Questions and Answers 100%
Correct
1. When launching a compliance scan, you must select a (choose two) -
ANSWER-B)Scan Target
D)Compliance Profile
2. In the Policy Compliance application, which of the following is NOT an
option found within a Compliance Profile? - ANSWER-A)File Integrity
Monitoring controls enabled
3. Which cardinality settings will never allow the number of ACTUAL values
(collected from a host) to exceed the number of EXPECTED values, listed in a
control? (choose 2) - ANSWER-C)contains
D)matches
, 4. Which compliance scanning option provides a potential solution, for
Windows hosts that have Remote Registry Service disabled? - ANSWER-
A)Auto Update expected value
5. What policy creation method requires at least one successful compliance
scan? - ANSWER-A) Create from Host
6. Which Qualys application allows you to assess devices residing in "air-
gapped" networks? - ANSWER-D)OCA
7. The Policy Compliance Control Library contains_______controls. - ANSWER-
A)Technical
8. Which Qualys application specializes in the assessment of operational,
procedural, and administrative controls? - ANSWER-C)Security Assessment
Questionnaire
9. Which User Defined Control type allows you to check the value of the
'PermitRootLogin' setting on a Unix host? - ANSWER-B)File Content Check