VMO MQF Questions Flashcards
MR status
What is a group of users responsible for specific set of hosts?
a. Organization
b. Plugin
c. Repository
d. Scan Zone
A. Organization
A scan zone __________.
a. Maintains a database of vulnerability data defined by assets or IP addresses
b. Associates an IP address or range of IP addresses with one or more scanners
c. Groups users who are responsible for a specific set of hosts
d. Runs a script file used to collect and interpret vulnerability, compliance, and configuration data
b. Associates an IP address or range of IP addresses with one or more scanners
What contains vulnerability information, a simplified set of remediation actions and the algorithm to test for the presence of the security issue?
a. Audit File
b. Organization
c. Plugin
d. Vulnerability Index
C. Plugin
Which of the following is NOT a Security Center severity code?
a. Critical
b. Info
c. Low
d. Severe
D. Severe
What component of ACAS performs evaluates processes running on the host or probes the host’s network services?
a. Nessus scanners
b. Plugins
c. Passive Vulnerability Scanners (PVS)
d. SecurityCenters
A. Nessus Scanners
What is the weight of a CAT II vulnerability?
C. 4
What is the weight for a CAT I vulnerability?
a. 0
b. 1
c. 4
d. 10
D. 10
Which role enables personnel to only create vulnerability reports within the repositories of the base with least privilege?
a. Administrator
b. Security Manager
c. Scanning Technician
d. Read-Only
D. Read-only
Which Security Center role has the ability to launch scans, configure users, vulnerability policies, and other objects belonging to their organization?
a. Administrator
b. Executive
c. Scanning Technician
d. Security Manager
D. Security Manager
Within the Targets section of Active Scan settings, which IP addresses can be scanned?
a. Both IPv6 and IPv4 addresses simultaneously.
b. Either IPv6 or IPv4 addresses.
c. Only IPv6 addresses.
d. Only IPv4 addresses.
B. Either IPv6 or IPv4 addresses.
How often should the Security Center automatically update plugins?
a. Daily
b. Weekly
c. Bi-weekly
d. Monthly
A. daily
Which scan type is used to identify online endpoints at a given period?
a. Targeted
b. Compliance
c. Discovery
d. Vulnerability
C. Discovery
_____ scans are specialized scans performed in response to a newly identified threat or to validate compliance with an order.
a. Vulnerability
b. Compliance
c. Discovery
d. Targeted
D. Targeted
Which type of scan determines all vulnerabilities found on live hosts within a network enclave?
a. Discovery
b. Vulnerability
c. Compliance
d. Targeted
B. Vulnerability
What determines what a user can or cannot access from their ACAS account?
a. Authorizations
b. Permissions
c. Credentials
d. Roles
D. Roles
What role is responsible for configuration tasks such as defining organizations, repositories, and Nessus scanners?
a. Administrator
b. Auditor
c. Credential manager
d. Security manager
A. Administrator
When viewing plugin details, which of the following can be observed?
a. The CVE and the BID.
b. The BID only.
c. The CVE only.
d. Neither the CVE nor BID.
a. The CVE and the BID.
Which type of asset list are flexible groups of condition statements that refresh using the results from scans?
a. MAC Address
b. DNS Name
c. Dynamic
d. Static
c. Dynamic
Which formula is used to determine the failed access rate for a completed scan?
a. Good/Bad
b. Good/(Good+Bad)
c. Bad/Good
d. Bad/(Good+Bad)
d. Bad/(Good+Bad)
Plugins for SecurityCenter can be downloaded automatically or downloaded manually from ___________.
a. AFCEDs
b. Air Force Portal
c. DoD Patch Repository
d. Nessus Patch Repository
c. DoD Patch Repository
Which type of scan should not use a dynamic asset list?
a. Discovery
b. Vulnerability
c. Compliance
d. Targeted
A. Discovery
Do NOT scan more than hosts in a single targeted scan.
a. 2,500
b. 5,000
c. 7,500
d. 10,000
A. 2,500
What contains additional settings for active scans including plugin settings and advanced directives?
a. Asset List
b. Repository
c. Scan Policy
d. Scan Zone
C. Scan Policy
What is a database within Tenable.sc that contains vulnerability data?
a. Asset List
b. Organization
c. Repository
d. Scan Zone
c. Repository
What should the max scan duration be set to?
a. 24 Hours
b. 12 Hours
c. 40 Hours
d. 20 Hours
D. 20 Hours
Which executable installs the Configuration Manager client?
a. CCMSetup.exe
b. CCMInstallClient.exe
c. RunCCM.exe
d. SetupCCM.exe
A. a. CCMSetup.exe
_____ is a site system role that contains source files for clients to download.
a. Distribution Point
b. Management Point
c. SMS Provider
d. Software Update Point
A. Distribution Point
_____ is a site system role that provides policy and service location information to clients and receives configuration data from clients.
a. Distribution Point
b. Management Point
c. SMS Provider
d. Software Update Point
b. Management Point