Questions And Answers Verified 100% Correct
By default, the first user added to a new Business Unit becomes a ____________ for
that unit.
- Auditor
- Administrator
- Reader
- Scanner
- Unit Manager - ANSWER Unit Manager
In a new Option Profile, which authentication options are enabled by default?
- All
- Unix
- Windows
- None - ANSWER None
Which of the following vulnerability scanning options requires the use of a "dissolvable
agent"?
- Windows Share Enumeration
- TCP port scanning
- Scan Dead Hosts
- UDP port scanning - ANSWER Windows Share Enumeration
To produce a scan report that includes the results from a specific scan that occurred at
a specific point in time, you should select the _______________ option in the Report
Template.
- Scan Based Findings
- Dynamic Findings
- Static Findings
- Host Based Findings - ANSWER Host Based Findings
About how many TCP ports are scanned when using Standard Scan option?
- 1900
- 10
- 20
, - 65535 - ANSWER 1900
Asset Groups and Asset Tags can be used to effectively customize or fine tune ...
(choose all that apply)
- Reports
- Vulnerability Scans
- Remediation Policies
- Search Lists - ANSWER Reports
Vulnerability Scans
Remediation Policies
What is required in order for Qualys to generate remediation tickets? (choose all that
apply)
- Scan Results need to be processed by Qualys
- A Policy needs to be created
- A Map needs to be run
- A Remediation Report needs to be run - ANSWER - Scan Results need to be
processed by Qualys - A Policy needs to be created
Before you can scan an IP address for vulnerabilities, the IP address must first be
added to the.
- Host Assets tab
- Business Units tab
- Domains tab
- Search List tab - ANSWER Host Assets tab
What is the 6-step lifecycle of Qualys Vulnerability Management?
- Mapping, Scanning, Reporting, Remediation, Simplification, Authentication
- Learning, Listening, Permitting, Forwarding, Marking, Queuing
- Bandwidth, Delay, Reliability, Loading, MTU, Up Time
- Discover, Organize Assets, Assess, Report, Remediate, Verify - ANSWER Discover,
Organize Assets, Assess, Report, Remediate, Verify
To exclude a specific QID/vulnerability from a vulnerability scan you would:
- Disable the QID in the Qualys KnowledgeBase.
- Ignore the vulnerability from within a report.
- Place the QID in a search list, and exclude that search list from within the Option
Profile.