Qualysguard Vulnerability Management
Qualysguard Vulnerability Management
Qualysguard Vulnerability Management
vulnerabilities. I am sharing this exam guide that will help you to pass Vulnerability Management
(VM) exam. You will earn Qualys Certified Specialist certificate once you passed the exam. all
questions and answers are verified and recently updated.
Choose an answer:
verified answer
2. Which of the following are valid options for scanning targets? (choose 3)
Choose an answer:
Asset Groups
Domain Name
IP addressing
Asset Tags
Search Lists
MAC Address
3. What type of scanner appliance (already provisioned within the Qualys Cloud Platform) is ideal for
scanning public facing assets?
Choose an answer:
Offline Scanner
Virtual Scanner
External Scanner
Internal Scanner
4. Which of the following is NOT a component of a vulnerability scan?
Choose an answer:
Host Discovery
OS Detection
Port Scanning
Business Impact
5. Which of the following will have the greatest impact on a half red, half yellow QID?
Choose an answer:
Share Enumeration
Scan Dead Hosts
Authentication
Authoritative Option
6. What is the maximum number of TCP ports that can participate in the Host Discovery process?
Choose an answer:
10
65535
1900
20
7. Which of the following items are used to calculate the Business Risk score for a particular asset
group? (choose 2)
Choose an answer:
Business Impact
Security Risk
CVSS Base
CVE ID
8. In order to successfully perform an authenticated (trusted) scan, you must create a(n):
Choose an answer:
Authentication Record
Search List
Asset Map
Report Template
9. Multiple Remediation Policies are evaluated:
Choose an answer:
Choose an answer:
QIDs
Host Assets
Applications
Asset Groups
Choose an answer:
Run a scan
Create a remediation policy
Run a report
Search the KnowledgeBase
Choose an answer:
Asset Searches
Updates to the KnowledgeBase
Maps
Reports
Scans
13. What does it mean when a “pencil” icon is associated with a QID in the Qualys KnowledgeBase?
Choose an answer:
Target Hosts
Option Profile
Authentication Record
Scanner Appliance
15. About how many services can Qualys detect via the Service Detection Module?
Choose an answer:
13
512
20
600
16. By default, the first user added to a new Business Unit becomes a ____________ for that unit.
Choose an answer:
Auditor
Administrator
Reader
Scanner
Unit Manager
17. In a new Option Profile, which authentication options are enabled by default?
Choose an answer:
All
Unix
Windows
None
18. Which of the following vulnerability scanning options requires the use of a “dissolvable agent”?
Choose an answer:
Choose an answer:
20. About how many TCP ports are scanned when using Standard Scan option?
Choose an answer:
1900
10
20
65535
21. Asset Groups and Asset Tags can be used to effectively customize or fine tune … (choose all that
apply)
Choose an answer:
Reports
Vulnerability Scans
Remediation Policies
Search Lists
22. What is required in order for Qualys to generate remediation tickets? (choose all that apply)
Choose an answer:
23. Before you can scan an IP address for vulnerabilities, the IP address must first be added to the.
Choose an answer:
Choose an answer:
Choose an answer:
Disable the QID in the Qualys KnowledgeBase.
Ignore the vulnerability from within a report.
Place the QID in a search list, and exclude that search list from within the Option Profile.
You cannot exclude QID/Vulnerabilities from vulnerability scans.
26. Which of the following components are included in the raw scan results, assuming you do not
apply a Search List to your Option Profile? (choose all that apply)
Choose an answer:
Host IP
Option Profile Settings
Potential Vulnerabilities
Information Gathered
Vulnerabilities
27. Which of the following types of items can be found in the Qualys KnowledgeBase? (choose all
that apply)
Choose an answer:
Potential Vulnerabilities
Configuration data (Information Gathered)
Confirmed Vulnerabilities
Asset Groups
Remediation Tickets
28. Which three features of the Vulnerability Management application can be customized using a
KnowledgeBase "Search List"?
Choose an answer:
Authentication Records
Report Templates
Remediation Policies
Option Profiles
29. What type of Search List adds new QIDs to the list when the Qualys KnowledgeBase is updated?
Choose an answer:
Active
Static
Dynamic
Passive
31. When a host is removed from your subscription, the Host Based Findings for that host are.
Choose an answer:
Ranked
Purged
Ignored
Archived