Download as xlsx, pdf, or txt
Download as xlsx, pdf, or txt
You are on page 1of 6

Optio

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
Soal
How many TCP ports are targeted when using the "full" scan option?
Which of the following identifies the data or evidence collected from a host that produces a specific vulnerability finding?
Which of the following tasks can be accomplished using "Asset Search" wwithin Vulnerability Management application? (choose
The "Vulnerability Detection" option in an Option Profile will NOT allow you to:
Which of the following items are used to calculate the Business Risk score for a particular asset group? (choose 2)
Why is it beneficial to set the Business Impact of an Asset Group?
What is the name given to a custom list of QIDs taken from the Qualys KnowledgeBase?
Which of the following does not accurately describe a behavior or characteristic of a Remediation Policy?
Which of the following is NOT required to launch a vulnerability scan?
Select the option below that contains the correct order or sequence of events.
What are the different types of vulnerability identifiers found in the Qualys KnowledgeBase? (choose 3)
Which of the following mechanisms are presently used by Qualys VM to collect the data needed to perform host vulnerability as

By default, the first user added to a new Business Unit becomes a ____________ for that unit.
What type of Qualys reports require a Report Template?
Which of the following are components of a Business Unit? (choose 2)
What is the default number of “Host Discovery” TCP ports?
The Service Detection Module can detect over ________ services running on TCP and UDP ports.
Which port scanning option targets about 1900 TCP ports?
Which of the following modules are a part of the vulnerability scanning process? (choose 3)
To produce a vulnerability report containing the results from a specific and distinct scan, you should select ______ Based Findi
Which operating system is NOT support by Qualys Cloud Agents?
Which of the following can be customized using a KnowledgeBase "Search List"? (choose 3)
Which of the following can be used to purge the Host Based Finding of a host?
What are some of the present options for adding security to Qualys user accounts? (choose 3)
What does it mean when a “blue key” icon is associated with a QID in the Qualys KnowledgeBase?
Which of the following can be successfully scheduled by someone with scanning privileges?
Which of the following is never included in the raw scan results?
Which of the following is the default tracking method used by Qualys Cloud Agents?
Agent data (data collected by a Qualys Agent) is stored as ______ Based Findings.
Which of the following are benefits of scanning in authenticated mode? (choose 2)
Which of the
What type of following are valid options
scanner appliance (alreadyfor scanning targets?
provisioned (choose
within the Qualys3)Cloud Platform) is ideal for scanning public facing asset

Which of the following is NOT a component of a vulnerability scan?


Which of the following will have the greatest impact on a half red, half yellow QID?
What is the maximum number of TCP ports that can participate in the Host Discovery process?
Which of the following items are used to calculate the Business Risk score for a particular asset group? (choose 2)
In order to successfully perform an authenticated (trusted) scan, you must create a(n):
Multiple Remediation Policies are evaluated:
A search list contains a list of
Dynamic Asset Tags are updated every time you..
As a Manager in Qualys, which activities can be scheduled?
What does it mean when a “pencil” icon is associated with a QID in the Qualys KnowledgeBase?
Which item is not mandatory for launching a vulnerability scan?
About how many services can Qualys detect via the Service Detection Module?
In a new Option Profile, which authentication options are enabled by default?
Which of the following vulnerability scanning options requires the use of a “dissolvable agent”?
To produce a scan report that includes the results from a specific scan that occurred at a specific point in time, you should sele
About how many TCP ports are scanned when using Standard Scan option?
Asset Groups and Asset Tags can be used to effectively customize or fine tune … (choose all that apply)
What is required in order for Qualys to generate remediation tickets?
Before you can scan an IP address for vulnerabilities, the IP address must first be added to the.
What is the 6-step lifecycle of Qualys Vulnerability Management?
To exclude a specific QID/vulnerability from a vulnerability scan you would?
Which of the following components are included in the raw scan results, assuming you do not apply a Search List to your Optio
Which of the following types of items can be found in the Qualys KnowledgeBase?
Which three features of the Vulnerability Management application can be customized using a KnowledgeBase "Search List"?
What type of Search List adds new QIDs to the list when the Qualys KnowledgeBase is updated?
When a host is removed from your subscription, the Host Based Findings for that host are.
Which of the following is NOT a valid target for launching a scan?
Which of the following can be used to purge the Host Based Finding of a host?
The "Vulnerability Detection" options in an Option Profile will NOT allow you to:
Which of the following tasks can be accomplished using "Asset Search" within the Vulnerability Management application? (choo
Which asset tagging rule engines, support the use of regular expressions? (choose 3)
Which of the following is never included in the raw scan results?
Which of the following best describes a “Dynamic” Search List?
To achieve the most accurate OS detection results, scans should be performed in __________ mode.
To enumerate installed software applications on targeted hosts, scans should be performed in __________ mode.
What type of scanner appliance (by default) is available to all Qualys users with "scanning" privileges?
What color code is used in the Qualys KnowledgeBase to identify QIDs that exhibit predictable (but different) results in the pres
To produce a "trend" report that covers the last twelve months of vulnerability activity, you should select ______ Based Finding
What is the name given to a custom list of QIDs taken from the Qualys KnowledgeBase?
Which of the following can be used to purge the Host Based Finding of a host?
Which asset tagging rule engines, support the use of regular expressions? (choose 3)
How often are “Dynamic” Asset Tags updated?
Which of the following would you most likely include or create, to perform an “authenticated” scan that only targets “
What is the 6-step lifecycle of Qualys Vulnerability Management?
Jawaban
65535
Compliance
Create an Asset Tag ?
Edit a list of host assests
Perform
BusinessaImpact
scan that excludes specific TCP port numbers
Security Risk
It's used to calculate the Business Risk
Search List
A Remediation policy can be configured to ignore certain vulnerability QIDs.
Authentication Record
1)
CVEAdd
IDhost to subscription, 2) Scan host, 3) Use host as report source
QID
Every
Agentstime new assessment data is collected (scanner or agent)
Scanners
Unit
ScanManager
Report
Map Report
Asset Groups
Users
1900
600
Standard
Port Scanning
Host Discovery
Scan
DOS
Remediation Policies
Option Profiles
Perform a scan that
Enable two-factor doesn't target any QIDs.
authentication
Set high password strength requirements
Authentication
Reports is required for successful QID testing
Scans
List of fixed vulnerabilities
AGENT (Qualys Host ID)
Host
More vulnerabilities are detected ?
Time saved from manually investigating potential vulnerabilities
IP addressing
Asset Tags
External Scanner
Host Discovery
Host Discovery
20
Business Impact
Security Risk
Authentication Record
From top to bottom
QIDs
Run a scan
Reports
Scans
The QID has been edited
Authentication Record

Windows 600
None *x
Windows Share Enumeration
Host Based Findings

Vulnerability Scans 1900


Remediation
Scan ResultsPolicies
need to be processed by Qualys
A Policy needs to be created
Host Assets tab
Discover, Organize Assets, Assess, Report, Remediate, Verify
Place the QID
Information in a search list, and exclude that search list from within the Option Profile.
Gathered
Vulnerabilities
Configuration data (Information Gathered)
Confirmed Vulnerabilities
Remediation Policies
Option Profiles
Dynamic
Purged
Seach list
Remove the host from your subscription
Perform
Create an a scan
Assetthat
Tagexcludes specific TCP port numbers.
Edit
Asseta Name
list of host assets
Contains
Operating System Regular Expression
List of detected confirmed vulnerabilities
Automatically updated
Authenticated
Verbose
External Scanner
Yellow
Host
Search List

Asset Name Contains, Software Installed, Operating System Regular Expression

Authenticated Record
Discover, Organize Assets, Assess, Report, Remediate, Verify

You might also like