VMO MQF Questions Flashcards

MR status (70 cards)

1
Q

What is a group of users responsible for specific set of hosts?

a. Organization
b. Plugin
c. Repository
d. Scan Zone

A

A. Organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A scan zone __________.

a. Maintains a database of vulnerability data defined by assets or IP addresses
b. Associates an IP address or range of IP addresses with one or more scanners
c. Groups users who are responsible for a specific set of hosts
d. Runs a script file used to collect and interpret vulnerability, compliance, and configuration data

A

b. Associates an IP address or range of IP addresses with one or more scanners

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What contains vulnerability information, a simplified set of remediation actions and the algorithm to test for the presence of the security issue?

a. Audit File
b. Organization
c. Plugin
d. Vulnerability Index

A

C. Plugin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following is NOT a Security Center severity code?

a. Critical
b. Info
c. Low
d. Severe

A

D. Severe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What component of ACAS performs evaluates processes running on the host or probes the host’s network services?

a. Nessus scanners
b. Plugins
c. Passive Vulnerability Scanners (PVS)
d. SecurityCenters

A

A. Nessus Scanners

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the weight of a CAT II vulnerability?

A

C. 4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the weight for a CAT I vulnerability?
a. 0
b. 1
c. 4
d. 10

A

D. 10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which role enables personnel to only create vulnerability reports within the repositories of the base with least privilege?

a. Administrator
b. Security Manager
c. Scanning Technician
d. Read-Only

A

D. Read-only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which Security Center role has the ability to launch scans, configure users, vulnerability policies, and other objects belonging to their organization?

a. Administrator
b. Executive
c. Scanning Technician
d. Security Manager

A

D. Security Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Within the Targets section of Active Scan settings, which IP addresses can be scanned?

a. Both IPv6 and IPv4 addresses simultaneously.
b. Either IPv6 or IPv4 addresses.
c. Only IPv6 addresses.
d. Only IPv4 addresses.

A

B. Either IPv6 or IPv4 addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How often should the Security Center automatically update plugins?

a. Daily
b. Weekly
c. Bi-weekly
d. Monthly

A

A. daily

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which scan type is used to identify online endpoints at a given period?

a. Targeted
b. Compliance
c. Discovery
d. Vulnerability

A

C. Discovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

_____ scans are specialized scans performed in response to a newly identified threat or to validate compliance with an order.

a. Vulnerability
b. Compliance
c. Discovery
d. Targeted

A

D. Targeted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which type of scan determines all vulnerabilities found on live hosts within a network enclave?

a. Discovery
b. Vulnerability
c. Compliance
d. Targeted

A

B. Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What determines what a user can or cannot access from their ACAS account?

a. Authorizations
b. Permissions
c. Credentials
d. Roles

A

D. Roles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What role is responsible for configuration tasks such as defining organizations, repositories, and Nessus scanners?

a. Administrator
b. Auditor
c. Credential manager
d. Security manager

A

A. Administrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

When viewing plugin details, which of the following can be observed?

a. The CVE and the BID.
b. The BID only.
c. The CVE only.
d. Neither the CVE nor BID.

A

a. The CVE and the BID.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which type of asset list are flexible groups of condition statements that refresh using the results from scans?

a. MAC Address
b. DNS Name
c. Dynamic
d. Static

A

c. Dynamic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which formula is used to determine the failed access rate for a completed scan?

a. Good/Bad
b. Good/(Good+Bad)
c. Bad/Good
d. Bad/(Good+Bad)

A

d. Bad/(Good+Bad)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Plugins for SecurityCenter can be downloaded automatically or downloaded manually from ___________.

a. AFCEDs
b. Air Force Portal
c. DoD Patch Repository
d. Nessus Patch Repository

A

c. DoD Patch Repository

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which type of scan should not use a dynamic asset list?

a. Discovery
b. Vulnerability
c. Compliance
d. Targeted

A

A. Discovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Do NOT scan more than hosts in a single targeted scan.

a. 2,500
b. 5,000
c. 7,500
d. 10,000

A

A. 2,500

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What contains additional settings for active scans including plugin settings and advanced directives?

a. Asset List
b. Repository
c. Scan Policy
d. Scan Zone

A

C. Scan Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is a database within Tenable.sc that contains vulnerability data?

a. Asset List
b. Organization
c. Repository
d. Scan Zone

A

c. Repository

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What should the max scan duration be set to? a. 24 Hours b. 12 Hours c. 40 Hours d. 20 Hours
D. 20 Hours
26
Which executable installs the Configuration Manager client? a. CCMSetup.exe b. CCMInstallClient.exe c. RunCCM.exe d. SetupCCM.exe
A. a. CCMSetup.exe
27
_____ is a site system role that contains source files for clients to download. a. Distribution Point b. Management Point c. SMS Provider d. Software Update Point
A. Distribution Point
28
_____ is a site system role that provides policy and service location information to clients and receives configuration data from clients. a. Distribution Point b. Management Point c. SMS Provider d. Software Update Point
b. Management Point
29
_____ helps monitor client installation and identifies clients that are unmanaged because they can't communicate with their management point. a. Distribution Point b. Fallback Status Point c. SMS Provider d. Software Update Point
b. Fallback Status Point
30
The _____ is the interface between a Configuration Manager console and the site database. a. Client Management Point b. Management Point c. SMS Provider d. Software Update Point
c. SMS Provider
31
_____ is a site system role that integrates with Windows Server Update Services (WSUS) to provide software updates to Configuration Manager clients. a. Client Management Point b. Management Point c. SMS Provider d. Software Update Point
software update point.
32
Which of the following is considered a membership rule for device collections? a. Direct b. Reporting c. Monitoring d. Windows
A. Direct
33
In the MECM console, device collections are located in the __________ directory. a. Administration b. Assets and Compliance c. Monitoring d. Software Library
b. Assets and Compliance
34
In the MECM console, Software Updates are located in the __________ directory. a. Administration b. Assets and Compliance c. Monitoring d. Software Library
d. Software Library
35
In the MECM console, Reports are located in the __________ directory. a. Administration b. Assets and Compliance c. Monitoring d. Software Library
c. Monitoring
36
In the MECM console, Site Configuration is located in the __________ directory. a. Administration b. Assets and Compliance c. Monitoring d. Software Library
a. Administration
37
Which type of MECM site sits locally at each base? a. Remote Distribution Point b. Central Administration Site c. Primary Site d. Secondary Site
c. Primary Site
38
Where is the Central Administration server physically located? a. Scott APC b. Wright Patterson APC c. Peterson RDC d. Joint Base Pearl Harbor Hickam
b. Wright Patterson APC
39
Within the Client Configuration Manager Properties which action would you initiate to retrieve the most up-to date client policy? a. Software Inventory Cycle b. User Policy Retrieval & Evaluation Cycle c. Machine Policy Retrieval & Evaluation Cycle d. Application Deployment Evaluation Cycle
c. Machine Policy Retrieval & Evaluation Cycle
40
Where could a user go to install software that was deployed via MECM? a. Distribution Point b. Security Center c. Software Center d. Software Update Point
b. Security Center
41
41. Where is the client log file CCMEval.log located on the machine? a. /var/log b. D:\ c. C:\Windows\CCM\Logs d. C:\Windows\ccmsetup
c. C:\Windows\CCM\Logs
42
CMTrace.exe is located in what Windows client folder location? a.C:\Windows\SysWOW64\CCM\Trace\CMTrace.exe b.C:\Windows\RemotePackages\CMTrace.exe c. C:\Windows\ccmsetup\CMTrace.exe d. C:\Windows\CCM\CMTrace.exe
d. C:\Windows\CCM\CMTrace.exe
43
MECM uses groups of users or devices called ___________. a. Collections b. Asset Lists c. Libraries d. Logs
a. Collections
44
44. There are 4 Primary Site Suites located at Wright Patterson APC and 4 Primary Site Suites located at _______________. a. Peterson RDC b. Scott APC c. Joint Base Langley-Eustis d. Joint Base Pearl Harbor Hickam
b. Scott APC
45
What would you use to filter a new collection to only show results from a single base? a. Management Point b. Machine Policy Update c. Limiting Collection d. CM Trace
c. Limiting Collection
46
A(n) _____ rule’s membership doesn’t change unless a resource is removed from Configuration Manager and require more administrative overhead than query rule collections because they require manual changes. a. Exclude Collection b. Include Collection c. Direct d. Static
c. Direct
47
A(n) _____ rule’s membership will dynamically update the membership of a collection which runs on a schedule. a. Dynamic b. Query c. Direct d. Static
b. Query
48
Which website hosts SDC (Standard Desktop Configurations) for approved Department of Defense software products? a. https://www.my.af.mil b. https://ceds.gunter.af.mil c. https://gunter.sdc.af.mil d. http://gunter.ceds.af.mil
b. https://ceds.gunter.af.mil
49
In regards to content distribution, which component transfers the package to the distribution point? a. Despooler b. Data Transfer Service c. File Transfer Service d. Package Transfer Manager
d. Package Transfer Manager
50
Which component of CcmExec is responsible for downloading files via BITS? a. Despooler b. Data Transfer Service c. File Transfer Service d. Package Transfer Manager
b. Data Transfer Service
51
Which component of the Software Update Scan checks the registry to ensure Group Policy does NOT override the update server? a. Scan Agent b. WSUS Server c. WUAHandler d. Location Services
c. WUAHandler
52
______ is a container that stores specific information. a. Configuration Item b. Detection Item c. Setting d. Compliance Rules
a. Configuration Item
53
_____ detects whether an application is installed and uses the windows installer file for the application or by custom script. a. Configuration Item b. Detection Item c. Setting d. Compliance Rules
b. Detection Item
54
What specifies the condition that defines the compliance of a configuration item setting? a. Configuration Item b. Detection Item c. Setting d. Compliance Rules
d. Compliance Rules
55
Configuration baselines are used to monitor and remediate _____ a. Non-software Items b. Registry Keys c. Outdated Protocols d. All the Above
d. All the Above
56
Which of the following is NOT an example of a software requested through a change request? a. Wickr b. TIMS c. GTIMS d. Wireshark
d. Wireshark
57
57. When AFECMO releases an application, what is the default content location within the imported application? a. AFECMO Lab Environment b. C:\ c. ZHTX-EM-101P d. ZHTX-EM-101P\Packages
a. AFECMO Lab Environment
58
Which of the following is NOT a default way that MECM can detect an application? a. Registry b. File System c. Product Version d. Windows Installer
c. Product Version
59
Which of the following detection methods within MECM looks for uninstall strings associated with applications? a. Registry b. File System c. Product Version d. Windows Installer
a. Registry
60
When an application is deployed to a device, what decides what deployment type is used? a. Content Source b. Detection Method c. Product Version d. Requirement
d. Requirement
61
61. Which determines how an application is installed? a. Deployment Type b. Detection Method c. Collection d. Requirement
b. Detection Method
62
62. By default VMOs hide the installation and do NOT give users the ability to postpone installation. The ability to postpone an installation is a part of which component? a. Compliance Item b. Detection Method c. Requirement d. User Experience
d. User Experience
63
63. Which MECM client push method requires the computer to be discovered before a MECM client is installed? a. Client Push Installation b. Software Update Point Based Installation c. Group Policy d. Logon Script
a. Client Push Installation
64
Which client installation method supports using command-line properties for CCMSetup to install? a. Client Push Installation b. Software Update Point Based Installation c. Group Policy d. Logon Script
d. Logon Script
65
65. Which of the following is NOT downloaded from the distribution point? a. Application Content b. Software Packages c. Software Updates d. Policy
d. Policy
66
66. What is the first thing a client does during a software update deployment? a. Scan Agent request gets created b. Set the WSUS Server c. Scan Agent sends a WSUS Location Request d. Location Services sends its location to the Scan Agent
b. Set the WSUS Server
67
Which of the following is NOT an example of a requirement? a. Operator exists b. Application exists c. Active Directory site d. Operating System
a. Operator exists
68
Which of the following log files applies to updates that are for windows OS? a. CAS.log b. ContentTransferManager.log c. CBS.log d. DataTransferService.log
c. CBS.log
69
Which log file would you review if you are troubleshooting unexpected reboots or updates installed outside of a maintenance window? a. CAS.log b. ContentTransferManager.log c. CBS.log d. DataTransferService.log
d. DataTransferService.log
70
Which log files are associated with detection methods? a. CAS.log & CCMEval.log b. CcmMessaging.log & CCMEval.log c. AppDetection.log & Detect.log d. Appenforce.log & Appdiscovery.log
d. Appenforce.log & Appdiscovery.log