Download Qualys_80%25 PDF

TitleQualys_80%25
File Size132.5 KB
Total Pages13
Table of Contents
                            What does it mean when a “pencil” icon is associated with a QID in the QualysGuard KnowledgeBase?
Which of the following are components or processes of an asset discovery map? (choose all that apply)
What is the maximum number of service detection tests used by the Service Detection Module?
A search list contains a list of …
Why is it important to set the Business Impact of an Asset Group?
To produce a scan report that includes all of the cumulative scan data in your subscription, you should select the _______________ option in the Scan Report Template.
Which item is NOT mandatory for launching a vulnerability scan?
Multiple Remediation Policies are evaluated:
If a host IP has not been scanned in over 30 days, and the host is in a DHCP environment, what should be done to ensure data integrity?
What are some ways to add security to a user’s account?
What is required in order for QualysGuard to generate remediation tickets? (choose all that apply)
Map results are an excellent source for... (choose all that apply)
As a Manager in QualysGuard, which activities can be scheduled?
The information contained in a map result can help network administrators to identify _______________ devices.
To launch a successful map, you must provide the following information/components. (choose all that apply)
What is the 6-step lifecycle of QualysGuard Vulnerability Management?
Which of the following types of items can be found in the QualysGuard KnowledgeBase? (choose all that apply)
Search Lists can be applied to which other QualyGuard components? (choose all that apply)
Which Vulnerability Detail (found in a Scan Template) identifies the data or information collected and returned by the QualysGuard scanner appliance?
The Asset Search tab can be used to... (choose all that apply)
To exclude a specific QID/vulnerability from a vulnerability scan you would:
By default, the first user added to a new Business Unit becomes a ____________ for that unit.
What purpose do Option Profiles serve?
What report is provided by Qualys, by default, as a way of finding the most vulnerable hosts in our environment?
Which of the following items are used to calculate the Business Risk score for a particular asset group? (choose all that apply)
About how many TCP ports are scanned when using Standard Scan option?
What is the maximum number of TCP ports that can participate in the Host Discovery process?
Which of the following is NOT a component of a vulnerability scan?
In order to successfully perform an authenticated (trusted) scan, you must create a(n):
To produce a scan report that includes the results from a specific scan that occurred at a specific point in time, you should select the _______________ option in the Report Template.
What does the S in the ASLN section of Map Results really mean?
What does the "Import from Library" function do, in the Report Templates tools section of the UI?
A half-red/half-yellow QID in the QualysGuard KnowledgeBase will typically appear as a confirmed vulnerability (red) within the scan results, with the inclusion of this scan option.
Which of the following components are included in the raw scan results, assuming you do not apply a Search List to your Option Profile? (choose all that apply)
What scanning option allows QualysGuard to get a more accurate reading of the host operating system?
Which of the following mapping/scanning options is enabled by default?
What type of Search List adds new QIDs to the list when the QualysGuard KnowledgeBase is updated?
Which of the following vulnerability scanning options requires the use of a “dissolvable agent”?
                        
Document Text Contents
Page 2

Applications

QIDs

Asset Groups

Host Assets

Why is it important to set the Business Impact of an Asset Group?

Business Impact illustrates the overall risk of the organization when doing Patch

Reporting
There is no reason to set a Business Impact, it is optional and rarely used

The default setting is all that is needed, Business Impact doesn't change reports

Qualys cannot determine the importance of an asset to an individual organization

To produce a scan report that includes all of the cumulative scan data in your
subscription, you should select the _______________ option in the Scan Report
Template.

Static

Host Based Findings

Scan Based Findings

Dynamic

Which item is NOT mandatory for launching a vulnerability scan?

Authentication Record

Option Profile

Page 7

Construct Search Lists

Build Asset Groups

Create Report Templates

Create Option Profiles

To exclude a specific QID/vulnerability from a vulnerability scan you would:

You cannot exclude QID/Vulnerabilities from vulnerability scans.

Ignore the vulnerability from within an integrated workflow report.

Disable the QID in the QualysGuard KnowledgeBase.

Place the QID in a saved search list, and exclude that search list within the

Vulnerability Detection section of the option profile.

By default, the first user added to a new Business Unit becomes a ____________
for that unit.

Administrator

Reader

Unit Manager

Contact

Scanner

What purpose do Option Profiles serve?

Option Profiles allow for customization of the entire host discovery, mapping and

scanning process as well as customization of several performance options

Similer Documents