Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

QUALYS VMDR TRAINING EXAM with 100% verified solutions 2024, Exams of Business Administration

QUALYS VMDR TRAINING EXAM with 100% verified solutions 2024 Which of the following are benefits of scanning in authenticated mode? (choose 2) 1. More vulnerabilities are detected 2. Time saved from manually investigating potential vulnerabilities

Typology: Exams

2023/2024

Available from 06/26/2024

NurseMaryK
NurseMaryK 🇬🇧

3.6

(14)

1.1K documents

1 / 6

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
QUALYS VMDR TRAINING EXAM with
100% verified solutions
2024
Which of the following are benefits of scanning in authenticated
mode? (choose 2)
1. More vulnerabilities are detected
2. Time saved from manually investigating potential vulnerabilities
Which of the following are valid options for scanning targets? (choose
3)
1. Asset Groups
2. IP addressing
3. Asset Tags
What type of scanner appliance (already provisioned within the
Qualys Cloud Platform) is ideal for scanning public facing assets?
External Scanner
Which of the following is NOT a component of a
vulnerability scan? Host Discovery
Which of the following will have the greatest impact on a half red,
half yellow QID? Authentication
What is the maximum number of TCP ports that can participate in the
Host Discovery process?
20
Which of the following items are used to calculate the Business
Risk score for a particular asset group? (choose 2)
Business
Impact
Security Risk
In order to successfully perform an authenticated (trusted) scan,
you must create a(n):
Authentication record
pf3
pf4
pf5

Partial preview of the text

Download QUALYS VMDR TRAINING EXAM with 100% verified solutions 2024 and more Exams Business Administration in PDF only on Docsity!

QUALYS VMDR TRAINING EXAM with

100% verified solutions

Which of the following are benefits of scanning in authenticated mode? (choose 2)

  1. More vulnerabilities are detected
  2. Time saved from manually investigating potential vulnerabilities Which of the following are valid options for scanning targets? (choose
  1. Asset Groups
  2. IP addressing
  3. Asset Tags What type of scanner appliance (already provisioned within the Qualys Cloud Platform) is ideal for scanning public facing assets? External Scanner Which of the following is NOT a component of a vulnerability scan? Host Discovery Which of the following will have the greatest impact on a half red, half yellow QID? Authentication What is the maximum number of TCP ports that can participate in the Host Discovery process? 20 Which of the following items are used to calculate the Business Risk score for a particular asset group? (choose 2) Business Impact Security Risk In order to successfully perform an authenticated (trusted) scan, you must create a(n): Authentication record

Which of the following vulnerability scanning options requires the use of a "dissolvable agent"? Windows Share Enumeration To produce a scan report that includes the results from a specific scan that occurred at a specific point in time, you should select the option in the Report Template. Host Based Findings About how many TCP ports are scanned when using Standard Scan option? 1900 Asset Groups and Asset Tags can be used to effectively customize or fine tune Reports Vulnerability Scans Remediation Policies What is required in order for Qualys to generate remediation tickets? Scan Results need to be processed by Qualys A Policy needs to be created Before you can scan an IP address for vulnerabilities, the IP address must first be added to the. Hosts assets tab What is the 6-step lifecycle of Qualys Vulnerability Management? Discover, Organize Assets, Assess, Report, Remediate, Verify Which of the following components are included in the raw scan results, assuming you do not apply a Search List to your Option Profile? Potential Vulnerabilities Information Gathered Vulnerabilities