100% CORRECT ANSWERS 2023
Which of the following are benefits of scanning in authenticated mode? (choose 2) -
Correct Answer-1. More vulnerabilities are detected
2. Time saved from manually investigating potential vulnerabilities
Which of the following are valid options for scanning targets? (choose 3) - Correct
Answer-1. Asset Groups
2. IP addressing
3. Asset Tags
What type of scanner appliance (already provisioned within the Qualys Cloud Platform)
is ideal for scanning public facing assets? - Correct Answer-External Scanner
Which of the following is NOT a component of a vulnerability scan? - Correct Answer-
Host Discovery
Which of the following will have the greatest impact on a half red, half yellow QID? -
Correct Answer-Authentication
What is the maximum number of TCP ports that can participate in the Host Discovery
process? - Correct Answer-20
Which of the following items are used to calculate the Business Risk score for a
particular asset group? (choose 2) - Correct Answer-Business Impact
Security Risk
In order to successfully perform an authenticated (trusted) scan, you must create a(n): -
Correct Answer-Authentication record
Multiple Remediation Policies are evaluated: - Correct Answer-from top to bottom
A search list contains a list of . - Correct Answer-QIDs
Dynamic Asset Tags are updated every time you. - Correct Answer-Run a scan
As a Manager in Qualys, which activities can be scheduled? - Correct Answer-Asset
Searches
Updates to the KnowledgeBase
Maps
Reports
Scans