Computer Science > QUESTIONS & ANSWERS > Qualys Vulnerability Management v1 Questions and Answers 100% Pass (All)

Qualys Vulnerability Management v1 Questions and Answers 100% Pass

Document Content and Description Below

Qualys Vulnerability Management v1 Questions and Answers 100% Pass Which of the following are benefits of scanning in authenticated mode? (choose 2) - Fewer confirmed vulnerabilities - More vulner... abilities are detected - Time saved from manually investigating potential vulnerabilities - More accurate scan details ✔✔- More vulnerabilities are detected - Time saved from manually investigating potential vulnerabilities Which of the following are valid options for scanning targets? (choose 3). - Asset Groups - Domain Name - IP addressing - Asset Tags - Search Lists - MAC Address ✔✔- Asset Group - IP Addressing - Asset Tags What type of scanner appliance (already provisioned within the Qualys Cloud Platform) is ideal for scanning public facing assets? - Offline Scanner - Virtual Scanner - External Scanner - Internal Scanner ✔✔External Scanner 4. Which of the following is NOT a component of a vulnerability scan? - Host Discovery - OS Detection - Port Scanning - Business Impact ✔✔Host Discovery Which of the following will have the greatest impact on a half red, half yellow QID? - Share Enumeration - Scan Dead Hosts - Authentication - Authoritative Option ✔✔Authentication What is the maximum number of TCP ports that can participate in the Host Discovery process? - 10 - 65535 - 1900 - 20 ✔✔20 Which of the following items are used to calculate the Business Risk score for a particular asset group? (choose 2) - Business Impact - Security Risk - CVSS Base - CVE ID ✔✔- Business Impact - Security Risk In order to successfully perform an authenticated (trusted) scan, you must create a(n): - Authentication Record - Search List - Asset Map - Report Template ✔✔Authentication Record Multiple Remediation Policies are evaluated: - From top to bottom - From bottom to top - Based on the rule creation date - In no specific order ✔✔From top to bottom A search list contains a list of QIDs Host Assets Applications Asset Groups ✔✔QIDs Dynamic Asset Tags are updated every time you. - Run a scan - Create a remediation policy - Run a report - Search the KnowledgeBase ✔✔Run a scan As a Manager in Qualys, which activities can be scheduled? - Asset Searches - Updates to the KnowledgeBase - Maps - Reports - Scans ✔✔- Asset Searches - Updates to the KnowledgeBase - Maps - Reports - Scans What does it mean when a "pencil" icon is associated with a QID in the Qualys KnowledgeBase? - There is malware associated with the QID - The QID has a known exploit - The QID has been edited - A patch is available for the QID ✔✔The QID has been edited Which item is not mandatory for launching a vulnerability scan? - Target Hosts - Option Profile - Authentication Record - Scanner Appliance ✔✔Authentication Record About how many services can Qualys detect via the Service Detection Module? - 13 - 512 - 20 - 600 ✔✔600 By default, the first user added to a new Business Unit becomes a ____________ for that unit. - Auditor - Administrator - Reader - Scanner - Unit Manager ✔✔Unit Manager In a new Option Profile, which authentication options are enabled by default? - All - Unix - Windows - None ✔✔None Which of the following vulnerability scanning options requires the use of a "dissolvable agent"? - Windows Share Enumeration - TCP port scanning - Scan Dead Hosts - UDP port scanning ✔✔Windows Share Enumeration To produce a scan report that includes the results from a specific scan that occurred at a specific point in time, you should select the _______________ option in the Report Template. - Scan Based Findings - Dynamic Findings - Static Findings - Host Based Findings ✔✔Host Based Findings About how many TCP ports are scanned when using Standard Scan option? - 1900 - 10 - 20 - 65535 ✔✔1900 Asset Groups and Asset Tags can be used to effectively customize or fine tune ... (choose all that apply) - Reports - Vulnerability Scans - Remediation Policies - Search Lists ✔✔Reports Vulnerability Scans Remediation Policies What is required in order for Qualys to generate remediation tickets? (choose all that apply) - Scan Results need to be processed by Qualys - A Policy needs to be created - A Map needs to be run - A Remediation Report needs to be run ✔✔- Scan Results need to be processed by Qualys - A Policy needs to be created Before you can scan an IP address for vulnerabilities, the IP address must first be added to the. - Host Assets tab - Business Units tab - Domains tab - Search List tab ✔✔Host Assets tab What is the 6-step lifecycle of Qualys Vulnerability Management? - Mapping, Scanning, Reporting, Remediation, Simplification, Authentication - Learning, Listening, Permitting, Forwarding, Marking, Queuing - Bandwidth, Delay, Reliability, Loading, MTU, Up Time - Discover, Organize Assets, Assess, Report, Remediate, Verify ✔✔Discover, Organize Assets, Assess, Report, Remediate, Verify To exclude a specific QID/vulnerability from a vulnerability scan you would: - Disable the QID in the Qualys KnowledgeBase. - Ignore the vulnerability from within a report. - Place the QID in a search list, and exclude that search list from within the Option Profile. - You cannot exclude QID/Vulnerabilities from vulnerability scans. ✔✔Place the QID in a search list, and exclude that search list from within the Option Profile. Which of the following components are included in the raw scan results, assuming you do not apply a Search List to your Option Profile? (choose all that apply) - Host IP - Option Profile Settings - Potential Vulnerabilities - Information Gathered - Vulnerabilities ✔✔- Potential Vulnerabilities - Information Gathered - Vulnerabilities Which of the following types of items can be found in the Qualys KnowledgeBase? (choose all that apply) - Potential Vulnerabilities - Configuration data (Information Gathered) - Confirmed Vulnerabilities - Asset Groups - Remediation Tickets ✔✔- Potential Vulnerabilities - Configuration data (Information Gathered) - Confirmed Vulnerabilities Which three features of the Vulnerability Management application can be customized using a KnowledgeBase "Search List"? - Authentication Records - Report Templates - Remediation Policies - Option Profiles ✔✔- Report Templates - Remediation Policies - Option Profiles What type of Search List adds new QIDs to the list when the Qualys KnowledgeBase is updated? - Active - Static - Dynamic - Passive ✔✔- Dynamic When a host is removed from your subscription, the Host Based Findings for that host are. - Ranked - Purged - Ignored - Archived ✔✔- Purged [Show More]

Last updated: 2 years ago

Preview 1 out of 14 pages

Buy Now

Instant download

We Accept:

We Accept
document-preview

Buy this document to get the full access instantly

Instant Download Access after purchase

Buy Now

Instant download

We Accept:

We Accept

Also available in bundle (1)

QUALYS BUNDLED EXAMS QUESTIONS AND ANSWERS WITH COMPLETE SOLUTIONS

QUALYS BUNDLED EXAMS QUESTIONS AND ANSWERS WITH COMPLETE SOLUTIONS

By Nutmegs 2 years ago

$15

5  

Reviews( 0 )

$10.00

Buy Now

We Accept:

We Accept

Instant download

Can't find what you want? Try our AI powered Search

105
0

Document information


Connected school, study & course


About the document


Uploaded On

Feb 02, 2023

Number of pages

14

Written in

Seller


seller-icon
Nutmegs

Member since 4 years

614 Documents Sold

Reviews Received
77
14
8
2
21
Additional information

This document has been written for:

Uploaded

Feb 02, 2023

Downloads

 0

Views

 105

Document Keyword Tags


$10.00
What is Scholarfriends

In Scholarfriends, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Scholarfriends · High quality services·