Download as pdf or txt
Download as pdf or txt
You are on page 1of 21

1. What HTTP method(s) are supported for Form Submissions in the Option Profile?

(select two)

Choose an answer:
HEAD
OPTIONS
GET
POST

2. The __________ is a staging area for Web applications discovered by scans in the Qualys
Vulnerability Management (VM) application.
Choose an answer:
KnowledgeBase
Dashboard
Library
Catalog

3. What technique does WAS use to automate the detection of Web application vulnerabilities?

Choose an answer:
Hashing
Stack Fingerprinting
Fault Injection
Covert Channels

4. Which of the following is NOT a WAS object you can tag?

Choose an answer:
Web Applications
Option Profiles
Reports
Scan Results

5. The Malware Monitoring option should only be enabled for:

Choose an answer:
Applications with a “malware” tag
Internal facing applications
External facing applications
Both internal and external facing applications

6. When launching a Web Application Scan, you have the option to override some default settings.
Which of the following options can NOT be overridden?

Choose an answer:
Option Profile
Crawl Scope (this might be right)
Scanner Appliance
Authentication Record
7. What attack proxies can you integrate with Qualys WAS?

Choose an answer:
BURP
W3af
ZAP
WebScarab

8. Which WAS feature will help you avoid scanning common links too many times?

Choose an answer:
Redundant Links
Malware Monitoring
Header Injection
DNS Override

9. The Explicit URLs to Crawl field may contain (select two):


Choose an answer:
URLs both inside and outside of the Crawl Scope
URLs outside of the Crawl Scope
URLs within the Crawl Scope
URLs not automatically discovered by WAS

10. What are your options for applications found in your Catalog? (select three)

Choose an answer:
Mark as Rogue
Mark as Scanned
Mark as Approved
Add to Subscription

11. Which Form Submission method will only test login forms?

Choose an answer:
NONE
POST & GET
GET
POST

12. A Search List contains a list of:

Choose an answer:
Username/Password combinations
QIDs from the Qualys KnowledgeBase
Crawling hints
Common input parameters
13. Which technique can WAS use to bypass authentication?

Choose an answer:
Custom Authentication Record
Burp Integration
Selenium Authentication Script
Header Injection

14. Which WAS feature uses a virtual machine farm to detect a potentially malicious script in a
Web application?

Choose an answer:
Progressive Scanning
Malware Monitoring
Redundant Links
DNS Override

15. Potential Web app vulnerabilities are color coded:

Choose an answer:
Blue
Red
Yellow
Green

16. If the Web application URL is http://demo06.qualys.com, which Crawl Scope should you select
in order to keep http://training.demo06.qualys.com in the application scope?

Choose an answer:
Limit to URL hostname and specified subdomain
Limit at or below URL hostname
Limit to URL hostname and specified domains
Limit to content located at or below URL subdirectory

17. Which of the following scanning challenges can be overcome using the WAS Progressive
Scanning feature? (select two)
Choose an answer:
Scanning a web application with hard-to-find links
Scanning a web application with tens of thousands of links
Scanning a web application with multiple IP addresses
Scanning a web application that would normally exceed the amount of time available within a limited
scanning window.

18. Which of the following Crawl Exclusion Lists can be generated using a WAS Application
Sitemap? (select two)

Choose an answer:
White List
Black List
Post Data Black List
Logout regular expression

19. What happens when you use the “Remove Web Assets” feature? (select two)

Choose an answer:
WAS purges (deletes) all of your application data for the removed application
A final web application scan is performed before purging the application
The application is removed from your WAS subscription
All application data is saved in the WAS catalog

20. Which of the following is NOT a valid vulnerability status?

Choose an answer:
Active
Re-opened
New
Fixed
Exploited

21. Using the "Crawling Hints" setting, WAS can crawl all links and directories found in: (select
two)

Choose an answer:
Index.html
Sitemap.xml
Robots.txt
default.css

22. A Search List can be used to customize a (Select all the apply):

Choose an answer:
Web Application Scan
Scan Report
Crawl Exclusions List
Web Application Report

23. If your application URL is: www.example.org/new/ , which of the of following links will be
crawled if the Crawl Scope is set to "Limit to content at or below URL subdirectory"? (select two)
Choose an answer:
www.example.org/existing
www.example.org
www.example.org/new/customers
www.example.org/new

24. Using the Administration Utility, which of the following scan permissions can be assigned to a
user role? (select three)
Choose an answer:
Cancel WAS Scan
Delete WAS Scan
Update WAS Scan
Launch WAS Scan

25. Confirmed Web app vulnerabilities are color coded:

Choose an answer:
Red
Green
Blue
Yellow

26. Where can you “Ignore” a vulnerability for a Web Application? (select two)

Choose an answer:
Scorecard Report
Scan Report
Web Application Report
Detections Tab

27. What is the max number of hours a scan can continue on WAS before it times out?
Choose an answer:
16 hours
4 hours
24 hours
48 hours

28. In Qualys WAS, you can schedule (select two):

Choose an answer:
Reports
BURP scans
Maps
Scans

29. Which WAS feature allows you to quickly change your Web Application’s resolved IP address?

Choose an answer:
Malware Monitoring
Progressive Scanning
Redundant Links
DNS Override
30. How can you get your scan to follow a business workflow (such as a shopping cart
transaction)?
Choose an answer:
Use a Selenium Script to record and replay the workflow
Use a Custom Authentication Record
Use a Crawl Exclusion List

Use DNS Override


at October 13, 2018 8 comments:
Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest
Labels: qualys web application scanning exam answers, qualys web application scanning exam dumps, qualys web application
scanning tutorial

Wednesday, October 10, 2018

Qualys Guard Policy Compliance Exam Dumps

Hi Friends,

In this post, I will share the complete exam guide for Qualys Guard Policy
Compliance you just need to follow the guide to pass this exam all answers are verified.

Note: All correct answers are highlighted with yellow color.


1.The 'scope' of a policy can be defined using:
Choose an answer:
Search Lists
Both Asset Groups and Asset Tags
Asset Tags
Asset Groups

2.The Security Assessment Questionnaire application provides compliance


coverage for __________ controls.
Choose an answer:
Compensating
Technical
Deterrent
Process (Administrative)

3. Which of the following user-defined controls (UDCs) can *only* be used with
a Unix host?
Choose an answer:
Registry Value Content Check
File Content Check
File Integrity Check
WMI Query Check

4. What user role is only usable in the Policy Compliance application?

Choose an answer:
Auditor
Manager
Reader
Scanner

5. Authentication issues can be identified by: (choose two)


Choose an answer:
Creating an Interactive Report
Creating a Scorecard Report
Creating an Authentication Report
Viewing the raw Scan Results

6. Which of the following user-defined controls (UDCs) can *only* be used with
a Windows host? (choose two)
Choose an answer:
WMI Query Check
File Integrity Check
File Content Check
Registry Value Content Check

7. Which “Root Delegation” services can be used to perform a Qualys


compliance scan? (choose three)
Choose an answer:
Thycotic
Sudo
PowerBroker
Pimsu

8. Which user roles have access to the Policy Compliance application, by


default? (choose two)
Choose an answer:
Scanner
Auditor
Manager
Unit Manager

9. A Policy Report displays PASS/FAIL results for each control by comparing


the policy's __________ values, to the host's __________ values.
Choose an answer:
approximate, actual
expected, actual
actual, expected
actual, relative

10. The three basic components of every policy are:


Choose an answer:
Benchmarks, frameworks, and regulations
Search Lists, option profiles, and authentication records
Technologies, controls, and assets
Readers, scanners, and auditors

11. What type of report allows you to request an exception for a failed policy
control?
Choose an answer:
Interactive Report
Policy Report
Authentication Report
Scorecard Report

12. Which SAQ campaign member(s) participate in a 4-stage workflow?


(choose three)
From book
Choose an answer:
Auditor
Recipient
Approver
Reviewer

13. The Auditor role can perform the following tasks within the Policy
Compliance application: (Choose three)
Choose an answer:
Run compliance scans
Handle exception requests
Create reports
Edit policies

14. When launching a compliance scan, you must select a: (choose two)
Choose an answer:
Policy name
Scan target
Search List
Compliance Profile

15. Which SAQ campaign member(s) participate in a 3-stage workflow?


(choose two)
Choose an answer:
Reviewer
Approver
Auditor
Recipient

16. What policy creation method requires at least one successful compliance
scan?
Choose an answer:
Existing Host
Empty Policy
XML File
Policy Library

17. What is the appropriate cardinality for a control that defines a "Prohibited
Software" list?
Choose an answer:
Matches
Does Not Contain
Contains
Intersects
18. What policy creation method allows you to use a locked policy which has
been reviewed and certified?
Choose an answer:
XML File
Empty Policy
Existing Host
Policy Library

19. Which of the following options are available for creating a policy in Qualys
Policy Compliance? (Choose three)
Choose an answer:
Create a policy from an existing host
Create from Scratch
Import one from the Qualys Library
Import policy from a CSV file

20. Which user-defined control (UDC) can be used to enumerate the list of
running processes on a Windows host?
Choose an answer:
WMI Query Check
File Integrity Check
Registry Value Content Check
File Content Check

21. Which user-defined control (UDC) will allow you to check the status of the
'PermitRootLogin' setting, on a Unix host?
Choose an answer:
Registry Value Content Check
File Content Check
File Integrity Check
WMI Query Check

22. A Qualys Compliance Scan collects host ‘data points’ which serve as the __________ values
for each control test.
Choose an answer:
Approximate
Actual
Relative
Expected
23. If you want to scan an Apache Web Server (running on a Unix host), which
of the following authentication records will you need to create?

Choose an answer:
Apache authentication
Windows authentication
Unix authentication
Both Apache and Unix authentication

24. Which of the following is NOT a valid compliance scanning target?


Choose an answer:
Asset Group
IP Address
Asset Tag
Domain Name

25. All user defined controls (UDCs) are numbered __________ and greater.

Choose an answer:
100
1000
10000
100000

26. Which user roles require extended privileges to access the Policy
Compliance application? (choose two)
Choose an answer:
Auditor
Scanner
Manager
Reader
27. What type of report provides summary statistics that allow you to
compare multiple policies, side-by-side?
Choose an answer:
Interactive Report
Scorecard Report
Policy Report
Authentication Report

28. Which of the following tests can be performed only when the Dissolvable Agent is enabled?
(choose three)
Choose an answer:
Windows Directory Search
Windows Share Enumeration
Password Auditing
WMI Query Check

29. Which “Authentication Vault” services can be used to perform a Qualys


compliance scan? (Choose two)
Choose an answer:
Cyber-Ark
PowerBroker
Thycotic
Pimsu

30. Which is the only SAQ campaign member to participate in a 2-stage


workflow?
Choose an answer:
Auditor
Reviewer
Recipient
Approver

If you still need any support you may contact me at [email protected]

at October 10, 2018 1 comment:


Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest
Labels: qualys policy compliance exam answers, qualys policy compliance exam guide

Tuesday, October 9, 2018


Qualys Guard Vulnerability Management Dumps

Qualysguard is one of the known vulnerability management tool that is used to scan the technical
vulnerabilities. I am sharing this exam guide that will help you to pass Vulnerability Management (VM)
exam. You will earn Qualys Certified Specialist certificate once you passed the exam. all questions and
answers are verified and recently updated.

Important Exam Tips:


1. You have five attempts to pass this exam
2. The test is linear, no going back to an older question
3. The minimum passing score is 75%
4. The exam can be taken anytime make sure your login session should be valid.
5. 30 questions with Multiple choices

Note: All correct answers are highlighted with yellow color.


1. Which of the following are benefits of scanning in
authenticated mode? (choose 2)
Choose an answer:

Fewer confirmed vulnerabilities


More vulnerabilities are detected
Time saved from manually investigating potential vulnerabilities
More accurate scan details
verified answer

2. Which of the following are valid options for scanning


targets? (choose 3)
Choose an answer:

Asset Groups
Domain Name
IP addressing
Asset Tags
Search Lists
MAC Address

3. What type of scanner appliance (already provisioned


within the Qualys Cloud Platform) is ideal for scanning
public facing assets?
Choose an answer:

Offline Scanner
Virtual Scanner
External Scanner
Internal Scanner

4. Which of the following is NOT a component of a


vulnerability scan?
Choose an answer:

Host Discovery
OS Detection
Port Scanning
Business Impact

5. Which of the following will have the greatest impact on a


half red, half yellow QID?
Choose an answer:

Share Enumeration
Scan Dead Hosts
Authentication
Authoritative Option
6. What is the maximum number of TCP ports that can
participate in the Host Discovery process?
Choose an answer:

10
65535
1900
20

7. Which of the following items are used to calculate the


Business Risk score for a particular asset group? (choose
2)
Choose an answer:

Business Impact
Security Risk
CVSS Base
CVE ID

8. In order to successfully perform an authenticated


(trusted) scan, you must create a(n):
Choose an answer:

Authentication Record
Search List
Asset Map
Report Template

9. Multiple Remediation Policies are evaluated:


Choose an answer:

From top to bottom


From bottom to top
Based on the rule creation date
In no specific order

10. A search list contains a list of .


Choose an answer:

QIDs
Host Assets
Applications
Asset Groups

11. Dynamic Asset Tags are updated every time you..


Choose an answer:

Run a scan
Create a remediation policy
Run a report
Search the KnowledgeBase

12. As a Manager in Qualys, which activities can be


scheduled?
Choose an answer:

Asset Searches
Updates to the KnowledgeBase
Maps
Reports
Scans

13. What does it mean when a “pencil” icon is associated


with a QID in the Qualys KnowledgeBase?
Choose an answer:

There is malware associated with the QID


The QID has a known exploit
The QID has been edited
A patch is available for the QID

14. Which item is not mandatory for launching a


vulnerability scan?
Choose an answer:

Target Hosts
Option Profile
Authentication Record
Scanner Appliance
15. About how many services can Qualys detect via the
Service Detection Module?
Choose an answer:

13
512
20
600

16. By default, the first user added to a new Business Unit


becomes a ____________ for that unit.
Choose an answer:

Auditor
Administrator
Reader
Scanner
Unit Manager

17. In a new Option Profile, which authentication options


are enabled by default?
Choose an answer:

All
Unix
Windows
None

18. Which of the following vulnerability scanning options


requires the use of a “dissolvable agent”?
Choose an answer:

Windows Share Enumeration


TCP port scanning
Scan Dead Hosts
UDP port scanning
19. To produce a scan report that includes the results from
a specific scan that occurred at a specific point in time,
you should select the _______________ option in the
Report Template.
Choose an answer:

Scan Based Findings


Dynamic Findings
Static Findings
Host Based Findings

20. About how many TCP ports are scanned when using
Standard Scan option?
Choose an answer:

1900
10
20
65535

21. Asset Groups and Asset Tags can be used to


effectively customize or fine tune … (choose all that apply)
Choose an answer:

Reports
Vulnerability Scans
Remediation Policies
Search Lists

22. What is required in order for Qualys to generate


remediation tickets? (choose all that apply)
Choose an answer:

Scan Results need to be processed by Qualys


A Policy needs to be created
A Map needs to be run
A Remediation Report needs to be run
23. Before you can scan an IP address for vulnerabilities,
the IP address must first be added to the.
Choose an answer:

Host Assets tab


Business Units tab
Domains tab
Search List tab

24. What is the 6-step lifecycle of Qualys Vulnerability


Management?
Choose an answer:
Mapping, Scanning, Reporting, Remediation, Simplification, Authentication
Learning, Listening, Permitting, Forwarding, Marking, Queuing
Bandwidth, Delay, Reliability, Loading, MTU, Up Time
Discover, Organize Assets, Assess, Report, Remediate, Verify

25. To exclude a specific QID/vulnerability from a


vulnerability scan you would:
Choose an answer:
Disable the QID in the Qualys KnowledgeBase.
Ignore the vulnerability from within a report.
Place the QID in a search list, and exclude that search list from within the Option Profile.
You cannot exclude QID/Vulnerabilities from vulnerability scans.

26. Which of the following components are included in the


raw scan results, assuming you do not apply a Search List
to your Option Profile? (choose all that apply)
Choose an answer:

Host IP
Option Profile Settings
Potential Vulnerabilities
Information Gathered
Vulnerabilities
27. Which of the following types of items can be found in
the Qualys KnowledgeBase? (choose all that apply)
Choose an answer:

Potential Vulnerabilities
Configuration data (Information Gathered)
Confirmed Vulnerabilities
Asset Groups
Remediation Tickets

28. Which three features of the Vulnerability Management


application can be customized using a KnowledgeBase
"Search List"?
Choose an answer:

Authentication Records
Report Templates
Remediation Policies
Option Profiles

29. What type of Search List adds new QIDs to the list
when the Qualys KnowledgeBase is updated?
Choose an answer:

Active
Static
Dynamic
Passive

31. When a host is removed from your subscription, the


Host Based Findings for that host are.
Choose an answer:

Ranked
Purged
Ignored
Archived

You might also like