Best Practices Quiz 1-9 with
Complete Solutions
Which of the following is not a recommended setting for On-prem Scans? -
ANSWER-Custom Detection
Which of the following is not a recommended setting for Perimeter Scans? -
ANSWER-Authentication
Cloud Perimeter Scans can be launched from which other Qualys app? -
ANSWER-Connectors
Following best practices, how often should you scan assets that face the
Public Web? - ANSWER-Daily
Following best practices, how often should you scan assets within your
organization's perimeter? - ANSWER-Weekly
, Which of the following can impact TruRisk calculations when setting up scan
targets? Select two. - ANSWER-Tag Criticality
Business Impact
Perimeter scans use which of the following? - ANSWER-External scanners
Which of the following are required when using the wizard to deploy a Virtual
Scanner Appliance? Select two. - ANSWER-Virtualization Platform
Virtual Scanner Name
Local Authentication Records can be assigned to assets by? Select three. -
ANSWER-IP Address
Asset Tags
Asset Groups
Which of the following cannot be used to verify the latest completed scan
used authentication? - ANSWER-Run a new Test Authentication Scan