ACAS Review Questions Latest Update - 10 Questions and 100% Verified Correct Answers Guaranteed A+
A - CORRECT ANSWER: The trigger options for setting a SecurityCenter alert are IP count, Vulnerability/Event count, and _____ count. Select the best answer to complete the statement.
- Port
- Device
- Ticket
- Scan
**** Module 3-7 ****
A - CORRECT ANSWER: What is ACAS? Select the best answer.
- ACAS is a network-based security compliance and assessment capability designed
to provide awareness of the security posture and network health of DoD networks.
- ACAS is a system that ensures security for the DoD networks.
- ACAS is a system that monitors and corrects vulnerabilities to provide security for the
DoD networks.
- All of the above
**** Module 1-1 ****
A - CORRECT ANSWER: What is the function of Performance Options in the Scan
Policy? Select the best answer.
- Determines the impact of a scan related to scan times and network behavior
- Determines how a scan will behave
- Describes how a scan will be shared across organizations
- Sets the port range of a scan 1 / 4
**** Module 1-4 ****
A - CORRECT ANSWER: What SecurityCenter role is responsible for setting up scan
zones? Select the best answer.
- Administrator
- Manager
- Security Manager
- End User
**** Module 1-3 ****
A - CORRECT ANSWER: What two ways can you use to add a dynamic asset list?
Select the best answer.
- Use a template or create a set of rules
- Use a scan policy or a template
- Create a set of rules or a scan policy
- All of the above
**** Module 1-5 ****
A - CORRECT ANSWER: Which of the following statements is true? Select the best
answer.
- PVS is capable of highlighting all interactive and encrypted network sessions.
- PVS is capable of decrypting encrypted network sessions.
**** Module 2-2 ****
A - CORRECT ANSWER: Which page loads by default when you log in to
SecurityCenter? Select the best answer. Select the best answer.
- Dashboard 2 / 4
- Analysis
- Reporting
- Scanning
**** Module 1-2 ****
A - CORRECT ANSWER: Which type of scan obtains information by authenticating to
the host to access resources not available over the network. Select the best answer.
- Credentialed
- Uncredentialed
**** Module 1-4 ****
A - CORRECT ANSWER: Which vulnerability severity level indicates a failed
compliance item? Select the best answer.
- High
- Low
- Medium
- None of the above
**** Module 2-3 ****
A, B - CORRECT ANSWER: How can you get your SecurityCenter plugin updates?
Select all that apply.
- Automatically, from DISA's plugin server
- Manually from the DoD Patch Repository
- Download a copy from the vendor
**** Module 1-3 ****
- / 4
A, B - CORRECT ANSWER: When creating a custom role, what are the Scanning
Permissions that you can assign? Select all that apply.
- Create scans
- Create plugin scans
- Create passive scans
**** Module 3-6 ****
A, B, C - CORRECT ANSWER: What are the options in the Scanning Distribution
Method field on the Organization Setup page? Select all of the correct answers.
- Automatic Distribution Only
- Locked Zone
- Selectable Zones
- Optional Scan Zone
**** Module 3-3 ****
A, B, C - CORRECT ANSWER: When you create a group, select all of the objects that you could share to the group.
- Assets
- Assurance Report Cards
- Credentials
- Other User accounts
**** Module 3-6 ****
A, B, C - CORRECT ANSWER: Which of the following are options you can consider for scanning stand-alone networks? Select all that apply.
- Install both Nessus and SecurityCenter on a Linux Laptop using Kickstart
- Install both Nessus and SecurityCenter in virtual machines on a Windows 7 laptop
- / 4