Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Qualys Vulnerability Management v1, Exams of Service Management

Which of the following are benefits of scanning in authenticated mode? (choose 2) - Fewer confirmed vulnerabilities - More vulnerabilities are detected - Time saved from manually investigating potential vulnerabilities - More accurate scan details - ✔✔ - More vulnerabilities are detected - Time saved from manually investigating potential vulnerabilities

Typology: Exams

2024/2025

Available from 07/08/2025

joyce-wangui-2
joyce-wangui-2 🇺🇸

221 documents

1 / 9

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
Qualys Vulnerability Management v1
Questions with Correct Answers |
Latest Version 2025 | 100% Verified
Which of the following are benefits of scanning in authenticated mode? (choose 2)
- Fewer confirmed vulnerabilities
- More vulnerabilities are detected
- Time saved from manually investigating potential vulnerabilities
- More accurate scan details - ✔✔
- More vulnerabilities are detected
- Time saved from manually investigating potential vulnerabilities
Which of the following are valid options for scanning targets? (choose 3).
- Asset Groups
- Domain Name
- IP addressing
- Asset Tags
- Search Lists
- MAC Address - ✔✔- Asset Group
- IP Addressing
- Asset Tags
What type of scanner appliance (already provisioned within the Qualys Cloud Platform) is ideal for
scanning public facing assets?
- Offline Scanner
pf3
pf4
pf5
pf8
pf9

Partial preview of the text

Download Qualys Vulnerability Management v1 and more Exams Service Management in PDF only on Docsity!

Qualys Vulnerability Management v

Questions with Correct Answers |

Latest Version 202 5 | 100 % Verified

Which of the following are benefits of scanning in authenticated mode? (choose 2 )

  • Fewer confirmed vulnerabilities
  • More vulnerabilities are detected
  • Time saved from manually investigating potential vulnerabilities
  • More accurate scan details - ✔✔
  • More vulnerabilities are detected
  • Time saved from manually investigating potential vulnerabilities Which of the following are valid options for scanning targets? (choose 3 ).
  • Asset Groups
  • Domain Name
  • IP addressing
  • Asset Tags
  • Search Lists
  • MAC Address - ✔✔- Asset Group
  • IP Addressing
  • Asset Tags What type of scanner appliance (already provisioned within the Qualys Cloud Platform) is ideal for scanning public facing assets?
  • Offline Scanner
  • Virtual Scanner
  • External Scanner
  • Internal Scanner - ✔✔External Scanner
  1. Which of the following is NOT a component of a vulnerability scan?
  • Host Discovery
  • OS Detection
  • Port Scanning
  • Business Impact - ✔✔Host Discovery Which of the following will have the greatest impact on a half red, half yellow QID?
  • Share Enumeration
  • Scan Dead Hosts
  • Authentication
  • Authoritative Option - ✔✔Authentication What is the maximum number of TCP ports that can participate in the Host Discovery process?
  • 10
  • 65535
  • 1900
  • 20 - ✔✔ 20 Which of the following items are used to calculate the Business Risk score for a particular asset group? (choose 2 )
  • Business Impact
  • Run a scan
  • Create a remediation policy
  • Run a report
  • Search the KnowledgeBase - ✔✔Run a scan As a Manager in Qualys, which activities can be scheduled?
  • Asset Searches
  • Updates to the KnowledgeBase
  • Maps
  • Reports
  • Scans - ✔✔- Asset Searches
  • Updates to the KnowledgeBase
  • Maps
  • Reports
  • Scans What does it mean when a "pencil" icon is associated with a QID in the Qualys KnowledgeBase?
  • There is malware associated with the QID
  • The QID has a known exploit
  • The QID has been edited
  • A patch is available for the QID - ✔✔The QID has been edited Which item is not mandatory for launching a vulnerability scan?
  • Target Hosts
  • Option Profile
  • Authentication Record
  • Scanner Appliance - ✔✔Authentication Record About how many services can Qualys detect via the Service Detection Module?
  • 13
  • 512
  • 20
  • 600 - ✔✔ 600 By default, the first user added to a new Business Unit becomes a for that unit.
  • Auditor
  • Administrator
  • Reader
  • Scanner
  • Unit Manager - ✔✔Unit Manager In a new Option Profile, which authentication options are enabled by default?
  • All
  • Unix
  • Windows
  • None - ✔✔None Which of the following vulnerability scanning options requires the use of a "dissolvable agent"?
    • Windows Share Enumeration
    • TCP port scanning
  • Scan Results need to be processed by Qualys
  • A Policy needs to be created
  • A Map needs to be run
  • A Remediation Report needs to be run - ✔✔- Scan Results need to be processed by Qualys
  • A Policy needs to be created Before you can scan an IP address for vulnerabilities, the IP address must first be added to the.
  • Host Assets tab
  • Business Units tab
  • Domains tab
  • Search List tab - ✔✔Host Assets tab What is the 6 - step lifecycle of Qualys Vulnerability Management?
  • Mapping, Scanning, Reporting, Remediation, Simplification, Authentication
  • Learning, Listening, Permitting, Forwarding, Marking, Queuing
  • Bandwidth, Delay, Reliability, Loading, MTU, Up Time
  • Discover, Organize Assets, Assess, Report, Remediate, Verify - ✔✔Discover, Organize Assets, Assess, Report, Remediate, Verify To exclude a specific QID/vulnerability from a vulnerability scan you would:
  • Disable the QID in the Qualys KnowledgeBase.
  • Ignore the vulnerability from within a report.
  • Place the QID in a search list, and exclude that search list from within the Option Profile.
  • You cannot exclude QID/Vulnerabilities from vulnerability scans. - ✔✔Place the QID in a search list, and exclude that search list from within the Option Profile.

Which of the following components are included in the raw scan results, assuming you do not apply a Search List to your Option Profile? (choose all that apply)

  • Host IP
  • Option Profile Settings
  • Potential Vulnerabilities
  • Information Gathered
  • Vulnerabilities - ✔✔- Potential Vulnerabilities
  • Information Gathered
  • Vulnerabilities Which of the following types of items can be found in the Qualys KnowledgeBase? (choose all that apply)
  • Potential Vulnerabilities
  • Configuration data (Information Gathered)
  • Confirmed Vulnerabilities
  • Asset Groups
  • Remediation Tickets - ✔✔- Potential Vulnerabilities
  • Configuration data (Information Gathered)
  • Confirmed Vulnerabilities Which three features of the Vulnerability Management application can be customized using a KnowledgeBase "Search List"?
  • Authentication Records
  • Report Templates
  • Remediation Policies
  • Option Profiles - ✔✔- Report Templates
  • Remediation Policies