Qualys Questions 1
Qualys Questions 1
Original
List the default tracking methods available for adding assets to your "scanning" subscription.
(Select Three)
(A) Report
(B) Discover
(C) Remediate
(D) Assess
(D) Assess
Which of the following is the default tracking method used by Qualys Cloud Agents?
(A) IP Address
(B) Qualys Host ID
(C) DNS Name
(D) NetBIOS Name
(B) Qualys Host ID
Which of the following are phases of the Vulnerability Management Lifecycle?
(A) Maintenance
(B) Remediate
(C) Design
(D) Discover
(E) Report
(B) Remediate
(D) Discover
(E) Report
Name the type of scanner appliance (by default) available to all Qualys users with "scanning"
privileges?
(A) Manager
(B) Administrator
(C) Scanner
(D) Unit Manager
(A) Manager
Potential vulnerabilities are automatically verified. (True/ False)
(A) True
(B) False
(B) False
A severity ____________ vulnerability is the most urgent.
(A) Level 5
(B) Level 1
(C) Level 2
(D) Level 4
(A) Level 5
Which of the following criteria can be used to create a dynamic Search List? (Select Three).
(A) Manually
(B) Explicit
(C) By Default
(D) Automatically
(A) Manually
What are the primary methods available in Qualys VM, for grouping, labeling, and organizing
host assets? (Select Two)
(A) Authorized
(B) Administrative
(C) Temporary
(D) Authenticated
(D) Authenticated
Why is it beneficial to configure the Business Impact of an Asset Group?
(A) Scanner's
(B) Agent's
(C) Connector's
(D) API's
(A) Scanner's
Qualys Cloud Agent is installed as a local system service on each host as ___________
agent/agents per host.
(A) Multiple
(B) Zero
(C) One
(D) Twin
(C) One
You are building an Options Profile that targets "Zero Day" vulnerabilities. Which "Scan" option
will allow you to use a "Zero Day" Search List to achieve this objective?
(A) Correct
(B) Incorrect
(A) Correct
The primary modules that collect the host configuration data are:
(Select Four)
(A) None
(B) Standard Scan
(C) Light Scan
(D) Full
(D) Full
Which module does a Qualys Scanner Appliance load to determine the LIVE/DEAD status of
targeted hosts?
(A) IP address
(B) Search List
(C) Asset Tag
(D) Asset Group
(B) Search List
To scan the IP addresses in your Qualys subscription you first need to add:
(A) Authenticated
(B) Authorized
(C) Administrative
(D) Scanning
(A) Authenticated
Which of the following are required to launch a vulnerability scan? (Select Three)
(A) Incorrect
(B) Correct
(A) Incorrect
Which report type is NOT created from a Report Template?
(A) Technical
(B) Executive
(C) Scan
(D) Trend
(D) Trend
Identify the report types that can be scheduled: (Select Three)
(A) Administrator
(B) Manager
(C) Scanner
(D) Auditor user
(B) Manager
What are the two components of every Business Unit?
(A) Vendors
(B) Assets
(C) Users
(D) Suppliers
(B) Assets
(C) Users
A business unit can have more than one Unit Manager.
(A) Incorrect
(B) Correct
(B) Correct
Only ______________ users can edit the default security options for your Qualys account.
(A) Administrators
(B) Manager
(C) Auditor user
(D) KnowledgeBase
(B) Manager
Which user role cannot scan assets but can view reports?
(A) Manager
(B) Reader
(C) Scanner
(D) Unit Manager
(B) Reader
Remediation policies for the teams dedicated to specific groups of host assets can be constructed
using _____________ Groups.
(A) Asset
(B) Application
(C) Scanning
(D) Vulnerability
(A) Asset
___________ can be set on your remediation policy to ensure you are tracking the remediation
of vulnerabilities on host systems is occurring in a timely manner.
(A) Filtering
(B) Processing
(C) Deadlines
(D) Ordering
(C) Deadlines
What are the two components of every Remediation Policy?
(A) Results
(B) Actions
(C) Conditions
(D) Graphics
(B) Actions
(C) Conditions
In which order are the Multiple Remediation Policies evaluated?
1. Which of the following tasks are performed by a Qualys patch job? (choose 2)
Choose all that apply:
3. By default, which of the following factors are used by the VMDR Prioritization
Report, to prioritize vulnerabilities? (choose 3) Choose all that apply:
Vulnerability Age
Real-Time Threat Indicators
Attack Surface
5. Qualys Cloud Connector will allow you to enumerate host instances and collect
useful metadata from which of the following cloud platforms? (choose 3) Choose
all that apply:
Amazon AWS
Google Cloud Platform
Microsoft Azure
6. When a Qualys Scanner Appliance is used for data collection, which of the
following guidelines will help to reduce the number of “unidentified” assets
appearing in Asset Inventory? Choose all that apply:
9. Which “Active Threat” category includes attacks that require little skill and do not
require additional information? Choose an answer:
Easy Exploit
10. The “sniffing” interface of a Qualys Passive Sensor, is designed to connect to what
type of network devices? (choose 2) Choose all that apply:
TAP
Switch (SPAN Port)
11. Which of the following identifies the correct order of the VMDR Lifecycle phases?
Choose an answer:
12. Which of the following statements about Qualys Patch Management’s “patch
sources” is false? Choose an answer:
13. If Qualys Passive Sensor discovers an asset that is not managed within your
Qualys account, it is placed in the ____________ section of the Asset Inventory
application. Choose an answer:
Unmanaged
14. Which type of Dashboard Widget can be configured to change color, as its
tracked data reaches specific conditions or threshold levels? Choose an answer:
count
15. From the PATCHES section in the Patch Management application, which query
produces a list of “uninstallable” patches? Choose an answer:
isRollback:true
16. Which Qualys application, provides the Real-Time Threat Indicators (RTIs) used in
the VMDR Prioritization Report? Choose an answer:
Threat Protection
17. By default, If you attempt to install Qualys Cloud Agent from the VMDR
“Welcome” page, what Activation Key will be used? Choose an answer:
18. Which “Active Threat” category includes vulnerabilities that are actively attacked
and have no patch available? Choose an answer:
Zero Day
19. Qualys provides virtual scanner appliances for which of the following cloud
platforms? (choose 3) Choose all that apply:
Amazon AWS
Google Cloud Platform
Microsoft Azure
20. Which of the following tasks are performed by a patch assessment scan? (choose
2) Choose all that apply:
21. The Qualys Asset Inventory application distinguishes your asset inventory using
which of the following categories? (choose 3) Choose all that apply:
Hardware
Operating System
Software
22. **Which Qualys sensors collect the type of data needed to perform vulnerability
assessments? (choose 2) Choose all that apply:
Scanner Appliance
Passive Sensor
23. Which Qualys application module is NOT included in the Default VMDR
Activation Key? Choose an answer:
24. Which Asset Tag rule engine, will allow you to label or tag assets, using hardware,
software, and OS categories? Choose an answer:
Asset Inventory
25. In the Qualys Asset Inventory application, if adequate data exists (for Qualys to
properly categorize an asset’s hardware or OS), but they have yet to be added to
the asset catalog, they will potentially be listed as __________ . Choose an answer:
Unknown
26. Which of the following frequencies, can be used to schedule a Patch Deployment
Job? (choose 3) Choose all that apply:
Weekly
Monthly
Daily
27. Which phase of the VMDR Lifecycle is addressed by Qualys Patch Management
(PM)? Choose an answer:
Response
28. Presently, you can add up to _____ patches to a single job. Choose an answer:
**200
29. Which Qualys technology provides a patch download cache, to achieve a more
efficient distribution of downloaded patches, to local agent host assets? Choose
an answer:
30. Which of the following conventions can be used to include or assign host assets
to a job? (choose 2) Choose all that apply:
Asset Tag
Asset Name
@ 2021