Exam 2023 with complete solution
List the default tracking methods available for adding assets to your "scanning"
subscription. (Select Three)
(A) DNS Name
(B) NetBIOS Name
(C) CVE ID
(D)Qualys Host ID
(E) IP Address
(A) DNS Name
(B) NetBIOS Name
(E) IP Address
Name the phase or step of the Qualys Vulnerability Management Lifecycle that
produces scan results containing vulnerability findings?
(A) Report
(B) Discover
(C) Remediate
(D) Assess
(D) Assess
Which of the following is the default tracking method used by Qualys Cloud Agents?
(A) IP Address
(B) Qualys Host ID
(C) DNS Name
(D) NetBIOS Name
(B) Qualys Host ID
Which of the following are phases of the Vulnerability Management Lifecycle?
(A) Maintenance
(B) Remediate
(C) Design
(D) Discover
(E) Report
(B) Remediate
(D) Discover
(E) Report
Name the type of scanner appliance (by default) available to all Qualys users with
"scanning" privileges?
(A) External (Internet-based) Scanner
(B) Offline Scanner
, (C) Virtual Scanner
(D) Internal Scanner
(A) External (Internet-based) Scanner
Only the _________ user role can edit QIDs in your account KnowledgeBase.
(A) Manager
(B) Administrator
(C) Scanner
(D) Unit Manager
(A) Manager
Potential vulnerabilities are automatically verified. (True/ False)
(A) True
(B) False
(B) False
A severity ____________ vulnerability is the most urgent.
(A) Level 5
(B) Level 1
(C) Level 2
(D) Level 4
(A) Level 5
Which of the following criteria can be used to create a dynamic Search List? (Select
Three).
(A) Host Name
(B) Severity Level
(C) IP Address
(D) CVE ID
(E) CVSS Score
(B) Severity Level
(D) CVE ID
(E) CVSS Score
What is the name given to a custom list of QIDs taken from the Qualys
KnowledgeBase?
(A) Search List
(B) Host Assets
(C) Asset Group
(D) Authentication Record
(A) Search List
You have just created a Search List. Where can you use or apply it? (Select Three)
(A) Report Template
(B) Remediation Policy
(C) Asset Group