Self-Paced Training with
Complete Solutions
List the default tracking methods available for adding assets to your
"scanning" subscription. (Select Three)
(A) DNS Name
(B) NetBIOS Name
(C) CVE ID
(D)Qualys Host ID
(E) IP Address - ANSWER-(A) DNS Name
(B) NetBIOS Name
(E) IP Address
Name the phase or step of the Qualys Vulnerability Management Lifecycle
that produces scan results containing vulnerability findings?
,(A) Report
(B) Discover
(C) Remediate
(D) Assess - ANSWER-(D) Assess
Which of the following is the default tracking method used by Qualys Cloud
Agents?
(A) IP Address
(B) Qualys Host ID
(C) DNS Name
(D) NetBIOS Name - ANSWER-(B) Qualys Host ID
Which of the following are phases of the Vulnerability Management Lifecycle?
(A) Maintenance
(B) Remediate
(C) Design
, (D) Discover
(E) Report - ANSWER-(B) Remediate
(D) Discover
(E) Report
A static Search List is created and updated ____________.
(A) Manually
(B) Explicit
(C) By Default
(D) Automatically - ANSWER-(A) Manually
What are the primary methods available in Qualys VM, for grouping, labeling,
and organizing host assets? (Select Two)
(A) Severity Levels
(B) Search Lists
(C) Asset Groups