QUESTIONS AND ANSWERS 100%
CORRECT
Which of the following are benefits of scanning in authenticated mode?
(choose 2) - ANSWER-1. More vulnerabilities are detected
2. Time saved from manually investigating potential vulnerabilities
Which of the following are valid options for scanning targets? (choose 3) -
ANSWER-1. Asset Groups
2. IP addressing
3. Asset Tags
What type of scanner appliance (already provisioned within the Qualys Cloud
Platform) is ideal for scanning public facing assets? - ANSWER-External
Scanner
, Which of the following is NOT a component of a vulnerability scan? -
ANSWER-Host Discovery
In order to successfully perform an authenticated (trusted) scan, you must
create a(n): - ANSWER-Authentication record
Multiple Remediation Policies are evaluated: - ANSWER-from top to bottom
A search list contains a list of . - ANSWER-QIDs
Dynamic Asset Tags are updated every time you. - ANSWER-Run a scan
As a Manager in Qualys, which activities can be scheduled? - ANSWER-Asset
Searches
Updates to the KnowledgeBase
Maps
Reports
Scans