v1 Questions and Answers 100%
Verified
Which of the following are benefits of scanning in authenticated mode?
(choose 2)
- Fewer confirmed vulnerabilities
- More vulnerabilities are detected
- Time saved from manually investigating potential vulnerabilities
- More accurate scan details - ANSWER-- More vulnerabilities are detected
- Time saved from manually investigating potential vulnerabilities
Which of the following are valid options for scanning targets? (choose 3).
- Asset Groups
- Domain Name
, - IP addressing
- Asset Tags
- Search Lists
- MAC Address - ANSWER-- Asset Group
- IP Addressing
- Asset Tags
What type of scanner appliance (already provisioned within the Qualys Cloud
Platform) is ideal for scanning public facing assets?
- Offline Scanner
- Virtual Scanner
- External Scanner
- Internal Scanner - ANSWER-External Scanner
4. Which of the following is NOT a component of a vulnerability scan?
- Host Discovery
- OS Detection