Package deal
Qualys Vulnerability Management tests compilation bundle
Qualys Vulnerability Management tests compilation bundle
[Show more]Qualys Vulnerability Management tests compilation bundle
[Show more]Which of the following are benefits of scanning in authenticated mode? (choose 2) 
 
- Fewer confirmed vulnerabilities 
- More vulnerabilities are detected 
- Time saved from manually investigating potential vulnerabilities 
- More accurate scan details correct answer: - More vulnerabilities are de...
Preview 2 out of 8 pages
Add to cartWhich of the following are benefits of scanning in authenticated mode? (choose 2) 
 
- Fewer confirmed vulnerabilities 
- More vulnerabilities are detected 
- Time saved from manually investigating potential vulnerabilities 
- More accurate scan details correct answer: - More vulnerabilities are de...
List the default tracking methods available for adding assets to your "scanning" subscription. (Select Three) 
 
(A) DNS Name 
(B) NetBIOS Name 
(C) CVE ID 
(D)Qualys Host ID 
(E) IP Address correct answer: (A) DNS Name 
(B) NetBIOS Name 
(E) IP Address 
 
Name the phase or step of the Qualys Vul...
Preview 2 out of 13 pages
Add to cartList the default tracking methods available for adding assets to your "scanning" subscription. (Select Three) 
 
(A) DNS Name 
(B) NetBIOS Name 
(C) CVE ID 
(D)Qualys Host ID 
(E) IP Address correct answer: (A) DNS Name 
(B) NetBIOS Name 
(E) IP Address 
 
Name the phase or step of the Qualys Vul...
What is asset management? correct answer: Step 1 in the VMDR lifecycle 
 
What is vulnerability management? correct answer: Step 2 in the VMDR lifecycle 
 
What is threat detection and prioritization? correct answer: Step 3 in the VMDR lifecycle 
 
What is response (patch deployment?) correct ans...
Preview 2 out of 7 pages
Add to cartWhat is asset management? correct answer: Step 1 in the VMDR lifecycle 
 
What is vulnerability management? correct answer: Step 2 in the VMDR lifecycle 
 
What is threat detection and prioritization? correct answer: Step 3 in the VMDR lifecycle 
 
What is response (patch deployment?) correct ans...
Which of the following are benefits of scanning in authenticated mode? (choose 2) correct answer: 1. More vulnerabilities are detected 
2. Time saved from manually investigating potential vulnerabilities 
 
Which of the following are valid options for scanning targets? (choose 3) correct answer: 1...
Preview 1 out of 4 pages
Add to cartWhich of the following are benefits of scanning in authenticated mode? (choose 2) correct answer: 1. More vulnerabilities are detected 
2. Time saved from manually investigating potential vulnerabilities 
 
Which of the following are valid options for scanning targets? (choose 3) correct answer: 1...
Which of the following are benefits of scanning in authenticated mode? (choose 2) correct answer: 1. More vulnerabilities are detected 
2. Time saved from manually investigating potential vulnerabilities 
 
Which of the following are valid options for scanning targets? (choose 3) correct answer: 1...
Preview 1 out of 4 pages
Add to cartWhich of the following are benefits of scanning in authenticated mode? (choose 2) correct answer: 1. More vulnerabilities are detected 
2. Time saved from manually investigating potential vulnerabilities 
 
Which of the following are valid options for scanning targets? (choose 3) correct answer: 1...
At a minimum, with PCI-DSS, organizations must runs scans how often? correct answer: quarterly 
 
With PCI-DSS, if a significant change is made in the network, when must a new scan be performed? correct answer: immediately 
 
With PCI-DSS, internal scans must be conducted by ______________________...
Preview 2 out of 7 pages
Add to cartAt a minimum, with PCI-DSS, organizations must runs scans how often? correct answer: quarterly 
 
With PCI-DSS, if a significant change is made in the network, when must a new scan be performed? correct answer: immediately 
 
With PCI-DSS, internal scans must be conducted by ______________________...
1x sold
The Malware Monitoring option should only be enabled for: 
 
(A) Applications with a "malware" tag 
(B) Internal facing applications 
(C) External facing applications 
(D) Both internal and external facing applications correct answer: (C) External facing applications 
 
Where can you "Ignore" a...
Preview 2 out of 10 pages
Add to cartThe Malware Monitoring option should only be enabled for: 
 
(A) Applications with a "malware" tag 
(B) Internal facing applications 
(C) External facing applications 
(D) Both internal and external facing applications correct answer: (C) External facing applications 
 
Where can you "Ignore" a...
Using the "Search" field (found in the VULNERABILITIES section of the VM Dashboard), which query will produce a list of "patchable" vulnerabilities? 
 
(A)sPatchable:TRUE 
(B)sPatchable:FALSE 
(C)Patchable:FALSE 
(D)Patchable:TRUE correct answer: (D)Patchable:TRUE 
 
Which of the following conv...
Preview 2 out of 9 pages
Add to cartUsing the "Search" field (found in the VULNERABILITIES section of the VM Dashboard), which query will produce a list of "patchable" vulnerabilities? 
 
(A)sPatchable:TRUE 
(B)sPatchable:FALSE 
(C)Patchable:FALSE 
(D)Patchable:TRUE correct answer: (D)Patchable:TRUE 
 
Which of the following conv...
Identify the Qualys application modules that require Cloud Agent. (Choose all that apply) 
 
(A) EDR 
(B) VM 
(C) PM 
(D) FIM correct answer: (A) EDR 
(C) PM 
(D) FIM 
 
A Cloud Agent status indicates the agent uploaded new host data, and an assessment of the host was performed within the Qualys Cl...
Preview 2 out of 11 pages
Add to cartIdentify the Qualys application modules that require Cloud Agent. (Choose all that apply) 
 
(A) EDR 
(B) VM 
(C) PM 
(D) FIM correct answer: (A) EDR 
(C) PM 
(D) FIM 
 
A Cloud Agent status indicates the agent uploaded new host data, and an assessment of the host was performed within the Qualys Cl...
Which of these is a reason for using a Patch Management solution? 
 
(A) To monitor logs on the asset 
(B) To scan for viruses 
(C) To close open ports and services 
(D) To address vulnerabilities correct answer: (D) To address vulnerabilities 
 
Which of these Qualys solutions would you use to add...
Preview 2 out of 8 pages
Add to cartWhich of these is a reason for using a Patch Management solution? 
 
(A) To monitor logs on the asset 
(B) To scan for viruses 
(C) To close open ports and services 
(D) To address vulnerabilities correct answer: (D) To address vulnerabilities 
 
Which of these Qualys solutions would you use to add...
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Stuvia is a marketplace, so you are not buying this document from us, but from seller Classroom. Stuvia facilitates payment to the seller.
No, you only buy these notes for $21.99. You're not tied to anything after your purchase.
4.6 stars on Google & Trustpilot (+1000 reviews)
82871 documents were sold in the last 30 days
Founded in 2010, the go-to place to buy study notes for 14 years now