Which of the following are benefits of scanning in authenticated mode? (choose 2)
- Fewer confirmed vulnerabilities
- More vulnerabilities are detected
- Time saved from manually investigating potential vulnerabilities
- More accurate scan details - Answers - More vulnerabilities are detected
- Time saved from manually investigating potential vulnerabilities
Which of the following are valid options for scanning targets? (choose 3).
- Asset Groups
- Domain Name
- IP addressing
- Asset Tags
- Search Lists
- MAC Address - Answers - Asset Group
- IP Addressing
- Asset Tags
What type of scanner appliance (already provisioned within the Qualys Cloud Platform) is ideal for
scanning public facing assets?
- Offline Scanner
- Virtual Scanner
- External Scanner
- Internal Scanner - Answers External Scanner
4. Which of the following is NOT a component of a vulnerability scan?
, - Host Discovery
- OS Detection
- Port Scanning
- Business Impact - Answers Host Discovery
Which of the following will have the greatest impact on a half red, half yellow QID?
- Share Enumeration
- Scan Dead Hosts
- Authentication
- Authoritative Option - Answers Authentication
What is the maximum number of TCP ports that can participate in the Host Discovery process?
- 10
- 65535
- 1900
- 20 - Answers 20
Which of the following items are used to calculate the Business Risk score for a particular asset group?
(choose 2)
- Business Impact
- Security Risk
- CVSS Base
- CVE ID - Answers - Business Impact
- Security Risk
In order to successfully perform an authenticated (trusted) scan, you must create a(n):