Qualys Training Exams.
2. Which of the following sensors are presently used by Qualys VM to
collect the data needed to perform host vulnerability assessments?
(choose 2)
3. Choose all that apply:
4. Cloud Agent
5. Scanner Appliance
6. Passive Sensor
7. Cloud Connector
8. SubmitCancel
While it is highly recommended, which of the following is NOT required to launch a
vulnerability scan?
Choose an answer:
Target Hosts
Option Profile
Authentication Record
Scanner Appliance
Which of the following best describes a “Dynamic” Search List?
Choose an answer:
Manually updated – Static List
Updates can be scheduled regularly
Automatically updated
Updated only upon user request
Select the option below that contains the correct order or sequence of events.
Choose an answer:
1) Add host to subscription, 2) Use host as report source, 3) Scan host
1) Use host as report source, 2) Add host to subscription, 3) Scan host
1) Add host to subscription, 2) Scan host, 3) Use host as report source
1) Scan host, 2) Add host to subscription, 3) Use host as report source
Which of the following are components of a Business Unit? (choose 2)
Choose all that apply:
Search Lists
, Asset Groups
Policies
Users
Option Profiles
What is the name given to a custom list of QIDs taken from the Qualys KnowledgeBase?
Choose an answer:
Search List
Asset Group
Authentication Record
Host Assets
To enumerate installed software applications on targeted hosts, scans should be
performed in __________ mode.
Choose an answer:
Unauthenticated
Authenticated
Authoratative
Verbose
Which of the following modules are regular components of the vulnerability scanning
process? (choose 3)
Choose all that apply:
OS Detection
Port Scanning
Host Discovery
Packet Sniffing
VLAN Tagging
To produce a "trend" report that covers the last twelve months of vulnerability activity,
you should select ______ Based Findings in the Scan Report Template.
Choose all that apply:
Scan
Client
Host
Server
You have just created a KnowledgeBase Search List. Where can you use or
apply it? (choose 3)
Choose all that apply:
, In a Remediation Policy
In an Asset Group
In an Option Profile
In a Report Template
In a Business Unit
In an Asset Tag
SubmitCancel
Agent data (data collected by a Qualys Agent) is stored as ______ Based Findings.
Choose an answer:
Host
Scan
Client
Server
What phase or step of the Qualys Vulnerability Management Lifecycle, produces scan
results containing vulnerability findings?
Choose an answer:
Report
Discover
Remediate
Assess
One of your colleagues would like to build a report to display vulnerability findings over
the last three months (including trending information)? What do you recommend?
Choose an answer:
Build a scan template with the "All" Asset Group as its target.
Build a scan template that uses Host Based Findings.
Build a scan template that sorts findings by Asset Group
Build a scan template that uses Scan Based Findings
What type of scanner appliance (by default) is available to all Qualys users with
"scanning" privileges?
Choose an answer:
Offline Scanner
Virtual Scanner
External (Internet-based) Scanner
Internal Scanner
2. Which of the following sensors are presently used by Qualys VM to
collect the data needed to perform host vulnerability assessments?
(choose 2)
3. Choose all that apply:
4. Cloud Agent
5. Scanner Appliance
6. Passive Sensor
7. Cloud Connector
8. SubmitCancel
While it is highly recommended, which of the following is NOT required to launch a
vulnerability scan?
Choose an answer:
Target Hosts
Option Profile
Authentication Record
Scanner Appliance
Which of the following best describes a “Dynamic” Search List?
Choose an answer:
Manually updated – Static List
Updates can be scheduled regularly
Automatically updated
Updated only upon user request
Select the option below that contains the correct order or sequence of events.
Choose an answer:
1) Add host to subscription, 2) Use host as report source, 3) Scan host
1) Use host as report source, 2) Add host to subscription, 3) Scan host
1) Add host to subscription, 2) Scan host, 3) Use host as report source
1) Scan host, 2) Add host to subscription, 3) Use host as report source
Which of the following are components of a Business Unit? (choose 2)
Choose all that apply:
Search Lists
, Asset Groups
Policies
Users
Option Profiles
What is the name given to a custom list of QIDs taken from the Qualys KnowledgeBase?
Choose an answer:
Search List
Asset Group
Authentication Record
Host Assets
To enumerate installed software applications on targeted hosts, scans should be
performed in __________ mode.
Choose an answer:
Unauthenticated
Authenticated
Authoratative
Verbose
Which of the following modules are regular components of the vulnerability scanning
process? (choose 3)
Choose all that apply:
OS Detection
Port Scanning
Host Discovery
Packet Sniffing
VLAN Tagging
To produce a "trend" report that covers the last twelve months of vulnerability activity,
you should select ______ Based Findings in the Scan Report Template.
Choose all that apply:
Scan
Client
Host
Server
You have just created a KnowledgeBase Search List. Where can you use or
apply it? (choose 3)
Choose all that apply:
, In a Remediation Policy
In an Asset Group
In an Option Profile
In a Report Template
In a Business Unit
In an Asset Tag
SubmitCancel
Agent data (data collected by a Qualys Agent) is stored as ______ Based Findings.
Choose an answer:
Host
Scan
Client
Server
What phase or step of the Qualys Vulnerability Management Lifecycle, produces scan
results containing vulnerability findings?
Choose an answer:
Report
Discover
Remediate
Assess
One of your colleagues would like to build a report to display vulnerability findings over
the last three months (including trending information)? What do you recommend?
Choose an answer:
Build a scan template with the "All" Asset Group as its target.
Build a scan template that uses Host Based Findings.
Build a scan template that sorts findings by Asset Group
Build a scan template that uses Scan Based Findings
What type of scanner appliance (by default) is available to all Qualys users with
"scanning" privileges?
Choose an answer:
Offline Scanner
Virtual Scanner
External (Internet-based) Scanner
Internal Scanner