TRAINING EXAM QUESTIONS AND CORRECT
ANSWERS GRADE A+
Which of the following is NOT a component of a vulnerability scan?
Host Discovery
Which of the following will have the greatest impact on a half red, half yellow
QID?
Authentication
What is the maximum number of TCP ports that can participate in the Host
Discovery process?
20
Which of the following items are used to calculate the Business Risk score for a
particular asset group? (choose 2)
Business Impact
Security Risk
Which of the following are benefits of scanning in authenticated mode? (choose
2)
1. More vulnerabilities are detected
2. Time saved from manually investigating potential vulnerabilities
Which of the following are valid options for scanning targets? (choose 3)
1. Asset Groups
2. IP addressing
3. Asset Tags
What type of scanner appliance (already provisioned within the Qualys Cloud
Platform) is ideal for scanning public facing assets?
External Scanner
In order to successfully perform an authenticated (trusted) scan, you must create
a(n):
Authentication record
Multiple Remediation Policies are evaluated:
from top to bottom
A search list contains a list of .
QIDs
Dynamic Asset Tags are updated every time you.
Run a scan
As a Manager in Qualys, which activities can be scheduled?
Asset Searches
Updates to the KnowledgeBase
Maps
Reports
Scans
What does it mean when a "pencil" icon is associated with a QID in the Qualys
KnowledgeBase?