Question
Answered step-by-step

Answers only without expliantion Which of the following are...

Answers only without expliantion


Which of the following are components of a Business Unit?

Security

Asset Groups

Policies

Users

Option Profiles


Which of the following would you most likely include or create, to perform an "authenticated" scan that only targets "severity 5" vulnerabilities? 

(choose all that apply)

Scanner appliance

Target Hosts

Authentication Record

Search List (severity 5 QIDs)

Option Profile


What does it mean when a "blue key" icon is associated with a QID in the Qualys KnowledgeBase?

Choose an answer:

The QID has a known exploit

A patch is available for the QID

The QID has been edited

Authentication is required for successful QID testing


Why is it beneficial to set the Business Impact of an Asset Group?

Choose an answer:

It's used to calculate storage space

It's used to calculate Security Risk.

It's used to calculate CVSS Score.

It's used to calculate the Business Risk


How often are "Dynamic" Asset Tags updated?

Choose an answer:

Every time new assessment data is collected (scanner or agent)

Every time you search the Qualys KnowledgeBase

Every time you login to your user account.

Every time a report is generated.


gent data (data collected by a Qualys Agent) is stored as ______ Based Findings.

Choose an answer:

Host

Scan

Client

Server


What color code is used in the Qualys KnowledgeBase to identify QIDs that exhibit predictable (but different) results in the presence or absence of authentication?

Choose an answer:

Blue

Yellow

Half-Red/Half-Yellow

Red


Which of the following best describes a "Dynamic" Search List?

Choose an answer:

Manually updated

Updates can be scheduled regularly

Automatically updated

Updated only upon user request


To produce a "trend" report that covers the last twelve months of vulnerability activity, you should select ______ Based Findings in the Scan Report Template.

Choose all that apply:

Scan

Client

Host

Server


Which of the following does not accurately describe a behavior or characteristic of a Remediation Policy?

Choose an answer:

A Remediation policy at the bottom of the list has precedence over the policies above it.

A Remediation policy can be configured to assign detected vulnerabilities to Qualys users.

A Remediation policy can be configured to ignore certain vulnerability QIDs.

Remediation policies contain conditions and actions.

Answer & Explanation
Verified Solved by verified expert
<p>ec aliquet. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapibus efficitur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices ac magna. Fusce dui lectus, congue vel laoreet ac</p> Fusce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet

Unlock full access to Course Hero

Explore over 16 million step-by-step answers from our library

Subscribe to view answer

gue

gue

gue

ec facilisis. Pellentesque dapibus efficitur laoreet. Nam risus ante, dapibus a molestie conse

a molestie conseq

gue

gue

ur laoreet. Nam risus ante

gue

gue

, ultrices ac magna. Fusce dui lectus, congue vel laoreet ac, dict

a molestie conseq

gue

at, ultrices ac magna. Fusce dui l

gue

gue

gue vel laoreet ac, dictum vitae odio. Done

a molestie conseq

gue

nec facilisis. Pellentesque dapi

gue

inia pulvinar tortor nec facilisis. Pellentesque dapibus efficitur laoreet. Nam

a molestie conseq

gue

gue

, c

gue

Step-by-step explanation

entesque dapibus efficitur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices ac magna. Fusce dui lectus, congue vel laoreet ac, dictum vitae odio. Do

a molestie conseq

gue

su

gue

a. Fusce dui lectus, congue vel laoreet ac, dictum vitae odio.

a molestie conseq

gue

gue

ec facilisis. Pe

gue

gue

gue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nam lacinia pulvinar tortor nec facilisis. Pel

ur laoreet. Nam risus

gue

consec

gue

sque dapibus efficitur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices ac magna. Fusce

a molestie conseq

gue

onec aliquet. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nam lacinia pulvina

gue