Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

ACAS - 5.3 Course Study Guide QUESTIONS WITH COMPLETE 100% VERIFIED SOLUTIONS 2024/2025, Study Guides, Projects, Research of Computer Security

ACAS - 5.3 Course Study Guide QUESTIONS WITH COMPLETE 100% VERIFIED SOLUTIONS 2024/2025

Typology: Study Guides, Projects, Research

2023/2024

Available from 06/16/2024

TheHub
TheHub 🇺🇸

3.1

(8)

2.9K documents

1 / 8

Toggle sidebar

Related documents


Partial preview of the text

Download ACAS - 5.3 Course Study Guide QUESTIONS WITH COMPLETE 100% VERIFIED SOLUTIONS 2024/2025 and more Study Guides, Projects, Research Computer Security in PDF only on Docsity! ACAS - 5.3 Course Study Guide QUESTIONS WITH COMPLETE 100% VERIFIED SOLUTIONS 2024/2025 What is ACAS? ACAS is a network-based security compliance and assessment capability designed to provide awareness of the security posture and network health of DoD networks. Which of the following best describes the SecurityCenter? The central console that provides continuous asset-based security and compliance monitoring A vulnerability is a weakness or an attack that can compromise your system. False (a vulnerability does not include an attack) The Nessus scanner monitors data at rest, while the PVS monitors data in motion. True PVS detects vulnerabilities based on network traffic instead of actively scanning hosts. True Which ACAS component performs active vulnerability and compliance scanning? Nessus CMRS is a tool to provide DoD component- and enterprise-level situational awareness by quantitatively displaying an organization's security posture. True Select the Task Order for the Implementation of Assured Compliance Assessment Solution (ACAS) for the Enterprise: 13-670 Which page loads by default when you log in to SecurityCenter? Select the best answer. Dashboard Which of the following pages show the date and time of the most recent plugin updates? Plugins, Feeds Which page allows you to set your local time zone? Profile What is an organization? A group of individuals who are responsible for a set of common assets What is a scan zone? A defined static range of IP addresses with an associated Nessus scanner(s) What is the maximum size of a SecurityCenter 5 Repository? 32 GB The IP address(es) you are scanning must be contained in both the definition of the scan zone and the definition of the repository. True What SecurityCenter role is responsible for setting up scan zones? Administrator How can you get your SecurityCenter plugin updates? Automatically, from DISA's plugin server, Manually from the DoD Patch Repository The SecurityCenter Plugins menu displays a list of script files used by Nessus and PVS scanners to collect and interpret vulnerability, compliance, and configuration data. True Which of the following are options you can consider for scanning stand-alone networks? Install both Nessus and SecurityCenter on a Linux Laptop using Kickstart, Install both Nessus and SecurityCenter in virtual machines on a Windows 7 laptop, Detach a Nessus scanner from its SecurityCenter for scanning purposes and then reattach to SecurityCenter to upload scan results Components of an Active Vulnerability Scan consist of: a policy, credentials, scan zone, schedule, _________, and __________. Repository, Target list _________ are administrative-level usernames and passwords (or SSH keypairs) used in authenticated scans? Credentials You can associate multiple credentials with a single scan. True Networks using Dynamic Host Configuration Protocol (DHCP) require that this Active Scan setting be enabled to properly track hosts. Track hosts which have been issued IP addresses Which type of scan obtains information by authenticating to the host to access resources not available over the network. Credentialed You may only select one import repository per scan. True Once a scan is running, you cannot pause or stop the scan until it has completed running. False Which Port Scanning Range option tells the scanner to scan only common ports? default (of 4605 common ports) Audit files Which of the following is not a valid SecurityCenter report type? HTML You've just added a new report using a template, which option allows you to specify an Asset (List), IP Address, and/or Repository? Focus Which report tab allows you to customize your report elements? Definition You can change the report type of an existing custom report. False Which of the following Distribution options allows you to send report results to a user in a different organization? Email Addresses You can add a dashboard from a pre-built dashboard template or create a custom dashboard. True The Dashboard Options button displays which of the following selections? Add Dashboard, Manage Dashboards, Edit Dashboard, Share Dashboard Which of the following types of information can you display on your Dashboard in SecurityCenter? Compliance data, Vulnerability data, Trends, Organizational structure What new functionality was added in SecurityCenter 5 under the Dashboard menu? Assurance Report Cards All of these are examples of Dashboard components except which one? XY Axis Graph You can only add Dashboard components for the existing queries you have set up in the Analysis menu. False You've just added a new dashboard using a template, which option allows you to specify the Asset, IP Address, and Repository? Focus Clicking the Pushpin icon next to a dashboard name on the Manage Dashboards page will do which of the following? Make the dashboard active/inactive SecurityCenter organizations are that have responsibilities for __________. groups of individuals, a set of common assets Which SecurityCenter user role resides at the top of an organization hierarchy? Security Manager Each SecurityCenter will contain only one Administrator, one Organization, and one Security Manager. False What are the options in the Scanning Distribution Method field on the Organization Setup page? Automatic Distribution Only, Locked Zone, Selectable Zones SecurityCenter supports an unlimited number of objects: Users, Scan Zones, Repositories, Organizations, and Asset Lists. False Security Managers have the ability to assign roles and responsibilities for assets for all organizations within the SecurityCenter. False Which SecurityCenter user role creates organizations? Administrator When SecurityCenter initiates a scan of a given IP address, ___________. It determines what zone the IP address is in and notifies the appropriate scanner. Which statement about Nessus scanners is NOT correct? You must have at least 2 Nessus scanners behind the firewall. SecurityCenter must be able to connect to each Nessus scanner in your network on a distinct IP address. True Which statement about Nessus scanners is correct? Select all that apply. Scan Zones are static ranges of IP addresses that can be scanned by one or more Nessus scanners., The same Nessus scanner should not be in multiple Scan Zones. You're adding a Scan Zone in order to scan a new block of IP addresses. What are the fields on the Add Scan Zone page? Name, Ranges, Scanners Which SecurityCenter user role creates Scan Zones? Administrator Repositories are proprietary data files residing on the SecurityCenter that store _______? Scan data A repository is defined by _________. IP address range, MDM data type Any user can create a new repository. False Multiple organizations can have access to the same repository. True You can use multiple repositories to: Restrict access to data based on organizational needs, Improve reporting time with smaller data sets, Separate compliance and vulnerability data, Resolve technical issues for non-standard network configurations What is the purpose of a remote repository? Replicating another SecurityCenter's repository data Which IP address(es) are acceptable when creating a repository in SecurityCenter? A single IP address, A range of IP addresses, An address CIDR block, A comma-delimited combination Local repositories can contain which of the following types of data? IP v4, IP v6, Mobile You can combine IPv4 and IPv6 data in the same repository False Roles __________. Define what a user can do (such as having full, limited, or no scanning permissions). Groups__________. Combine access rights to objects within an organization for quick assignment to one or more users. Users__________. Are individual SecurityCenter accounts. When creating a custom role, what are the Scanning Permissions that you can assign? Create scans, Create plugin scans Which of the following roles is NOT a predefined SecurityCenter role? Information Assurance Manager Which of the following groups is defined for each organization by default? Full Access When you create a group, select all of the objects that you could share to the group. Assets, Assurance Report Cards, Credentials You are adding a new user. Which of the following access settings apply to that user definition? Asset Responsibility, Role, Group, Manage Objects Where do you grant the ability to manage other users and their objects? In the Users > User Definition Which of the following are available through SecurityCenter's Workflow functionality? Alerts and tickets You can configure SecurityCenter to perform alerts based on the following condition types: ___________, ____________, or ____________ . Vulnerability, Event, Ticket Occurrences