hh hh hh hh hh
ANSWERa
hh
Choosethe Tenable.sc Severity Levelthatcorresponds tothe Configurationresult. Tenable
h hh hh hh h h hh hh hh h hh
re-used severity levels for configuration results.
hh hh hh hh hh hh
a. Critical
b. High
c. Medium
d. Info - ANSWERa. Not used with configuration
hh hh hh hh hh hh
b. Failedconfiguration check hh hh
c. Unable to Determine/Error hh hh
d. Passedconfiguration check hh hh
Per the ACAS Best Practices Guide, which of the following Tenable.sc resources are
hh hh hh hh hh hh hh hh hh hh hh hh
proprietary formatted XML files that define how ACAS should check for configuration with
hh hh hh hh hh hh hh hh hh hh hh hh hh
a specified STIG?
hh hh hh
, Select the best answer: hh hh hh
a. Credentials
b. Queries
c. Policies
d. AuditFiles-ANSWERd h h h
The Tenable Nessus vulnerability scanner allows you to perform compliance audits of
hh hh hh hh hh hh hh hh hh hh hh
numerous platforms including (butnot limited to) databases, Cisco,Unix, andWindows
hh hh hh hh hh hh hh hh hh h hh h
configurationsaswellassensitivedatadiscoverybasedonregexcontainedinauditfiles.
hh h h h h h h h h h h h h h
AuditfilesareXML-based text filesthat containthespecific configuration,file
h h h hh hh h hh hh h hh h
permission, and access control tests to be performed.
hh hh hh hh hh hh hh hh
LogintoTenableSecurityCenterviatheuserinterface.Click
h h h h h h h h h h
Scans > Audit Files.
hh hh hh hh
TheAuditFilespageappears.
h h h h
Scanzone-ANSWERScanzonesareareasofyournetworkthatyouwanttotargetinan active scan
h h h h h h h h h h h h h h h h hh hh
AssociatesanIPaddressorrangeofIPaddresseswithoneormorescanners h h h h h h h h h h h h h
YoumustcreatescanzonesinordertorunactivescansinTenableSecurityCenter.
h h h h h h h h h h h h h h
CVSSvs.VPR-ANSWERCVSSistheoverallscoreassignedtoavulnerability.CVEis
h h h h h h h h h h h h h h
simply a list of all publicly disclosed vulnerabilities that includes the CVE ID, a description,
hh hh hh hh hh hh hh hh hh hh hh hh hh hh hh
dates,andcomments. TheCVSSscoreisnotreportedintheCVElisting- you must use the
h h h hh h h h h h h h h h h hh hh hh hh
NVD to find assigned CVSS scores.
hh hh hh hh hh hh
Tenable calculates a dynamic VPR for most vulnerabilities. The VPR is a dynamic hh hh hh hh hh hh hh hh hh hh hh hh
companion to the data provided by the vulnerability's CVSS score, since Tenable updates
hh hh hh hh hh hh hh hh hh hh hh hh hh
theVPRtoreflectthecurrentthreatlandscape.VPRvaluesrangefrom0.1-10.0, with a higher
h h h h h h h h h h h h h h hh hh hh
value representing a higher likelihood of exploit.
hh hh hh hh hh hh hh
Note: When you view these metrics on an analysis page organized by plugin (for example,the
hh hh hh hh hh hh hh hh hh hh hh hh hh hh hh
Vulnerabilitiespage),themetricsrepresentthehighestvalueassignedor calculated for a
h hh hh hh hh hh h h hh hh hh hh hh
vulnerability associated with the plugin.
hh hh hh hh hh
Nessusscanners-ANSWERCollectsdataandreportsresultstoTenable.scconsoleCAT II
h h h h h h h h h h h hh
hh vulnerability weight - ANSWER4 hh hh hh
CATIvulnerabilityweight -ANSWER10
h h h hh h
JFHQ-DODINOrder-ANSWERTASKORD20-0020 h h h h