QUALYS STUDY PACK 2023/ 2024 Exams STUDY BUNDLE WITH COMPLETE SOLUTIONS| Questions and Verified Answers| A GRADE

Qualys Vulnerability Management Detection
and Response (VMDR) 2023/ 2024 Exam|
Questions and Verified Answers| A Grade
Q: Describe the query that will produce a list of “patchable” vulnerabilities when entered in the
Search field of Vulnerabilities section of VMDR.
Answer:
vulnerabilities.vulnerability.qualysPatchable:TRUE
Q: State the Qualys sensors that collect the data needed to perform vulnerability assessments.
Answer:
-Scanner Appliance
-Cloud Agent
Q: Which type of Dashboard Widget can be configured to change color, as its tracked data
reaches specific conditions or threshold levels?
Answer:
Count
Q: You have to explain to your team how the VMDR for ITSM has some very useful features.
Which points will you stress?
Answer:
-Allows rule-based imports of vulnerabilities, risks, and patch recommendations
-Provides unified security and IT threat response paths for faster remediation
-Assigns vulnerability findings to their appropriate owner, automatically

QUALYS VMDR TRAINING 2023/ 2024
Exam Review| Questions and Verified
Answers| 100% Correct
Q: What kind of things can a cybercriminal access without VM
Answer:
Personal or credit card info, intellectual property, business secrets. Anything that can be sold on
the black market can be exploited.
Cybercriminals can also use your network as a platform to attack other networks.
Q: Primary objectives of vulnerability managment
Answer:
The primary objectives of VM are to:
bullet
Maintain a database of devices connecting to your network and prioritize how they should be
remediated.
bullet
Compile a list of installed software – your software assets.
bullet
Change software configurations to make them less susceptible to attack.
bullet
Patching and fixing operating system-related security flaws in installed software.
bullet
Alert to additions of new devices, ports, or software to the databases to analyze the changed
attack surface and detect successful attacks.
bullet
Indicate the most effective workflow for patching and updating your devices to thwart attacks.

bullet
Enable the effective mitigation and management of security risks.
bullet
Document the state of security for audit and compliance with laws, regulations, and business
policy.
bullet
Continuously repeat the preceding steps to ensure the ongoing protection of your network
security.
Q: Textbook definition of vulnerability management
Answer:
Systematically and continuously finding and eliminating vulnerabilities in computer systems.
Q: what are some keys to effective continuous VM
Answer:
Identify both internal and external vulnerability
Automatically scan using continually updated database of known attacks
High accuracy, eliminating false positives and false negatives
Generation of concise, actionable, reports.
Provide tested remedies and workarounds for cases where no remedy exists yet
Q: Core components of Qualys VM
Answer:
KnowledgeBase
Security Operations Centers

QUALYS VMDR TRAINING 2023/ 2024
Exam| Questions and Verified Answers| A
Grade
Q: In order to successfully perform an authenticated (trusted) scan, you must create a(n):

  • Authentication Record
  • Search List
  • Asset Map
  • Report Template
    Answer:
    Authentication Record
    Q: Multiple Remediation Policies are evaluated:
  • From top to bottom
  • From bottom to top
  • Based on the rule creation date
  • In no specific order
    Answer:
    From top to bottom
    Q: A search list contains a list of
    QIDs
    Host Assets
    Applications
    Asset Groups
    Answer:
    QIDs

Q: Dynamic Asset Tags are updated every time you.

  • Run a scan
  • Create a remediation policy
  • Run a report
  • Search the KnowledgeBase
    Answer:
    Run a scan
    Q: As a Manager in Qualys, which activities can be scheduled?
  • Asset Searches
  • Updates to the KnowledgeBase
  • Maps
  • Reports
  • Scans
    Answer:
  • Asset Searches
  • Updates to the KnowledgeBase
  • Maps
  • Reports
  • Scans
    Q: What does it mean when a “pencil” icon is associated with a QID in the Qualys
    KnowledgeBase?
  • There is malware associated with the QID
  • The QID has a known exploit
  • The QID has been edited
  • A patch is available for the QID
    Answer:
    The QID has been edited

Qualys Vulnerability Management Self-Paced
Training 2023/ 2024 Exam| Questions and
Verified Answers| A Grade
Q: Which of the following criteria can be used to create a dynamic Search List? (Select Three).
(A) Host Name
(B) Severity Level
(C) IP Address
(D) CVE ID
(E) CVSS Score
Answer:
(B) Severity Level
(D) CVE ID
(E) CVSS Score
Q: What is the name given to a custom list of QIDs taken from the Qualys KnowledgeBase?
(A) Search List
(B) Host Assets
(C) Asset Group
(D) Authentication Record
Answer:
(A) Search List
Q: You have just created a Search List. Where can you use or apply it? (Select Three)
(A) Report Template
(B) Remediation Policy
(C) Asset Group
(D) Business Unit

(E) Asset Tag
(F) Option Profile
Answer:
(A) Report Template
(B) Remediation Policy
(F) Option Profile
Q: A static Search List is created and updated __.
(A) Manually
(B) Explicit
(C) By Default
(D) Automatically
Answer:
(A) Manually
Q: What are the primary methods available in Qualys VM, for grouping, labeling, and
organizing host assets? (Select Two)
(A) Severity Levels
(B) Search Lists
(C) Asset Groups
(D) Asset Tags
Answer:
(C) Asset Groups
(D) Asset Tags
Q: Which of the following options can be used to add assets to an Asset Group? (Select Three)
(A) DNS name
(B) MAC address
(C) IP address
(D) NetBIOS name

Qualys Patch Management (PM) 2023/ 2024
Exam| Questions and Verified Answers| A
Grade
Q: Which of these would you use to assign Patch Management licenses to hosts?
(A) hostnames
(B) IP addresses
(C) asset tags
(D) asset groups
Answer:
(C) asset tags
Q: You want to change the default assessment duration for missing patches? Which of the
following will you perform?
(A) Create a new activation key
(B) Create and assign a new assessment profile
(C) Redeploy the agent
(D) Create a new configuration profile
Answer:
(B) Create and assign a new assessment profile
Q: What is the default “Cache size” allocated for Patch Management?
(A) 2048 MB
(B) 1024 MB
(C) 512 MB
(D) 256 MB
Answer:
(A) 2048 MB

Q: PM Work Flow
Answer:
Step 1: Install Cloud Agent on the target host
Step 2: Assign target agent host to a CA Configuration Profile that has PM enabled
Step 3: Assign PM license to the host
Step 4: Configure patch deployment job
Q: Which of these is true?
(A) a patch deployment job can be configured to suppress asset reboot
(B) a patch deployment job cannot suppress asset reboot
Answer:
(A) a patch deployment job can be configured to suppress asset reboot
Q: Which of these is true about patch deployment jobs?
(A) by default, all users can edit a patch deployment job
(B) by default, only the user who created the patch deployment job can edit it
Answer:
(B) by default, only the user who created the patch deployment job can edit it
Q: You want to create a deployment job that includes patches based on criteria. For example –
security patches with critical severity.
Which patch selection option would you use?.
(A) manual patch selection
(B) automatic patch selection
Answer:
(B) automatic patch selection

Qualys Reporting Strategies and Best
Practices 2023/ 2024 Exam| Questions and
Verified Answers| A Grade
Q: What is the recommended action if the asset is decommissioned, and the IP address of the
asset will not be used again?* (A) Subscribe (B) Add (C) Remove (D) Purge Answer: (C) Remove Q: What is the recommended action if the asset is decommissioned, and the IP address of the asset will be used again?*
(A) Purge
(B) Add
(C) Subscribe
(D) Remove
Answer:
(A) Purge
Q: Which report option allows a Qualys user to interact with the report data and get a high-level
view of data that is required on an ongoing basis?***
(A) APIs
(B) Dashboards
(C) Search Queries
(D) VM Report Templates

Answer:
(B) Dashboards
Q: Which of the following reporting option allows a non-Qualys user to access report data?* (A) Widgets (B) Dashboards (C) VM Report Templates (D) Search Queries Answer: (C) VM Report Templates Q: Which of these is recommended to be used when you need to bulk export data?*
(A) Dashboards
(B) VM Reporting
(C) Queries
(D) APIs
Answer:
(D) APIs
Q: Which of these Qualys Applications can be used to build widgets that can represent FIXED
vulnerabilities?***
(A) Vulnerability Management
(B) AssetView
(C) Global AI
(D) Threat Protection
Answer:
(A) Vulnerability Management

Qualys Web Application Scanning 2023/ 2024
Exam| Questions and Verified Answers| A
Grade
Q: Which WAS feature uses a virtual machine farm to detect a potentially malicious script in a
Web application?
(A) Progressive Scanning
(B) Malware Monitoring
(C) Redundant Links
(D) DNS Override
Answer:
(B) Malware Monitoring
Q: Which technique would you use to build a report containing specifics on only your app’s
most severe vulnerabilities?
(A) Add a Search List to the report
(B) Add a Crawl Exclusion List to the report
(C) Add a Brute Force List to the report
(D) Add a Parameter Set to the report
Answer:
(A) Add a Search List to the report
Q: Potential Web app vulnerabilities are color coded:
(A) Blue
(B) Red
(C) Yellow
(D) Green
Answer:

(C) Yellow
Q: Which of the following is NOT a valid vulnerability status?
(A) Active
(B) Re-opened
(C) New
(D) Fixed
(E) Exploited
Answer:
(E) Exploited
Q: If your application URL is: www.example.org/new/ , which of the of following links will be
crawled if the Crawl Scope is set to “Limit to content at or below URL subdirectory”? (select
two) (Choose all that apply)
(A) www.example.org/existing
(B) www.example.org
(C)www.example.org/new/customers
(D) www.example.org/new
Answer:
(C)www.example.org/new/customers
(D)www.example.org/new
Q: Which of the following scanning challenges can be overcome using the WAS Progressive
Scanning feature? (select two) (Select all that apply)
(A) Scanning a web application with hard-to-find links
(B) Scanning a web application with tens of thousands of links
(C) Scanning a web application with multiple IP addresses
(D) Scanning a web application that would normally exceed the amount of time available within
a limited scanning window.
Answer:

Leave a Comment

Scroll to Top