Which scan zone SecurityCenter should use
The repository where scan data should be stored
Which targets to scan
Which plugins, or checks, to run against a target
Scan Zones in SecurityCenter provide which major benefit:
Simplify compliance scanning
Improve PVS performance
Limit network impact of active scanning
Ease of scanner administration
What are the two types of Analysis Tools in SecurityCenter?
None of these
Summary and List
Filtered and Unfiltered
Exploited and Mitigated
Which of the following can be done when using an Analysis Tool?
Create an asset list
Close a ticket
Start a scan
Save a query
To display vulnerabilities that have been discovered in the last seven days, you would choose:
Edit Filters, Date Filters, Vulnerability Discovered, More than 7 days ago
Edit Filters, Date Filters, Vulnerability Published, Within the last 7 days
Edit Filters, Date Filters, Vulnerability Discovered, Within the last 7 days
Edit Filters, Date Filters, Vulnerability Last Observed, Within the last 7 days
The ‘Remediation Summary’ analysis tool shows:
Which actions SecurityCenter will take to improve security in your environment
A summary of vulnerabilities which have already been remediated
Solutions to vulnerabilities and the percentage of risk that would be reduced for each solution applied
A list of Microsoft patches required in your environment
Dashboard Components display data visually that is defined by:
Filter or Query
Scan Policy
Report or Scan
Audit File
Active Filters can be cleared one at a time by clicking the ‘X’ for the condition, or all at once by clicking on ‘Clear’ at the top of the Active Filters list.
true
false
Clicking the ‘Analysis’ drop-down allows you to select:
The type of data to analyze
The filter types to enable
The type of event to analyze
The alerting functionality
Dashboard components display visual data that is defined by which of the following?
Filter or Query
Scan Policy
Report or Scan
Audit File
For Linux/Unix systems that will be using SSH public key authentication for credentialed scanning, what information must be included in the scan policy?
The public key
The private key and passphrase
The public key, private key, and passphrase
The passphrase
Which of the following can be done with a report in SecurityCenter?
Schedule the report