Open your module picker and select the Asset Management module. Tagging with the Network Feature - force.com a) Most Prevalent Vulnerabilities Report b) Most Vulnerable Hosts Report c) Ignored Vulnerabilities Report d) Vulnerability Scorecard Report, Map results are an excellent source for (choose all that apply) a) Creating Search Lists b) Making Report Templates c) Adding Hosts to the Approved Hosts list d) Adding Hosts to Qualys Subscription e) Building Asset Groups f) Creating Option Profiles, What is required in order for Qualys to generate remediation tickets? Save my name, email, and website in this browser for the next time I comment. a) Unpatched b) Vulnerable c) Exploitable d) Rogue (unapproved), When a host is removed from your subscription, the Host Based Findings for that host are a) Purged b) Ignored c) Ranked d) Archived, Asset Search can be used to create (choose all that apply) a) Option Profiles b) Asset Groups c) Asset Tags d) Report Templates e) Search Lists, In order to successfully perform an authenticated (trusted) scan, you must create a(n): a) Report Template b) Authentication Record c) Asset Map d) Search List, Which asset tagging rule engine, supports the use of regular expressions? Learn more about Qualys and industry best practices. Business the list area. How to add a Asset tag based on OS - Qualys Dynamic Asset Tags are updated every time you a) Run a map b) Create a remediation policy c) Run a scan d) Run a report, Which of the following items are used to calculate the Business Risk score for a particular asset group? Which asset tagging rule engine, supports the use of regular expressions? Secure your systems and improve security for everyone. (choose all that apply) a) A Policy needs to be created b) A Remediation Report needs to be run c) Scan Results need to be processed by Qualys d) A Map needs to be run, Which three features of the Vulnerability Management application can be customized using a KnowledgeBase "Search List"? The option to use tags is available only when the Asset Tagging feature has been added to your subscription by an account manager or support. What does the S in the ASLN section of Map Results really mean? The DNS hostnames in the asset groups are automatically assigned the [Solved] Answers only: 16. Which asset tagging rule engine, supports a) Threat b) Solution c) Results d) Compliance e) Impact, What is the 6-step lifecycle of Qualys Vulnerability Management?