{"id":117013,"date":"2023-08-26T22:08:54","date_gmt":"2023-08-26T22:08:54","guid":{"rendered":"https:\/\/learnexams.com\/blog\/?p=117013"},"modified":"2023-08-26T22:08:55","modified_gmt":"2023-08-26T22:08:55","slug":"bundle-for-qualys-exams-compilation-verified-guaranteed-success","status":"publish","type":"post","link":"https:\/\/www.learnexams.com\/blog\/2023\/08\/26\/bundle-for-qualys-exams-compilation-verified-guaranteed-success\/","title":{"rendered":"Bundle for Qualys Exams Compilation | Verified | Guaranteed Success"},"content":{"rendered":"\n<p>Qualys Reporting Strategies and Best<br>Practices (Exam)<br>In the patch report template, which evaluation provides the most accurate patches that need to be<br>installed?<br>(A) Superseded patch evaluation<br>(B) Latest patch evaluation<br>(C) QID based patch evaluation<br>(D) Classic patch evaluation &#8211; \u2714\u2714(A) Superseded patch evaluation<br>Which scorecard report type allows you to identify hosts that are missing required patches and<br>software?***<br>(A) Patch report<br>(B) Vulnerability scorecard report<br>(C) Missing software report<br>(D) Asset Search Report &#8211; \u2714\u2714(A) Patch report<br>Which of the following scenarios can lead to gaps in the patch tree structure and break the patch<br>supersedence logic? Select all that apply.<br>(A) Scan report with vulnerability search list or Threat Protection RTI filter<\/p>\n\n\n\n<p>(B) Cloud Agent data collection followed by an authenticated scan<br>(C) Scan job with a custom vulnerability filter<br>(D) Unauthenticated scan<br>(E) Cloud Agent scan &#8211; \u2714\u2714(A) Scan report with vulnerability search list or Threat Protection<br>RTI filter<br>(C) Scan job with a custom vulnerability filter<br>Identify the vulnerability types excluded by default in the VM\/VMDR Dashboard. Select all that<br>apply.***<br>(A) Fixed vulnerabilities<br>(B) Disabled or Ignored vulnerabilities<br>(C) Vulnerabilities without exploits<br>(D) Low severity vulnerabilities<br>(E) Vulnerabilities without patches &#8211; \u2714\u2714(A) Fixed vulnerabilities<br>(B) Disabled or Ignored vulnerabilities<br>The <strong><em><strong>__<\/strong><\/em><\/strong> vulnerability type is enabled by default in a new report template.<br>(A) Confirmed<br>(B) Potential<br>(C) Patched<br>(D) Information Gathered &#8211; \u2714\u2714(B) Potential<\/p>\n\n\n\n<p>Stale asset and vulnerability data can affect your security risk and business risk calculations. ***<br>(A) False<br>(B) True &#8211; \u2714\u2714(B) True<br>Adding non-Qualys user&#8217;s email in the distribution group helps you distribute the scheduled<br>report to such users. ***<br>(A) True<br>(B) False &#8211; \u2714\u2714(A) True<br>When using host-based findings, which of these needs to be turned on to toggle the inclusion of<br>Fixed vulnerabilities in the report?<strong>* (A) Trending (B) (C) (D) &#8211; \u2714\u2714(A) Trending Which finding type allows you to include trending data in your reports?<\/strong>*<br>(A) Scanner based findings<\/p>\n\n\n\n<p>Qualys Patch Management (Course Quizzes)<br>Which of these is a reason for using a Patch Management solution?<br>(A) To monitor logs on the asset<br>(B) To scan for viruses<br>(C) To close open ports and services<br>(D) To address vulnerabilities &#8211; \u2714\u2714(D) To address vulnerabilities<br>Which of these Qualys solutions would you use to address vulnerabilities on your assets?<br>(A) Vulnerability Management<br>(B) Patch Management<br>(C) Endpoint Detection and Response<br>(D) Policy Compliance &#8211; \u2714\u2714(B) Patch Management<br>Which of these sensors does Qualys use to deploy patches?<br>(A) Scanner appliances<br>(B) Cloud connectors<br>(C) Passive sensor<br>(D) Cloud agent &#8211; \u2714\u2714(D) Cloud agent<\/p>\n\n\n\n<p>Which of these actions is commonly performed after deploying patches?<br>(A) Asset is decommissioned<br>(B) Asset is scanned<br>(C) Asset is rebooted<br>(D) Asset is reimaged &#8211; \u2714\u2714(C) Asset is rebooted<br>Which of these is a recommended approach to patching assets?<br>(A) Uninstall old patches and apply new<br>(B) Do not apply patches unless necessary<br>(C) Apply patches on a set of test assets, verify that the patches do not cause issues, and patch<br>the remaining assets<br>(D) Apply patches on all assets right away &#8211; \u2714\u2714(C) Apply patches on a set of test assets, verify<br>that the patches do not cause issues, and patch the remaining assets<br>Qualys Patch Management correlates missing patches with vulnerabilities.<br>(A) False<br>(B) True &#8211; \u2714\u2714(B) True<br>Which of these is true about Qualys Patch Management?<\/p>\n\n\n\n<p>QUALYS VMDR TRAINING<br>Which of the following are benefits of scanning in authenticated mode? (choose 2) &#8211; \u2714\u2714<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>More vulnerabilities are detected<\/li>\n\n\n\n<li>Time saved from manually investigating potential vulnerabilities<br>Which of the following are valid options for scanning targets? (choose 3) &#8211; \u2714\u2714<\/li>\n\n\n\n<li>Asset Groups<\/li>\n\n\n\n<li>IP addressing<\/li>\n\n\n\n<li>Asset Tags<br>What type of scanner appliance (already provisioned within the Qualys Cloud Platform) is ideal<br>for scanning public facing assets? &#8211; \u2714\u2714External Scanner<br>Which of the following is NOT a component of a vulnerability scan? &#8211; \u2714\u2714Host Discovery<br>Which of the following will have the greatest impact on a half red, half yellow QID? &#8211;<br>\u2714\u2714Authentication<br>What is the maximum number of TCP ports that can participate in the Host Discovery process? &#8211;<br>\u2714\u271420<\/li>\n<\/ol>\n\n\n\n<p>Which of the following items are used to calculate the Business Risk score for a particular asset<br>group? (choose 2) &#8211; \u2714\u2714Business Impact<br>Security Risk<br>In order to successfully perform an authenticated (trusted) scan, you must create a(n): &#8211;<br>\u2714\u2714Authentication record<br>Multiple Remediation Policies are evaluated: &#8211; \u2714\u2714from top to bottom<br>A search list contains a list of . &#8211; \u2714\u2714QIDs<br>Dynamic Asset Tags are updated every time you. &#8211; \u2714\u2714Run a scan<br>As a Manager in Qualys, which activities can be scheduled? &#8211; \u2714\u2714Asset Searches<br>Updates to the KnowledgeBase<br>Maps<br>Reports<br>Scans<br>What does it mean when a &#8220;pencil&#8221; icon is associated with a QID in the Qualys KnowledgeBase?<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>\u2714\u2714The QID has been edited<\/li>\n<\/ul>\n\n\n\n<p>Qualys Web Application Scanning (EXAM)<br>The Malware Monitoring option should only be enabled for:<br>(A) Applications with a &#8220;malware&#8221; tag<br>(B) Internal facing applications<br>(C) External facing applications<br>(D) Both internal and external facing applications &#8211; \u2714\u2714(C) External facing applications<br>Where can you &#8220;Ignore&#8221; a vulnerability for a Web Application? (select two) (Choose all that<br>apply)<br>(A) Scorecard Report<br>(B) Scan Report<br>(C) Web Application Report<br>(D) Detections Tab &#8211; \u2714\u2714(B) Scan Report<br>(D) Detection Tab<br>A Search List contains a list of:<br>(A) Username\/Password combinations<br>(B) QIDs from the Qualys KnowledgeBase<br>(C) Crawling hints<\/p>\n\n\n\n<p>(D) Common input parameters &#8211; \u2714\u2714(B) QIDs from the QualysBase<br>When launching a Web Application Scan, you have the option to override some default settings.<br>Which of the following options can NOT be overridden?<br>(A) Option Profile<br>(B) Crawl Scope<br>(C) Scanner Appliance<br>(D) Authentication Record &#8211; \u2714\u2714(D) Authentication Record<br>What attack proxies can you integrate with Qualys WAS?<br>(A) BURP<br>(B) W3af<br>(C) ZAP<br>(D) WebScarab &#8211; \u2714\u2714(A) BURP<br>How can you get your scan to follow a business workflow (such as a shopping cart transaction)?<br>(A) Use a Selenium Script to record and replay the workflow<br>(B) Use a Custom Authentication Record<br>(C) Use a Crawl Exclusion List<br>(D) Use DNS Override &#8211; \u2714\u2714(A) Use a Selenium Script to record and replay the workflow<\/p>\n\n\n\n<p>Qualys Cloud Agent Exam<br>Identify the Qualys application modules that require Cloud Agent. (Choose all that apply)<br>(A) EDR<br>(B) VM<br>(C) PM<br>(D) FIM &#8211; \u2714\u2714(A) EDR<br>(C) PM<br>(D) FIM<br>A Cloud Agent status indicates the agent uploaded new host data, and an assessment of the host<br>was performed within the Qualys Cloud Platform. Which one from the following options is it?<br>(A) Scan Complete<br>(B) Provisioned<br>(C) Manifest Downloaded<br>(D) Configuration Downloaded &#8211; \u2714\u2714(A) Scan Complete<br>From all the tasks associated with the Provisioning stage, identify the one that is not among<br>them.<\/p>\n\n\n\n<p>(A) Agent attempts to connect to the Qualys Platform (with valid CustomerID and<br>AcctivationID)<br>(B) Agent performs an initial assessment scan<br>(C) Agent is validated by the Qualys platform<br>(D) Agent generates its Qualys Host ID or re-provisions its Qualys Host ID for cloned images &#8211;<br>\u2714\u2714(B) Agent performs an initial assessment scan<br>Recall and state the task that is NOT performed by Cloud Agent.<br>(A) Check-in to the Qualys Platform at regular intervals<br>(B) Transfer data payloads to the Qualys Platform<br>(C) Assessment Testing<br>(D) Data collection &#8211; \u2714\u2714(C) Assessment Testing<br>The VM Scan Interval option of the Configuration Profile allows you to perform which task?<br>(A) Configure frequency for SCA scan<br>(B) Configure frequency for VM scan<br>(C) Configure frequency for policy compliance scan<br>(D) Configure Agent status interval &#8211; \u2714\u2714(A) Configure frequency for SCA scan<br>Identify the query that will help you find agents that have not checked-in within the last 7 days.<\/p>\n\n\n\n<p>Qualys Patch Management (PM) Exam<br>Using the &#8220;Search&#8221; field (found in the VULNERABILITIES section of the VM Dashboard),<br>which query will produce a list of &#8220;patchable&#8221; vulnerabilities?<br>(A)vulnerabilities.vulnerability.qualysPatchable:TRUE<br>(B)vulnerabilities.vulnerability.qualysPatchable:FALSE<br>(C)vulnerabilities.vulnerability.isPatchable:FALSE<br>(D)vulnerabilities.vulnerability.isPatchable:TRUE &#8211;<br>\u2714\u2714(D)vulnerabilities.vulnerability.isPatchable:TRUE<br>Which of the following conventions can be used to include or assign host assets to a job? (choose<br>2) (Select all that apply)<br>(A) Asset Name<br>(B) Asset Group<br>(C) Business Unit<br>(D) Asset Tag &#8211; \u2714\u2714(A) Asset Name<br>(D) Asset Tag<br>The <strong><em>__<\/em><\/strong> process is responsible for installing and uninstalling patches, included in patch<br>jobs you create.<\/p>\n\n\n\n<p>(A) stdeploy.exe<br>(B) Qualys Cloud Agent<br>(C) notify.exe<br>(D) Qualys Cloud Agent UI &#8211; \u2714\u2714(B) Qualys Cloud Agent<br>What does it mean, when a patch is displayed with a &#8220;key-shaped&#8221; symbol?<br>(A) The patch is a key requirement for the deployment of other patches.<br>(B) The patch cannot be downloaded by Qualys Cloud Agent.<br>(C) The patch has been deprecated.<br>(D) The patch cannot be uninstalled. &#8211; \u2714\u2714(B) The patch cannot be downloaded by Qualys Cloud<br>Agent.<br>Within a PM Assessment Profile, what is the minimum value, for patch assessment frequency?<br>(A) 24 hours<br>(B) 4 hours<br>(C) 12 hours<br>(D) 1 hour &#8211; \u2714\u2714(A) 24 hours<br>Which of the following Qualys applications or services, provide the ability to create a patch job?<br>(choose 3) (Choose all that apply)<\/p>\n\n\n\n<p>Qualys Vulnerability Management v1<br>Which of the following are benefits of scanning in authenticated mode? (choose 2)<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Fewer confirmed vulnerabilities<\/li>\n\n\n\n<li>More vulnerabilities are detected<\/li>\n\n\n\n<li>Time saved from manually investigating potential vulnerabilities<\/li>\n\n\n\n<li>More accurate scan details<\/li>\n\n\n\n<li>\u2714\u2714- More vulnerabilities are detected<\/li>\n\n\n\n<li>Time saved from manually investigating potential vulnerabilities<br>Which of the following are valid options for scanning targets? (choose 3).<\/li>\n\n\n\n<li>Asset Groups<\/li>\n\n\n\n<li>Domain Name<\/li>\n\n\n\n<li>IP addressing<\/li>\n\n\n\n<li>Asset Tags<\/li>\n\n\n\n<li>Search Lists<\/li>\n\n\n\n<li>MAC Address &#8211; \u2714\u2714- Asset Group<\/li>\n\n\n\n<li>IP Addressing<\/li>\n\n\n\n<li>Asset Tags<\/li>\n<\/ul>\n\n\n\n<p>What type of scanner appliance (already provisioned within the Qualys Cloud Platform) is ideal<br>for scanning public facing assets?<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Offline Scanner<\/li>\n\n\n\n<li>Virtual Scanner<\/li>\n\n\n\n<li>External Scanner<\/li>\n\n\n\n<li>Internal Scanner &#8211; \u2714\u2714External Scanner<\/li>\n<\/ul>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Which of the following is NOT a component of a vulnerability scan?<\/li>\n<\/ol>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Host Discovery<\/li>\n\n\n\n<li>OS Detection<\/li>\n\n\n\n<li>Port Scanning<\/li>\n\n\n\n<li>Business Impact &#8211; \u2714\u2714Host Discovery<br>Which of the following will have the greatest impact on a half red, half yellow QID?<\/li>\n\n\n\n<li>Share Enumeration<\/li>\n\n\n\n<li>Scan Dead Hosts<\/li>\n\n\n\n<li>Authentication<\/li>\n\n\n\n<li>Authoritative Option &#8211; \u2714\u2714Authentication<br>What is the maximum number of TCP ports that can participate in the Host Discovery process?<\/li>\n<\/ul>\n\n\n\n<p><br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Qualys Reporting Strategies and BestPractices (Exam)In the patch report template, which evaluation provides the most accurate patches that need to beinstalled?(A) Superseded patch evaluation(B) Latest patch evaluation(C) QID based patch evaluation(D) Classic patch evaluation &#8211; \u2714\u2714(A) Superseded patch evaluationWhich scorecard report type allows you to identify hosts that are missing required patches andsoftware?***(A) Patch report(B) [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[25],"tags":[],"class_list":["post-117013","post","type-post","status-publish","format-standard","hentry","category-exams-certification"],"_links":{"self":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts\/117013","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/comments?post=117013"}],"version-history":[{"count":0,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts\/117013\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/media?parent=117013"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/categories?post=117013"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/tags?post=117013"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}