Qualys Vulnerability Management v1 Fall 2023 with complete solution
Which of the following are benefits of scanning in authenticated mode? (choose 2)
- Fewer confirmed vulnerabilities
- More vulnerabilities are de
...
Qualys Vulnerability Management v1 Fall 2023 with complete solution
Which of the following are benefits of scanning in authenticated mode? (choose 2)
- Fewer confirmed vulnerabilities
- More vulnerabilities are detected
- Time saved from manually investigating potential vulnerabilities
- More accurate scan details ✔Ans✔ - More vulnerabilities are detected
- Time saved from manually investigating potential vulnerabilities
Which of the following are valid options for scanning targets? (choose 3).
- Asset Groups
- Domain Name
- IP addressing
- Asset Tags
- Search Lists
- MAC Address ✔Ans✔ - Asset Group
- IP Addressing
- Asset Tags
What type of scanner appliance (already provisioned within the Qualys Cloud Platform) is ideal for scanning public facing assets?
- Offline Scanner
- Virtual Scanner
- External Scanner
- Internal Scanner ✔Ans✔ External Scanner
4. Which of the following is NOT a component of a vulnerability scan?
- Host Discovery
- OS Detection
- Port Scanning
- Business Impact ✔Ans✔ Host Discovery
Which of the following will have the greatest impact on a half red, half yellow QID?
- Share Enumeration
- Scan Dead Hosts
- Authentication
- Authoritative Option ✔Ans✔ Authentication
What is the maximum number of TCP ports that can participate in the Host Discovery process?
- 10
- 65535
- 1900
- 20 ✔Ans✔ 20
Which of the following items are used to calculate the Business Risk score for a particular asset group? (choose 2)
- Business Impact
- Security Risk
- CVSS Base
- CVE ID ✔Ans✔ - Business Impact
- Security Risk
In order to successfully perform an authenticated (trusted) scan, you must create a(n):
- Authentication Record
- Search List
- Asset Map
- Report Template ✔Ans✔ Authentication Record
Multiple Remediation Policies are evaluated:
- From top to bottom
- From bottom to top
- Based on the rule creation date
- In no specific order ✔Ans✔ From top to bottom
A search list contains a list of
QIDs
Host Assets
Applications
Asset Groups ✔Ans✔ QIDs
Dynamic Asset Tags are updated every time you.
- Run a scan
- Create a remediation policy
- Run a report
- Search the KnowledgeBase ✔Ans✔ Run a scan
As a Manager in Qualys, which activities can be scheduled?
- Asset Searches
- Updates to the KnowledgeBase
- Maps
- Reports
- Scans ✔Ans✔ - Asset Searches
- Updates to the KnowledgeBase
- Maps
- Reports
- Scans
What does it mean when a "pencil" icon is associated with a QID in the Qualys KnowledgeBase?
- There is malware associated with the QID
- The QID has a known exploit
- The QID has been edited
- A patch is available for the QID ✔Ans✔ The QID has been edited
Which item is not mandatory for launching a vulnerability scan?
- Target Hosts
- Option Profile
- Authentication Record
- Scanner Appliance ✔Ans✔ Authentication Record
About how many services can Qualys detect via the Service Detection Module?
- 13
- 512
- 20
- 600 ✔Ans✔ 600
By default, the first user added to a new Business Unit becomes a ____________ for that unit.
- Auditor
- Administrator
- Reader
- Scanner
- Unit Manager ✔Ans✔ Unit Manager
In a new Option Profile, which authentication options are enabled by default?
- All
- Unix
- Windows
- None ✔Ans✔ None
Which of the following vulnerability scanning options requires the use of a "dissolvable agent"?
- Windows Share Enumeration
- TCP port scanning
- Scan Dead Hosts
- UDP port scanning ✔Ans✔ Windows Share Enumeration
To produce a scan report that includes the results from a specific scan that occurred at a specific point in time, you should select the _______________ option in the Report Template.
- Scan Based Findings
- Dynamic Findings
- Static Findings
- Host Based Findings ✔Ans✔ Host Based Findings
About how many TCP ports are scanned when using Standard Scan option?
- 1900
- 10
- 20
- 65535 ✔Ans✔ 1900
[Show More]