WRITTEN SOLUTION
Which of the following are benefits of scanning in authenticated mode? (choose 2) - 1. More
vulnerabilities are detected
2. Time saved from manually investigating potential vulnerabilities
Which of the following are valid options for scanning targets? (choose 3) - 1. Asset Groups
2. IP addressing
3. Asset Tags
What type of scanner appliance (already provisioned within the Qualys Cloud Platform) is
ideal for scanning public facing assets? - External Scanner
Which of the following is NOT a component of a vulnerability scan? - Host Discovery
Which of the following will have the greatest impact on a half red, half yellow QID? -
Authentication
What is the maximum number of TCP ports that can participate in the Host Discovery
process? - 20
Which of the following items are used to calculate the Business Risk score for a particular
asset group? (choose 2) - Business Impact
Security Risk
In order to successfully perform an authenticated (trusted) scan, you must create a(n): -
Authentication record
Multiple Remediation Policies are evaluated: - from top to bottom
A search list contains a list of . - QIDs
Dynamic Asset Tags are updated every time you. - Run a scan
As a Manager in Qualys, which activities can be scheduled? - Asset Searches
Updates to the KnowledgeBase
Maps
Reports
Scans
What does it mean when a "pencil" icon is associated with a QID in the Qualys
KnowledgeBase? - The QID has been edited
This study source was downloaded by 100000847097152 from CourseHero.com on 09-22-2023 09:24:58 GMT -05:00
https://www.coursehero.com/file/211484179/QUALYS-VMDR-TRAINING-WRITTEN-SOLUTION-pdf/