100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

Qualys Vulnerability Management v1 REVISED Test Questions And Answers Verified 100% Correct

Rating
-
Sold
-
Pages
6
Grade
A+
Uploaded on
16-10-2025
Written in
2025/2026

Qualys Vulnerability Management v1 REVISED Test Questions And Answers Verified 100% Correct By default, the first user added to a new Business Unit becomes a ____________ for that unit. - Auditor - Administrator - Reader - Scanner - Unit Manager - ANSWER Unit Manager In a new Option Profile, which authentication options are enabled by default? - All - Unix - Windows - None - ANSWER None Which of the following vulnerability scanning options requires the use of a "dissolvable agent"? - Windows Share Enumeration - TCP port scanning - Scan Dead Hosts - UDP port scanning - ANSWER Windows Share Enumeration To produce a scan report that includes the results from a specific scan that occurred at a specific point in time, you should select the _______________ option in the Report Template. - Scan Based Findings - Dynamic Findings - Static Findings - Host Based Findings - ANSWER Host Based Findings About how many TCP ports are scanned when using Standard Scan option? - - 65535 - ANSWER 1900 Asset Groups and Asset Tags can be used to effectively customize or fine tune ... (choose all that apply) - Reports - Vulnerability Scans - Remediation Policies - Search Lists - ANSWER Reports Vulnerability Scans Remediation Policies What is required in order for Qualys to generate remediation tickets? (choose all that apply) - Scan Results need to be processed by Qualys - A Policy needs to be created - A Map needs to be run - A Remediation Report needs to be run - ANSWER - Scan Results need to be processed by Qualys - A Policy needs to be created Before you can scan an IP address for vulnerabilities, the IP address must first be added to the. - Host Assets tab - Business Units tab - Domains tab - Search List tab - ANSWER Host Assets tab What is the 6-step lifecycle of Qualys Vulnerability Management? - Mapping, Scanning, Reporting, Remediation, Simplification, Authentication - Learning, Listening, Permitting, Forwarding, Marking, Queuing - Bandwidth, Delay, Reliability, Loading, MTU, Up Time - Discover, Organize Assets, Assess, Report, Remediate, Verify - ANSWER Discover, Organize Assets, Assess, Report, Remediate, Verify To exclude a specific QID/vulnerability from a vulnerability scan you would: - Disable the QID in the Qualys KnowledgeBase. - Ignore the vulnerability from within a report. - Place the QID in a search list, and exclude that search list from within the Option Profile. - You cannot exclude QID/Vulnerabilities from vulnerability scans. - ANSWER Place the QID in a search list, and exclude that search list from within the Option Profile. Which of the following components are included in the raw scan results, assuming you do not apply a Search List to your Option Profile? (choose all that apply) - Host IP - Option Profile Settings - Potential Vulnerabilities - Information Gathered - Vulnerabilities - ANSWER - Potential Vulnerabilities - Information Gathered - Vulnerabilities Which of the following types of items can be found in the Qualys KnowledgeBase? (choose all that apply) - Potential Vulnerabilities - Configuration data (Information Gathered) - Confirmed Vulnerabilities - Asset Groups - Remediation Tickets - ANSWER - Potential Vulnerabilities - Configuration data (Information Gathered) - Confirmed Vulnerabilities Which three features of the Vulnerability Management application can be customized using a KnowledgeBase "Search List"? - Authentication Records - Report Templates - Remediation Policies - Option Profiles - ANSWER - Report Templates - Remediation Policies - Option Profiles What type of Search List adds new QIDs to the list when the Qualys Kno

Show more Read less
Institution
Qualys Vulnerability Management V1
Course
Qualys Vulnerability Management v1









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Qualys Vulnerability Management v1
Course
Qualys Vulnerability Management v1

Document information

Uploaded on
October 16, 2025
Number of pages
6
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Qualys Vulnerability Management v1 REVISED Test
Questions And Answers Verified 100% Correct
By default, the first user added to a new Business Unit becomes a ____________ for
that unit.

- Auditor
- Administrator
- Reader
- Scanner
- Unit Manager - ANSWER Unit Manager

In a new Option Profile, which authentication options are enabled by default?

- All
- Unix
- Windows
- None - ANSWER None

Which of the following vulnerability scanning options requires the use of a "dissolvable
agent"?

- Windows Share Enumeration
- TCP port scanning
- Scan Dead Hosts
- UDP port scanning - ANSWER Windows Share Enumeration

To produce a scan report that includes the results from a specific scan that occurred at
a specific point in time, you should select the _______________ option in the Report
Template.

- Scan Based Findings
- Dynamic Findings
- Static Findings
- Host Based Findings - ANSWER Host Based Findings

About how many TCP ports are scanned when using Standard Scan option?

- 1900
- 10
- 20

, - 65535 - ANSWER 1900

Asset Groups and Asset Tags can be used to effectively customize or fine tune ...
(choose all that apply)

- Reports
- Vulnerability Scans
- Remediation Policies
- Search Lists - ANSWER Reports
Vulnerability Scans
Remediation Policies

What is required in order for Qualys to generate remediation tickets? (choose all that
apply)

- Scan Results need to be processed by Qualys
- A Policy needs to be created
- A Map needs to be run
- A Remediation Report needs to be run - ANSWER - Scan Results need to be
processed by Qualys - A Policy needs to be created

Before you can scan an IP address for vulnerabilities, the IP address must first be
added to the.

- Host Assets tab
- Business Units tab
- Domains tab
- Search List tab - ANSWER Host Assets tab

What is the 6-step lifecycle of Qualys Vulnerability Management?

- Mapping, Scanning, Reporting, Remediation, Simplification, Authentication
- Learning, Listening, Permitting, Forwarding, Marking, Queuing
- Bandwidth, Delay, Reliability, Loading, MTU, Up Time
- Discover, Organize Assets, Assess, Report, Remediate, Verify - ANSWER Discover,
Organize Assets, Assess, Report, Remediate, Verify

To exclude a specific QID/vulnerability from a vulnerability scan you would:

- Disable the QID in the Qualys KnowledgeBase.
- Ignore the vulnerability from within a report.
- Place the QID in a search list, and exclude that search list from within the Option
Profile.
$9.49
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
TopGradeGuru
1.5
(2)

Get to know the seller

Seller avatar
TopGradeGuru Teachme2-tutor
View profile
Follow You need to be logged in order to follow users or courses
Sold
10
Member since
1 year
Number of followers
0
Documents
2429
Last sold
1 month ago
GRADEHUB

We provide access to a wide range of professionally curated exams for students and educators. It offers high-quality, up-to-date assessment materials tailored to various subjects and academic levels. With instant downloads and affordable pricing, it's the go-to resource for exam preparation and academic success.

1.5

2 reviews

5
0
4
0
3
0
2
1
1
1

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions