ACTUAL EXAM QUESTIONS AND
CORRECT DETAILED ANSWERS WITH
RATIONALES (VERIFIED ANSWERS) –
JUST RELEASED
1. Which of the following methods should you choose
to ensure that your scans include the most accurate
results? - ANSWER ✓ Use hardware scanners in
addition to virtual scanners
Configure and enable authentication
2. Best describes Qualys TruRisk? - ANSWER ✓
Qualys TruRisk places detected vulnerabilities within
the context of your critical and non-critical host
assets to help you remediate and fix the
vulnerabilities that really count
3. How can Qualys VMDR help remediation tasks? -
ANSWER ✓ Qualys VMDR enables you to identify
patches for discovered vulnerabilities & enables you
to prioritize remediation activities
,4. You need to ensure that each subscription user can
see only the dashboards that correspond to their job
role. What is the best way to achieve this goal -
ANSWER ✓ Create the dashboards as a manager
user and then use Tag-based scoping to control who
can view each dashboard
5. You have discovered that many of the assets in your
IT environment have been decommissioned. How
might this affect your vulnerability management
program? - ANSWER ✓ The security posture of the
environment is now inaccurate
Decreased accuracy in Dashboards and Reports
6. You have been asked to confirm that the Qualys
Cloud Agent is able to detect all vulnerabilities.
Which of the following statements explain Cloud
Agent vulnerability scanning? - ANSWER ✓ Cloud
Agent has a local perspective since it installs as a thin
service on the host OS & cannot create network
connections which direct back onto the asset to each
open port
, 7. external scanner - ANSWER ✓ qualys sensors that
are used to scan jhosts which have a pub;ic facing ip
addresses
8. why should we enable unified vulnerability view? -
ANSWER ✓ to merge detections into a single asset
record
9. Which of the following best describes potential
vulnerabilities?
a. vulnerabilities that only provide information
about the network related to the host
b. potential vulnerabilities are defined by their
possible consequences
c. vulnerabilities that cannot be detected by cloud
agents
d. vulnerabilities that cannot be fully verified -
ANSWER ✓ d. vulnerabilities that cannot be
fully verified
10. why does qualys recommend performing scans
in authenticated mode?