Qualys Vulnerability Management v1 2023-2024 ACTUAL EXAM QUESTIONS AND CORRECT DETAILED ANSWERS
Which of the following are benefits of scanning in
... [Show More] authenticated mode? (choose 2)
- Fewer confirmed vulnerabilities
- More vulnerabilities are detected
- Time saved from manually investigating potential vulnerabilities
- More accurate scan details
- More vulnerabilities are detected
- Time saved from manually investigating potential vulnerabilities
Which of the following are valid options for scanning targets? (choose 3).
- Asset Groups
- Domain Name
- IP addressing
- Asset Tags
- Search Lists
- MAC Address
- Asset Group
- IP Addressing
- Asset Tags
What type of scanner appliance (already provisioned within the Qualys Cloud Platform) is ideal for scanning public facing assets?
- Offline Scanner
- Virtual Scanner
- External Scanner
- Internal Scanner
External Scanner
4. Which of the following is NOT a component of a vulnerability scan?
- Host Discovery
- OS Detection
- Port Scanning
- Business Impact
Host Discovery
Which of the following will have the greatest impact on a half red, half yellow QID?
- Share Enumeration
- Scan Dead Hosts
- Authentication
- Authoritative Option
Authentication
What is the maximum number of TCP ports that can participate in the Host Discovery process?
- 10
- 65535
- 1900
- 20
20
Which of the following items are used to calculate the Business Risk score for a particular asset group? (choose 2)
- Business Impact
- Security Risk
- CVSS Base
- CVE ID
- Business Impact
- Security Risk
In order to successfully perform an authenticated (trusted) scan, you must create a(n):
- Authentication Record
- Search List
- Asset Map
- Report Template
Authentication Record
Multiple Remediation Policies are evaluated:
- From top to bottom
- From bottom to top
- Based on the rule creation date
- In no specific order
From top to bottom
A search list contains a list of
QIDs
Host Assets
Applications
Asset Groups
QIDs
Dynamic Asset Tags are updated every time you.
- Run a scan
- Create a remediation policy
- Run a report
- Search the KnowledgeBase
Run a scan
As a Manager in Qualys, which activities can be scheduled?
- Asset Searches
- Updates to the KnowledgeBase
- Maps
- Reports
- Scans
- Asset Searches
- Updates to the KnowledgeBase
- Maps
- Reports
- Scans
What does it mean when a "pencil" icon is associated with a QID in the Qualys KnowledgeBase?
- There is malware associated with the QID
- The QID has a known exploit
- The QID has been edited
- A patch is available for the QID
The QID has been edited
Which item is not mandatory for launching a vulnerability scan?
- Target Hosts [Show Less]