Nessus Fundamentals Exam v2
You must answer all questions to proceed with the test
2)
When installing Nessus on Microsoft Windows hosts, what also may be installed
Compliance Scan results appear on what tab in Nessus?
The Remediations tab allows the user to
In the filter, if I select "Match ALL of the following" what boolean logic is being applied?
The Contents of an audit file can be viewed:
When comparing scan results with Diff, if I set the primary results to the older scan I get
When comparing scan results with Diff, if I set the primary results to the newer scan I get
When performing a discovery scan, what tab will not appear?
TechTarget says that a vulnerablity creates:
Which of the following scan templates will not perform vulnerability analysis?
When Live results are enabled in a scan, when is the scan checked for new possible vulnerabilities
How do you configure Nessus if the host does not have Internet connectivity
A medium vulnerability has a CVSS score
When creating a Filter with the condition "Match All of the following" what does this mean?
External vulnerability assessments are
The Bell in the upper right hand Nessus window is
Tenable Virtual appliance are known by what name?
When examining the Remediations tab, what information is available?
What types of Hashes are supported when scanning Windows hosts?
Enabling UDP ping in a host discovery policy, it will:
When virtualizing Nessus, how much should you increase your CPU and RAM?
If I am looking for a specific scan I should use
If I want Nessus to update plugins and software automatically, what setting should I use under updates?
What types of scans are considered leading practices for vulnerability assessment
If I want to see when a scan started and ended, where would I look?
Vulnerability Severity is based upon
What is a possible reason for receiving some, but not all vulnerability information on a host?
In order for Nessus to send out an email with scan information once a scan has completed, what must be configured?
How much storage is required to install the Tenable Core + Nessus ISO?
Nessus is installed on a Microsoft Windows host using
What to Discovery Scan Templates allow us to do
For Credentialed scans, where would I look for specific information about what was discovered to Identify the vulnerability.
The Filter "Exploited by Nessus" will only appear in results when
Where do I create rules for plugins in an Advanced Dynamic Scan Policy?
What is a critical first step to cyber exposure
What types of ping are not used in a default discovery scan?
If I want to create a scan policy that does not use ARP ping, what scan template should I use as a baseline?
When performing a compliance scan using nessus, what must be attached to the scan policy?
Scan Templates allow us to create
Which of the following functions does Nessus not provide?
If I wanted to search on vulnerabilities where a possible compromise would be an impact on confidentiality, what could I filter on?
Which of the following are possible results when checking a specific control in a compliance benchmark
Cyber Exposure focuses on
Non Credentialed vulnerability scans identify vulnerabilities by
If I create a custom scan policy, when I create a scan, where is the new policy located?
In addition to traditional Host discovery scans, when using the host discovery template, what additional information can be gathered
To identify when last plugins are last updated, you click on
58)
Folders in Nessus allow you to