Computer Science > QUESTIONS & ANSWERS > Qualys Vulnerability Management v1 Fall 2022 with complete solution (All)

Qualys Vulnerability Management v1 Fall 2022 with complete solution

Document Content and Description Below

Qualys Vulnerability Management v1 Fall 2023 with complete solution Which of the following are benefits of scanning in authenticated mode? (choose 2) - Fewer confirmed vulnerabilities - More vu... lnerabilities are detected - Time saved from manually investigating potential vulnerabilities - More accurate scan details ✔Ans✔ - More vulnerabilities are detected - Time saved from manually investigating potential vulnerabilities Which of the following are valid options for scanning targets? (choose 3). - Asset Groups - Domain Name - IP addressing - Asset Tags - Search Lists - MAC Address ✔Ans✔ - Asset Group - IP Addressing - Asset Tags What type of scanner appliance (already provisioned within the Qualys Cloud Platform) is ideal for scanning public facing assets? - Offline Scanner - Virtual Scanner - External Scanner - Internal Scanner ✔Ans✔ External Scanner 4. Which of the following is NOT a component of a vulnerability scan? - Host Discovery - OS Detection - Port Scanning - Business Impact ✔Ans✔ Host Discovery Which of the following will have the greatest impact on a half red, half yellow QID? - Share Enumeration - Scan Dead Hosts - Authentication - Authoritative Option ✔Ans✔ Authentication What is the maximum number of TCP ports that can participate in the Host Discovery process? - 10 - 65535 - 1900 - 20 ✔Ans✔ 20 Which of the following items are used to calculate the Business Risk score for a particular asset group? (choose 2) - Business Impact - Security Risk - CVSS Base - CVE ID ✔Ans✔ - Business Impact - Security Risk In order to successfully perform an authenticated (trusted) scan, you must create a(n): - Authentication Record - Search List - Asset Map - Report Template ✔Ans✔ Authentication Record Multiple Remediation Policies are evaluated: - From top to bottom - From bottom to top - Based on the rule creation date - In no specific order ✔Ans✔ From top to bottom A search list contains a list of QIDs Host Assets Applications Asset Groups ✔Ans✔ QIDs Dynamic Asset Tags are updated every time you. - Run a scan - Create a remediation policy - Run a report - Search the KnowledgeBase ✔Ans✔ Run a scan As a Manager in Qualys, which activities can be scheduled? - Asset Searches - Updates to the KnowledgeBase - Maps - Reports - Scans ✔Ans✔ - Asset Searches - Updates to the KnowledgeBase - Maps - Reports - Scans What does it mean when a "pencil" icon is associated with a QID in the Qualys KnowledgeBase? - There is malware associated with the QID - The QID has a known exploit - The QID has been edited - A patch is available for the QID ✔Ans✔ The QID has been edited Which item is not mandatory for launching a vulnerability scan? - Target Hosts - Option Profile - Authentication Record - Scanner Appliance ✔Ans✔ Authentication Record About how many services can Qualys detect via the Service Detection Module? - 13 - 512 - 20 - 600 ✔Ans✔ 600 By default, the first user added to a new Business Unit becomes a ____________ for that unit. - Auditor - Administrator - Reader - Scanner - Unit Manager ✔Ans✔ Unit Manager In a new Option Profile, which authentication options are enabled by default? - All - Unix - Windows - None ✔Ans✔ None Which of the following vulnerability scanning options requires the use of a "dissolvable agent"? - Windows Share Enumeration - TCP port scanning - Scan Dead Hosts - UDP port scanning ✔Ans✔ Windows Share Enumeration To produce a scan report that includes the results from a specific scan that occurred at a specific point in time, you should select the _______________ option in the Report Template. - Scan Based Findings - Dynamic Findings - Static Findings - Host Based Findings ✔Ans✔ Host Based Findings About how many TCP ports are scanned when using Standard Scan option? - 1900 - 10 - 20 - 65535 ✔Ans✔ 1900 [Show More]

Last updated: 1 year ago

Preview 1 out of 6 pages

Add to cart

Instant download

We Accept:

We Accept
document-preview

Buy this document to get the full access instantly

Instant Download Access after purchase

Add to cart

Instant download

We Accept:

We Accept

Reviews( 0 )

$7.00

Add to cart

We Accept:

We Accept

Instant download

Can't find what you want? Try our AI powered Search

OR

REQUEST DOCUMENT
69
0

Document information


Connected school, study & course


About the document


Uploaded On

Feb 18, 2023

Number of pages

6

Written in

Seller


seller-icon
Crescent

Member since 1 year

8 Documents Sold


Additional information

This document has been written for:

Uploaded

Feb 18, 2023

Downloads

 0

Views

 69

Document Keyword Tags

What is Browsegrades

In Browsegrades, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Browsegrades · High quality services·