Tenable Security Center Question Bank 500 Final
Tenable Security Center Question Bank 500 Final
1. True or False: Tenable Security Center provides automatic risk recasting based on user-
defined rules.
Answer: True
2. True or False: Tenable Security Center consolidates vulnerability data from across the IT
infrastructure.
Answer: True
A. IP-based
B. UUID-based
C. Domain-based
D. All of the above
Answer: D
A. PDF
B. CSV
C. JSON
D. DOCX
Answer: D
Answer: True
A. OAuth
B. API Key
C. Kerberos
D. None
Answer: B
7. True or False: SELinux must be disabled before installing Tenable Security Center.
Answer: False
8. True or False: User roles determine access to scans, reports, and asset data.
Answer: True
9. True or False: Active scans require authentication credentials for in-depth analysis.
Answer: True
A. PCI DSS
B. HIPAA
C. ISO 9001
D. NIST 800-53
Answer: C
11. True or False: Attack Path Analysis helps visualize exploitable attack chains.
Answer: True
A. Email notification
B. Scan launch
C. Ticket creation
D. All of the above
Answer: D
A. LDAP
B. SAML
C. OAuth
D. SSL Certificates
Answer: C
A. /var/log
B. /opt/sc/admin/logs/
C. /etc/tenable/logs
D. /usr/logs
Answer: B
15. True or False: API keys must be manually refreshed every 30 days.
Answer: False
16. True or False: Alerts can be configured based on vulnerability severity levels.
Answer: True
17. What log source can be integrated into Tenable Security Center for event analysis?
A. Syslog
B. Firewall Logs
C. IDS/IPS Events
D. All of the above
Answer: D
Answer: A
19. True or False: Tenable Security Center supports external PostgreSQL databases.
Answer: True
20. Which file is modified to change Tenable Security Center's Apache settings?
A. /opt/sc/apache.conf
B. /etc/httpd.conf
C. /opt/sc/support/conf/mpm.conf
D. /var/log/apache2.conf
Answer: C
Answer: True
Answer: True
A. Configuration-only
B. Full backup
C. Both A and B
D. None
Answer: C
24. True or False: Tickets are automatically closed when a vulnerability is remediated.
Answer: False
A. Windows
B. Linux
C. macOS
D. Unix
Answer: B
A. Network Monitoring
B. Vulnerability Management
C. Web Hosting
D. Data Encryption
Answer: B
27. What scoring system does Tenable Security Center use to prioritize vulnerabilities?
A. CVSS
B. VPR
C. Both A and B
D. None of the above
Answer: C
28. True or False: Tenable Security Center provides real-time event correlation.
Answer: True
29. True or False: Debug logs can be enabled to troubleshoot scan failures.
Answer: True
Answer: True
A. Accept risk
B. Recast risk
C. Both A and B
D. None
Answer: C
32. What type of scan provides the most comprehensive vulnerability analysis?
A. Credentialed Scan
B. Discovery Scan
C. External Scan
D. Non-Credentialed Scan
Answer: A