DETECTION AND RESPONSE EXAM | ACCURATE
ACTUAL REAL EXAM QUESTIONS ALL FREQUENTLY
TESTED QUESTIONS WITH A STUDY GUIDE | LATEST
UPDATE | EXPERT VERIFIED FOR GUARANTEED PASS
In order to successfully perform an authenticated (trusted) scan, you must create a(n):
- Authentication Record
- Search List
- Asset Map
- Report Template
Authentication Record
Multiple Remediation Policies are evaluated:
- From top to bottom
- From bottom to top
- Based on the rule creation date
- In no specific order
From top to bottom
A search list contains a list of
QIDs
Host Assets
Applications
Asset Groups
QIDs
Dynamic Asset Tags are updated every time you.
- Run a scan
- Create a remediation policy
- Run a report
- Search the KnowledgeBase
Run a scan
As a Manager in Qualys, which activities can be scheduled?
,- Asset Searches
- Updates to the KnowledgeBase
- Maps
- Reports
- Scans
- Asset Searches
- Updates to the KnowledgeBase
- Maps
- Reports
- Scans
What does it mean when a "pencil" icon is associated with a QID in the Qualys KnowledgeBase?
- There is malware associated with the QID
- The QID has a known exploit
- The QID has been edited
- A patch is available for the QID
The QID has been edited
Which item is not mandatory for launching a vulnerability scan?
- Target Hosts
- Option Profile
- Authentication Record
- Scanner Appliance
Authentication Record
About how many services can Qualys detect via the Service Detection Module?
- 13
- 512
- 20
- 600
600
By default, the first user added to a new Business Unit becomes a for that unit.
- Auditor
- Administrator
- Reader
- Scanner
- Unit Manager
, Unit Manager
In a new Option Profile, which authentication options are enabled by default?
- All
- Unix
- Windows
- None
None
Which of the following vulnerability scanning options requires the use of a "dissolvable agent"?
- Windows Share Enumeration
- TCP port scanning
- Scan Dead Hosts
- UDP port scanning
Windows Share Enumeration
Which of the following are benefits of scanning in authenticated mode? (choose 2)
- Fewer confirmed vulnerabilities
- More vulnerabilities are detected
- Time saved from manually investigating potential vulnerabilities
- More accurate scan details
- More vulnerabilities are detected
- Time saved from manually investigating potential vulnerabilities
Which of the following are valid options for scanning targets? (choose 3).
- Asset Groups
- Domain Name
- IP addressing
- Asset Tags
- Search Lists
- MAC Address
- Asset Group
- IP Addressing
- Asset Tags
What type of scanner appliance (already provisioned within the Qualys Cloud Platform) is ideal
for scanning public facing assets?
- Offline Scanner