100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

ACAS Training and Best Practice Review EXAM WITH MULTIPLE, CORRECTLY ANSWERED QUESTIONS ALREADY GRADED A+

Rating
-
Sold
-
Pages
21
Grade
A+
Uploaded on
02-12-2025
Written in
2025/2026

ACAS Training and Best Practice Review EXAM WITH MULTIPLE, CORRECTLY ANSWERED QUESTIONS ALREADY GRADED A+ACAS Training and Best Practice Review EXAM WITH MULTIPLE, CORRECTLY ANSWERED QUESTIONS ALREADY GRADED A+ACAS Training and Best Practice Review EXAM WITH MULTIPLE, CORRECTLY ANSWERED QUESTIONS ALREADY GRADED A+

Show more Read less
Institution
ACAS Training And Best Practice
Course
ACAS Training and Best Practice










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
ACAS Training and Best Practice
Course
ACAS Training and Best Practice

Document information

Uploaded on
December 2, 2025
Number of pages
21
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

ACAS Training and Best Practice
Review EXAM WITH MULTIPLE,
CORRECTLY ANSWERED QUESTIONS
ALREADY GRADED A+
A vulnerability will bemarked as mitigated intheTenable.sc repository if asubsequent scan
hh hh hh hh hh hh hh hh hh hh hh hh hh hh




determines that the vulnerability is no longer present on the endpoint.
hh hh hh hh hh hh hh hh hh hh hh




Select the correct answer. hh hh hh




a. True
b. False - ANSWERa hh hh




hh Selectthebestanswer. h h h




a. Active Scan View hh hh




b. VulnerabilitySummary h




c. IP Summary hh




d. Remediation Summary - ANSWERc hh hh hh




Nessus Agentsarelightweight Nessus scanners installed ontheendpoint, accordingto the
hh h hh hh hh hh hh hh h hh hh hh




ACAS Agent Rapid Deployment Guide.
hh hh hh hh hh




Select the best answer. hh hh hh




a. True
b. False - ANSWERa hh hh




Per theBest PracticesGuide,whichof the following statements aretrue? Select the
hh hh hh h h hh hh hh hh hh h hh hh




correct answer(s).
hh hh




a. TheTASKORD defines severaltarget typesonwhich NessusAgents are required to be
hh hh hh hh hh h hh hh h hh hh hh hh




installed.
hh




b. Nessus Agents canbe installed on addition endpoints above TASKORD requirement. hh hh hh hh hh hh hh hh hh hh




c. Per the TASKORDorganizations endpoints whichleverage aNessus Agents must also
hh hh hh hh hh hh hh hh hh hh hh




be scanned with the Nessus active scanner using ACAS Best Practice Guide Agent
hh hh hh hh hh hh hh hh hh hh hh hh hh




Differential scan policy.
hh hh hh




d. Ifyou use Nessus Agents, then you don't need any other scanning tools for ACAS.
hh hh hh hh hh hh hh hh hh hh hh hh hh hh




e. Allthe above - ANSWERa b c hh hh hh hh hh hh




Nessus Agent and Manager use thesame software. hh hh hh hh hh hh hh

,Select the correct answer. hh hh hh




a. True
b. False - ANSWERb hh hh




Per theBest PracticesGuide,whichof thesestatements is true. Select the
hh hh hh h h hh hh h hh hh hh hh




hh correct answers. hh




a. ACAS TASKORD20-0020 FRAGO 3 clarifiesthat only DISA STIGTenable Audit files
hh hh hh hh hh h hh hh hh hh hh hh




are to be used for configuration scanning in ACAS.
hh hh hh hh hh hh hh hh hh




b. DISASCAP-compliant, automated benchmarks arestillacceptablefor ingest into
h hh hh hh hh h h hh hh




CMRS.
hh




c. Auditfiles areproprietary formatted XML files that define howACAS should check for
h hh hh hh hh hh hh hh hh hh hh hh hh




configuration with a specified benchmark.
hh hh hh hh hh




d. Tenable distributesaudit files viathethe Tenable.sc Feed that is usedto update hh h hh hh hh hh hh hh hh hh hh hh hh




Tenable.sc
hh




e. None of the above - ANSWERa c d hh hh hh hh hh hh hh




It has been 20 days since your last configuration (STIG) scan. Per FRAGO 2 of the Task
hh hh hh hh hh hh hh hh hh hh hh hh hh hh hh hh




Order 20-0020,which of the followingstatements reflects yourcurrent compliance status?
hh hh h hh hh hh hh hh hh h hh hh




Select the best answer. hh hh hh




In compliance because configuration scans are only required every 30 days. In
hh hh hh hh hh hh hh hh hh hh hh




compliance because vulnerability scans are only required every 21 days. Out of
hh hh hh hh hh hh hh hh hh hh hh hh




compliance because configuration scans are required every 14 days. Out of
hh hh hh hh hh hh hh hh hh hh hh




compliance because vulnerability scans arerequiredevery singleday. -
hh hh hh hh hh hh hh hh hh hh




ANSWERa
hh




Choosethe Tenable.sc Severity Levelthatcorresponds tothe Configurationresult. Tenable
h hh hh hh h h hh hh hh h hh




re-used severity levels for configuration results.
hh hh hh hh hh hh




a. Critical
b. High
c. Medium
d. Info - ANSWERa. Not used with configuration
hh hh hh hh hh hh




b. Failedconfiguration check hh hh




c. Unable to Determine/Error hh hh




d. Passedconfiguration check hh hh




Per the ACAS Best Practices Guide, which of the following Tenable.sc resources are
hh hh hh hh hh hh hh hh hh hh hh hh




proprietary formatted XML files that define how ACAS should check for configuration with
hh hh hh hh hh hh hh hh hh hh hh hh hh




a specified STIG?
hh hh hh

, Select the best answer: hh hh hh




a. Credentials
b. Queries
c. Policies
d. AuditFiles-ANSWERd h h h




The Tenable Nessus vulnerability scanner allows you to perform compliance audits of
hh hh hh hh hh hh hh hh hh hh hh




numerous platforms including (butnot limited to) databases, Cisco,Unix, andWindows
hh hh hh hh hh hh hh hh hh h hh h




configurationsaswellassensitivedatadiscoverybasedonregexcontainedinauditfiles.
hh h h h h h h h h h h h h h




AuditfilesareXML-based text filesthat containthespecific configuration,file
h h h hh hh h hh hh h hh h




permission, and access control tests to be performed.
hh hh hh hh hh hh hh hh




LogintoTenableSecurityCenterviatheuserinterface.Click
h h h h h h h h h h




Scans > Audit Files.
hh hh hh hh




TheAuditFilespageappears.
h h h h




Scanzone-ANSWERScanzonesareareasofyournetworkthatyouwanttotargetinan active scan
h h h h h h h h h h h h h h h h hh hh




AssociatesanIPaddressorrangeofIPaddresseswithoneormorescanners h h h h h h h h h h h h h




YoumustcreatescanzonesinordertorunactivescansinTenableSecurityCenter.
h h h h h h h h h h h h h h




CVSSvs.VPR-ANSWERCVSSistheoverallscoreassignedtoavulnerability.CVEis
h h h h h h h h h h h h h h




simply a list of all publicly disclosed vulnerabilities that includes the CVE ID, a description,
hh hh hh hh hh hh hh hh hh hh hh hh hh hh hh




dates,andcomments. TheCVSSscoreisnotreportedintheCVElisting- you must use the
h h h hh h h h h h h h h h h hh hh hh hh




NVD to find assigned CVSS scores.
hh hh hh hh hh hh




Tenable calculates a dynamic VPR for most vulnerabilities. The VPR is a dynamic hh hh hh hh hh hh hh hh hh hh hh hh




companion to the data provided by the vulnerability's CVSS score, since Tenable updates
hh hh hh hh hh hh hh hh hh hh hh hh hh




theVPRtoreflectthecurrentthreatlandscape.VPRvaluesrangefrom0.1-10.0, with a higher
h h h h h h h h h h h h h h hh hh hh




value representing a higher likelihood of exploit.
hh hh hh hh hh hh hh




Note: When you view these metrics on an analysis page organized by plugin (for example,the
hh hh hh hh hh hh hh hh hh hh hh hh hh hh hh




Vulnerabilitiespage),themetricsrepresentthehighestvalueassignedor calculated for a
h hh hh hh hh hh h h hh hh hh hh hh




vulnerability associated with the plugin.
hh hh hh hh hh




Nessusscanners-ANSWERCollectsdataandreportsresultstoTenable.scconsoleCAT II
h h h h h h h h h h h hh




hh vulnerability weight - ANSWER4 hh hh hh




CATIvulnerabilityweight -ANSWER10
h h h hh h




JFHQ-DODINOrder-ANSWERTASKORD20-0020 h h h h
R277,03
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
Wisdomstudys

Get to know the seller

Seller avatar
Wisdomstudys Howard Community College
Follow You need to be logged in order to follow users or courses
Sold
New on Stuvia
Member since
1 month
Number of followers
0
Documents
191
Last sold
-
Wisdomstudys

0,0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can immediately select a different document that better matches what you need.

Pay how you prefer, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card or EFT and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions