VMO MQF Questions Flashcards

MR status

1
Q

What is a group of users responsible for specific set of hosts?

a. Organization
b. Plugin
c. Repository
d. Scan Zone

A

A. Organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A scan zone __________.

a. Maintains a database of vulnerability data defined by assets or IP addresses
b. Associates an IP address or range of IP addresses with one or more scanners
c. Groups users who are responsible for a specific set of hosts
d. Runs a script file used to collect and interpret vulnerability, compliance, and configuration data

A

b. Associates an IP address or range of IP addresses with one or more scanners

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What contains vulnerability information, a simplified set of remediation actions and the algorithm to test for the presence of the security issue?

a. Audit File
b. Organization
c. Plugin
d. Vulnerability Index

A

C. Plugin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following is NOT a Security Center severity code?

a. Critical
b. Info
c. Low
d. Severe

A

D. Severe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What component of ACAS performs evaluates processes running on the host or probes the host’s network services?

a. Nessus scanners
b. Plugins
c. Passive Vulnerability Scanners (PVS)
d. SecurityCenters

A

A. Nessus Scanners

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the weight of a CAT II vulnerability?

A

C. 4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the weight for a CAT I vulnerability?
a. 0
b. 1
c. 4
d. 10

A

D. 10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which role enables personnel to only create vulnerability reports within the repositories of the base with least privilege?

a. Administrator
b. Security Manager
c. Scanning Technician
d. Read-Only

A

D. Read-only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which Security Center role has the ability to launch scans, configure users, vulnerability policies, and other objects belonging to their organization?

a. Administrator
b. Executive
c. Scanning Technician
d. Security Manager

A

D. Security Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Within the Targets section of Active Scan settings, which IP addresses can be scanned?

a. Both IPv6 and IPv4 addresses simultaneously.
b. Either IPv6 or IPv4 addresses.
c. Only IPv6 addresses.
d. Only IPv4 addresses.

A

B. Either IPv6 or IPv4 addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How often should the Security Center automatically update plugins?

a. Daily
b. Weekly
c. Bi-weekly
d. Monthly

A

A. daily

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which scan type is used to identify online endpoints at a given period?

a. Targeted
b. Compliance
c. Discovery
d. Vulnerability

A

C. Discovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

_____ scans are specialized scans performed in response to a newly identified threat or to validate compliance with an order.

a. Vulnerability
b. Compliance
c. Discovery
d. Targeted

A

D. Targeted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which type of scan determines all vulnerabilities found on live hosts within a network enclave?

a. Discovery
b. Vulnerability
c. Compliance
d. Targeted

A

B. Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What determines what a user can or cannot access from their ACAS account?

a. Authorizations
b. Permissions
c. Credentials
d. Roles

A

D. Roles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What role is responsible for configuration tasks such as defining organizations, repositories, and Nessus scanners?

a. Administrator
b. Auditor
c. Credential manager
d. Security manager

A

A. Administrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

When viewing plugin details, which of the following can be observed?

a. The CVE and the BID.
b. The BID only.
c. The CVE only.
d. Neither the CVE nor BID.

A

a. The CVE and the BID.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which type of asset list are flexible groups of condition statements that refresh using the results from scans?

a. MAC Address
b. DNS Name
c. Dynamic
d. Static

A

c. Dynamic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which formula is used to determine the failed access rate for a completed scan?

a. Good/Bad
b. Good/(Good+Bad)
c. Bad/Good
d. Bad/(Good+Bad)

A

d. Bad/(Good+Bad)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Plugins for SecurityCenter can be downloaded automatically or downloaded manually from ___________.

a. AFCEDs
b. Air Force Portal
c. DoD Patch Repository
d. Nessus Patch Repository

A

c. DoD Patch Repository

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which type of scan should not use a dynamic asset list?

a. Discovery
b. Vulnerability
c. Compliance
d. Targeted

A

A. Discovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Do NOT scan more than hosts in a single targeted scan.

a. 2,500
b. 5,000
c. 7,500
d. 10,000

A

A. 2,500

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What contains additional settings for active scans including plugin settings and advanced directives?

a. Asset List
b. Repository
c. Scan Policy
d. Scan Zone

A

C. Scan Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is a database within Tenable.sc that contains vulnerability data?

a. Asset List
b. Organization
c. Repository
d. Scan Zone

A

c. Repository

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What should the max scan duration be set to?

a. 24 Hours
b. 12 Hours
c. 40 Hours
d. 20 Hours

A

D. 20 Hours

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Which executable installs the Configuration Manager client?

a. CCMSetup.exe
b. CCMInstallClient.exe
c. RunCCM.exe
d. SetupCCM.exe

A

A. a. CCMSetup.exe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

_____ is a site system role that contains source files for clients to download.

a. Distribution Point
b. Management Point
c. SMS Provider
d. Software Update Point

A

A. Distribution Point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

_____ is a site system role that provides policy and service location information to clients and receives configuration data from clients.

a. Distribution Point
b. Management Point
c. SMS Provider
d. Software Update Point

A

b. Management Point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

_____ helps monitor client installation and identifies clients that are unmanaged because they can’t communicate with their management point.

a. Distribution Point
b. Fallback Status Point
c. SMS Provider
d. Software Update Point

A

b. Fallback Status Point

30
Q

The _____ is the interface between a Configuration Manager console and the site database.

a. Client Management Point
b. Management Point
c. SMS Provider
d. Software Update Point

A

c. SMS Provider

31
Q

_____ is a site system role that integrates with Windows Server Update Services (WSUS) to provide software updates to Configuration Manager clients.

a. Client Management Point
b. Management Point
c. SMS Provider
d. Software Update Point

A

software update point.

32
Q

Which of the following is considered a membership rule for device collections?

a. Direct
b. Reporting
c. Monitoring
d. Windows

A

A. Direct

33
Q

In the MECM console, device collections are located in the __________ directory.

a. Administration
b. Assets and Compliance
c. Monitoring
d. Software Library

A

b. Assets and Compliance

34
Q

In the MECM console, Software Updates are located in the __________ directory.

a. Administration
b. Assets and Compliance
c. Monitoring
d. Software Library

A

d. Software Library

35
Q

In the MECM console, Reports are located in the __________ directory.

a. Administration
b. Assets and Compliance
c. Monitoring
d. Software Library

A

c. Monitoring

36
Q

In the MECM console, Site Configuration is located in the __________ directory.

a. Administration
b. Assets and Compliance
c. Monitoring
d. Software Library

A

a. Administration

37
Q

Which type of MECM site sits locally at each base?

a. Remote Distribution Point
b. Central Administration Site
c. Primary Site
d. Secondary Site

A

c. Primary Site

38
Q

Where is the Central Administration server physically located?

a. Scott APC
b. Wright Patterson APC
c. Peterson RDC
d. Joint Base Pearl Harbor Hickam

A

b. Wright Patterson APC

39
Q

Within the Client Configuration Manager Properties which action would you initiate to retrieve the most up-to date client policy?

a. Software Inventory Cycle
b. User Policy Retrieval & Evaluation Cycle
c. Machine Policy Retrieval & Evaluation Cycle
d. Application Deployment Evaluation Cycle

A

c. Machine Policy Retrieval & Evaluation Cycle

40
Q

Where could a user go to install software that was deployed via MECM?

a. Distribution Point
b. Security Center
c. Software Center
d. Software Update Point

A

b. Security Center

41
Q
  1. Where is the client log file CCMEval.log located on the machine?

a. /var/log
b. D:\
c. C:\Windows\CCM\Logs
d. C:\Windows\ccmsetup

A

c. C:\Windows\CCM\Logs

42
Q

CMTrace.exe is located in what Windows client folder location?

a.C:\Windows\SysWOW64\CCM\Trace\CMTrace.exe
b.C:\Windows\RemotePackages\CMTrace.exe
c. C:\Windows\ccmsetup\CMTrace.exe
d. C:\Windows\CCM\CMTrace.exe

A

d. C:\Windows\CCM\CMTrace.exe

43
Q

MECM uses groups of users or devices called ___________.

a. Collections
b. Asset Lists
c. Libraries
d. Logs

A

a. Collections

44
Q
  1. There are 4 Primary Site Suites located at Wright Patterson APC and 4 Primary Site Suites located at _______________.

a. Peterson RDC
b. Scott APC
c. Joint Base Langley-Eustis
d. Joint Base Pearl Harbor Hickam

A

b. Scott APC

45
Q

What would you use to filter a new collection to only show results from a single base?

a. Management Point
b. Machine Policy Update
c. Limiting Collection
d. CM Trace

A

c. Limiting Collection

46
Q

A(n) _____ rule’s membership doesn’t change unless a resource is removed from Configuration Manager and require more administrative overhead than query rule collections because they require manual changes.

a. Exclude Collection
b. Include Collection
c. Direct
d. Static

A

c. Direct

47
Q

A(n) _____ rule’s membership will dynamically update the membership of a collection which runs on a schedule.

a. Dynamic
b. Query
c. Direct
d. Static

A

b. Query

48
Q

Which website hosts SDC (Standard Desktop Configurations) for approved Department of Defense software products?

a. https://www.my.af.mil
b. https://ceds.gunter.af.mil
c. https://gunter.sdc.af.mil
d. http://gunter.ceds.af.mil

A

b. https://ceds.gunter.af.mil

49
Q

In regards to content distribution, which component transfers the package to the distribution point?

a. Despooler
b. Data Transfer Service
c. File Transfer Service
d. Package Transfer Manager

A

d. Package Transfer Manager

50
Q

Which component of CcmExec is responsible for downloading files via BITS?

a. Despooler
b. Data Transfer Service
c. File Transfer Service
d. Package Transfer Manager

A

b. Data Transfer Service

51
Q

Which component of the Software Update Scan checks the registry to ensure Group Policy does NOT override the update server?

a. Scan Agent
b. WSUS Server
c. WUAHandler
d. Location Services

A

c. WUAHandler

52
Q

______ is a container that stores specific information.

a. Configuration Item
b. Detection Item
c. Setting
d. Compliance Rules

A

a. Configuration Item

53
Q

_____ detects whether an application is installed and uses the windows installer file for the application or by custom script.

a. Configuration Item
b. Detection Item
c. Setting
d. Compliance Rules

A

b. Detection Item

54
Q

What specifies the condition that defines the compliance of a configuration item setting?

a. Configuration Item
b. Detection Item
c. Setting
d. Compliance Rules

A

d. Compliance Rules

55
Q

Configuration baselines are used to monitor and remediate _____

a. Non-software Items
b. Registry Keys
c. Outdated Protocols
d. All the Above

A

d. All the Above

56
Q

Which of the following is NOT an example of a software requested through a change request?

a. Wickr
b. TIMS
c. GTIMS
d. Wireshark

A

d. Wireshark

57
Q
  1. When AFECMO releases an application, what is the default content location within the imported application?

a. AFECMO Lab Environment
b. C:\
c. ZHTX-EM-101P
d. ZHTX-EM-101P\Packages

A

a. AFECMO Lab Environment

58
Q

Which of the following is NOT a default way that MECM can detect an application?

a. Registry
b. File System
c. Product Version
d. Windows Installer

A

c. Product Version

59
Q

Which of the following detection methods within MECM looks for uninstall strings associated with applications?

a. Registry
b. File System
c. Product Version
d. Windows Installer

A

a. Registry

60
Q

When an application is deployed to a device, what decides what deployment type is used?

a. Content Source
b. Detection Method
c. Product Version
d. Requirement

A

d. Requirement

61
Q
  1. Which determines how an application is installed?

a. Deployment Type
b. Detection Method
c. Collection
d. Requirement

A

b. Detection Method

62
Q
  1. By default VMOs hide the installation and do NOT give users the ability to postpone installation. The ability to postpone an installation is a part of which component?

a. Compliance Item
b. Detection Method
c. Requirement
d. User Experience

A

d. User Experience

63
Q
  1. Which MECM client push method requires the computer to be discovered before a MECM client is installed?

a. Client Push Installation
b. Software Update Point Based Installation
c. Group Policy
d. Logon Script

A

a. Client Push Installation

64
Q

Which client installation method supports using command-line properties for CCMSetup to install?

a. Client Push Installation
b. Software Update Point Based Installation
c. Group Policy
d. Logon Script

A

d. Logon Script

65
Q
  1. Which of the following is NOT downloaded from the distribution point?

a. Application Content
b. Software Packages
c. Software Updates
d. Policy

A

d. Policy

66
Q
  1. What is the first thing a client does during a software update deployment?

a. Scan Agent request gets created
b. Set the WSUS Server
c. Scan Agent sends a WSUS Location Request
d. Location Services sends its location to the Scan Agent

A

b. Set the WSUS Server

67
Q

Which of the following is NOT an example of a requirement?

a. Operator exists
b. Application exists
c. Active Directory site
d. Operating System

A

a. Operator exists

68
Q

Which of the following log files applies to updates that are for windows OS?

a. CAS.log
b. ContentTransferManager.log
c. CBS.log
d. DataTransferService.log

A

c. CBS.log

69
Q

Which log file would you review if you are troubleshooting unexpected reboots or updates installed outside of a maintenance window?

a. CAS.log
b. ContentTransferManager.log
c. CBS.log
d. DataTransferService.log

A

d. DataTransferService.log

70
Q

Which log files are associated with detection methods?

a. CAS.log & CCMEval.log
b. CcmMessaging.log & CCMEval.log
c. AppDetection.log & Detect.log
d. Appenforce.log & Appdiscovery.log

A

d. Appenforce.log & Appdiscovery.log