This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
close
";s:4:"text";s:29438:"Choose an answer: A VPN connection to your corporate network is required to download patches. Qualys VMDR 2.0 enables customers to automatically detect vulnerabilities and critical misconfigurations per CIS benchmarks, broken out by asset. Pirelli P7 Cinturato Blue, Choose an answer: Which Asset Tag rule engine, will allow you to label or tag assets, using hardware, software, and OS categories? VMDR seamlessly integrates with configuration management databases (CMDB) and patch. The company is also a founding member of the Cloud Security Alliance. FOSTER CITY, Calif., Oct. 29, 2019 /PRNewswire/ -- Qualys, Inc. , a pioneer and leading provider of cloud-based security and compliance solutions, today announced its highly. Verified employers. VMDR Adoption Increasing 34% 19% 4% 14 ($ in millions) Number of Customers Platform Adoption Driving Higher Customer Spend 18% Growth $117 $99 $75 $48 15 Note: Customer count is defined as customers with greater than $500K in annual revenue Cloud Platform Enables Scalable Operational Model of Customer Support, Operations, and R&D headcount in India You will earn Qualys Certified Specialist certificate once you passed the exam. VMDR includes comprehensive assessment of misconfigurations, helping you boost asset security and compliance beyond open vulnerabilities. (A) IP Address (B) Qualys Host ID (C) DNS Name (D) NetBIOS Name After the data is collected, customers can instantly query assets and any attributes to get deep visibility into hardware, system configuration, applications, services, network information, and more. (choose 3) (Choose all that apply) (A) Select the "Activate for FIM or IOC or PM" option for a host, in the Cloud Agent application. Start your free trial today. With its powerful elastic search clusters, you can now search for any asset on-premises, endpoints and all clouds with 2-second visibility. On-premises Device Inventory Detect all devices and applications connected to the network It also tells you the list of prioritized assets on the basis of various real-time threat indicators, on the basis of various attack surfaces. What does it mean, when a patch is displayed with a, South Dakota School of Mines and Technology. VMDR 2.0 is priced on a per-asset basis and does not require a software update to start. Qualys offers you an option to prioritize and remediate vulnerabilities based on filters like Age, RTI, and Attack Surface. Overview Qualys IT, Security and Compliance apps are natively integrated, each sharing the same scan data for a single source of truth. It performs continuous . Start your free trial today. Deconstruction, pickup, and onsite donations available. Qualys supports SAML 2.0-based identity service providers. Thats the reason the VMDR concept picks up the problem of vulnerability management right from the bottom itself where it is helping you discover the assets which are connected, or which are getting connected to your enterprise network. allow you to install software and run a custom script? Cybersecurity operators need risk awareness to prioritize the alerts, incidents, and threats bombarding our teams. Centers for Disease Control and Prevention. "When a security incident occurs, various clocks begin ticking," SANS Institutes Matt Bromiley explains in the paper. Vulnerability Management, Detection and Response leverages the latest threat intelligence, advanced correlation and machine learning to pinpoint the riskiest vulnerabilities on the most critical assets. (choose 3) OS Detection Port Scanning Host Discovery Static Routing VLAN Tagging What type of scanner appliance (by, Answers only without expliantion Which of the following are components of a Business Unit? Himanshu is a customer-centered Technical leader with extensive experience in Information Technology and Security, with a proven ability to lead teams, Coaching, managing ambiguity, and striving for excellence. Overview Qualys IT, Security and Compliance apps are natively integrated, each sharing the same scan data for a single source of truth. It will help have an appropriate view of the vulnerabilities for the organization. VMDR continuously assesses these assets for the latest vulnerabilities and applies the latest threat intel analysis to prioritize actively exploitable vulnerabilities. VMDR raises the maturity of our Vulnerability Management program to its next level. Qualys VMDR provides an all-in-one cloud-based app that automates the entire vulnerability management cycle across on-premises, endpoints, cloud, mobile, containers, OT and IoT environments - significantly accelerating the ability for organizations to respond to threats and prevent breaches. As SANS Institutes Andrew Laman reminds us, cybersecurity must never be an afterthought, even as technology evolves and helps organizations be agile and customer-centric. Rule-based integrations with ITSM tools (ServiceNow, JIRA) automatically assign tickets and enable orchestration of remediation, further reducing mean time to remediation (MTTR). That means its a priority that you should go ahead and fix those vulnerabilities first. "We are proud to bring our VMDR offering to market. Cookies used to enable you to share pages and content that you find interesting on CDC.gov through third party social networking and other websites. Click the card to flip . Qualys VMDR 2.0 uses real-time threat intelligence, advanced correlation and powerful machine learning models to automatically prioritize the riskiest vulnerabilities on your most critical assets - reducing potentially thousands of discovered vulnerabilities, to the few hundred that matter. Which Qualys technology is the best fit to solve this challenge? AssetView enabled customers to rapidly analyze IT assets and their vulnerability information. The following diagram illustrates the steps in the Vulnerability Management Life Cycle. VMDR continuously assesses these assets for the latest vulnerabilities and applies the latest threat intel analysis to prioritize actively exploitable vulnerabilities. As Forrester Research blog post The Impact Of Digital Transformation On The Vulnerability Management Space states, this increased complexity generates a need for better asset management and prioritization of remediation workloads. Choose an answer: **200; Which Qualys technology provides a patch download cache, to achieve a more efficient distribution of downloaded patches, to local agent host assets . Choose an answer: From the PATCHES section in the Patch Management application, which query produces a list of uninstallable patches? Qualys VMDR 2.0 uses real-time threat intelligence, advanced correlation and powerful machine learning models to automatically prioritize the riskiest vulnerabilities on your most critical assets - reducing potentially thousands of discovered vulnerabilities, to the few hundred that matter. February 1, 2022. 1 (800) 745-4355. Choose all that apply: Configure network filtering devices to let scan traffic through. What's New. Qualys VMDR provides a single solution for internal, external and PCI scanning needs, and directly integrates with ITSM solutions such as ServiceNow to automate vulnerability management. (choose 2) Choose all that apply: After Qualys Cloud Agent has been successfully installed on a target host, which of the following Patch Management setup steps must be completed, before host patch assessments can begin? Medical Medical Sauna, All information these cookies collect is aggregated and therefore anonymous. Start your free trial today. Out of 1000 vulnerabilities, lets say, on the basis of external context, you are able to prioritize or filter out, 800 vulnerabilities and now youre left with 200 vulnerabilities. It allows additional monitoring of the infrastructure to identify vulnerabilities and weak asset hardening effectively, accurately and in real time to better prioritize needed remediation. Automate and orchestrate operational tasks with a no-code visual workflow building environment to rapidly streamline security programs and responses. "Many organizations become overwhelmed to the point of having to figure out what actually has to get done; this is the foundation of the vulnerability risk management space.". By delivering all this in a single app workflow, VMDR automates the entire process and significantly accelerates an organizations ability to respond to threats, thus preventing possible exploitation. Keep security data private with our end-to-end encryption and strong access controls. We help communities reclaim discarded building materials for reuse and provides education in sustainable construction practices. Visibility should be "horizontal" all your hardware and software assets, known and unknown, wherever they reside and whatever their type. Qualysguard is one of the known vulnerability management tool that is used to scan the technical vulnerabilities. No software to download or install. About. Register athttps://www.qualys.com/vmdrlive. I have experience in Systems Administration, Configuration, Implementation, and Support . Its a continuous, seamlessly orchestrated workflow of automated asset discovery, vulnerability management, threat prioritization, and remediation. Founded in 1999 as one of the first SaaS security companies, Qualys has established strategic partnerships with leading cloud providers like Amazon Web Services, Microsoft Azure and the Google Cloud Platform, and managed service providers and consulting organizations including Accenture, BT, Cognizant Technology Solutions, Deutsche Telekom, DXC Technology, Fujitsu, HCL Technologies, IBM, Infosys, NTT, Optiv, SecureWorks, Tata Communications, Verizon and Wipro. The Qualys Cloud Platform and its integrated Cloud Apps deliver businesses critical security intelligence continuously, enabling them to automate the full spectrum of auditing, compliance, and protection for IT systems and web applications across on premises, endpoints, cloud, containers, and mobile environments. With the click of a button which is available on the console, you would be able to go ahead and deploy the remediation measures from the console itself so that the time to remediation is reduced to the minimum possible. The SeniorAnalyst will help Lifecycle Marketing teams to develop deep knowledge of newly activated customers, existing customers, and nurture and retention strategies. ", "Qualys VMDR isa real game changer for us, as it integrates several critical security solutions into one, enabling us to devote all of our focus on providing our customers with a holistic solution to meet their Vulnerability Threat Management (VTM) needs," said Ryan Smith, vice president of product at Armor. Qualys VMDR 2.0 offers an all-inclusive risk-based vulnerability management solution to prioritize vulnerabilities and assets based on risk and business criticality. Automatically correlate vulnerabilities and patches for specific hosts, decreasing your remediation response time. Qualys Response to Rapid7 Campaign Against VMDR. Contact us below to request a quote, or for any product-related questions. Subscription Options Pricing depends on the number of apps, IP addresses, web apps and user licenses. Planning Phase Mitigation efforts are devised Remediation Phase As explained above, by its nature this vulnerability is harder to detect and will require a multi-layered approach for detection. The browser you are using is not supported.Learn about the browsers we support When I say that you divide the context into two parts: internal and external. Register athttps://www.qualys.com/response-to-rapid7/. Their security posture has become porous as organizations adopt innovations like cloud computing, containers, mobility and DevOps. Free, fast and easy way find a job of 841.000+ postings in Metairie, LA and other big cities in USA. Qualys VMDR is a smart modular security solution that delivers joined-up vulnerability assessment, management and remediation services with full visibility of global assets. (A) External (Internet-based) Scanner (B) Offline Scanner Security product exposure: Qualys VMDR, PaloAlto Cortex XDR, Microsoft Azure Sentinel, Microsoft Defender for Cloud, BurpSuite PRO, Kali Tools, SonarQube CE . Which of the following are phases of the Vulnerability Management Lifecycle? Assess your digital certificates (internal and external) and TLS configurations for certificate issues and vulnerabilities. Rapid7 recently launched a campaign titled, "It's Time to Quit Qualys; 10 reasons why Rapid7 is worth the switch." Upload, livestream, and create your own videos, all in HD. Indicators such as Exploitable, Actively Attacked, and High Lateral Movement bubble up current vulnerabilities that are at risk while machine learning models highlight vulnerabilities most likely to become severe threats, providing multiple levels of prioritization. As cyber-attacks get ever more sophisticated and deadly, businesses need to stay one step ahead of the criminals as their very survival could be on the line. VMDR brings Vulnerability Management to the next level as it provides customers with a comprehensive platform that is Choose an answer: Create Dashboard widgets for all the contents of the report X Export the report to dashboard and create a dynamic widget Schedule a report to run on a regular basis Run a report every time it is needed. A vulnerability requires three elements: a system weakness, an intruders access to the weakness, and the intruders ability to exploit the weakness using a tool or technique. Controlling use of administrative privileges. The Ivanti and Qualys partnership provides for tight integration of Ivanti Patch Management into Qualys VMDR to automate and simplify the patch remediation process. BlueKeep vulnerability is a vulnerability which is on port 3389. Mobile Device Vulnerability & Misconfiguration Assessment Continuously detect device, OS, apps, and network vulnerabilities and monitor critical mobile device configurations. | June 8, 2022 In the Prioritization tab click Reports. Once the first results obtained and analysed, we can launch the remediation action plan. It depends on the mechanism named Vulnerability Assessment . You can review and change the way we collect information below. Prioritize Remediation with a Perceived-Risk Approach. Security product exposure: Qualys VMDR, PaloAlto Cortex XDR, Microsoft Azure Sentinel, Microsoft Defender for Cloud, BurpSuite PRO, Kali Tools, SonarQube CE . On the basis of all these many factors, whether this is remotely discoverable or not, because you will have to see the vulnerabilities which are getting remotely discoverable, they can be remotely discovered by the attackers also. Vulnerability Management Detection & Response.txt, Vulnerability Management Detection and Response (VMDR) Exam 2.0.docx, Patch-Management-Lab-Tutorial-Supplement.pdf, VM-Lab 17 - Investigating an Attack on a Windows Host.pdf, Universidad Nacional de Educacin a Distancia, July-2020_Braindump2go_New_AZ-400_PDF_Dumps_and_AZ-400_VCE_Dumps(199-207).pdf, Assessment II - Server Configuration and Tools(2).docx, statements such as note disclosures and statistical or trend data On the other, reproduction of records shall be punished with a fine ranging from 10K to 200K, Assignment No. Vulnerability Management, Detection and Response has four core components that form the basis for an integrated, risk-based breach prevention and response program. (choose 2) Choose all that apply: Which Qualys application module is NOT included in the Default VMDR Activation Key? Security is only as strong as the weakest link that you have in your organization. This Vulnerability Management, Detection and Response phase also includes assessment of digital certificates and TLS configurations. Using real-time threat intelligence and machine learning, take control of evolving threats, and identify what to remediate first. Its intuitive and easy-to-build dynamic dashboards to aggregate and correlate all of your IT security and compliance data in one place from all the various Qualys Cloud Apps. Finally, VMDR automatically detects the latest superseding patch for the vulnerable asset and easily deploys it for remediation. Qualys Cloud Platform, combined with its powerful lightweight Cloud Agent, Virtual Scanners, and Network Analysis (passive scanning) capabilities bring together all four key elements of an effective vulnerability management program into a single app unified by powerful out-of-the-box orchestration workflows. For more information, please visit www.qualys.com. Priced on a per-asset basis and with no software to update, VMDR drastically reduces your total cost of ownership. Gather detailed information, such as an assets details, running services, installed software, and more. How to solve that problem? . (choose 3) Choose all that apply: **Which Qualys sensors collect the type of data needed to perform vulnerability assessments? After prioritizing vulnerabilities by risk, Qualys VMDR 2.0 rapidly remediates targeted vulnerabilities, across any size environment, by deploying the most relevant superseding patch. Its essential to have a complete, updated global inventory of all assets across your network: on prem, endpoints, clouds, containers, mobile, OT and IoT everywhere. Visit Qualys.com Qualys Cybersecurity Asset Management (CSAM) Querying inventory is an efficient way to find Java-based software installed in your environment. Discover, assess, prioritize, and patch critical vulnerabilities and reduce cybersecurity risk in real time and across your global hybrid IT, OT, and IoT landscape. Participating in different phases of development life cycle, gathering user requirements, feasibility study, system analysis, system architecture, design, coding, testing and support . Secure, protect and monitor running containers in traditional host-based container and Container-As-A-Service Lets say, the BlueKeep vulnerability. Which of the following tasks are performed by a Qualys patch job? The Centers for Disease Control and Prevention (CDC) cannot attest to the accuracy of a non-federal website. "I used to work there, so I never paid for the product. Qualys VMDR OT provides continuous vulnerability assessment on all discovered industrial assets. The Vulnerability Management Life Cycle is intended to allow organizations to identify computer system security weaknesses; prioritize assets; assess, report, and remediate the weaknesses; and verify that they have been eliminated. "In a world where cloud concepts increasingly dominate, with multiple hosted services providing functionality previously owned and operated by on-premises IT, many existing approaches to solving these problems predicated on deployment within a traditional enterprise network are now showing their age. With VMDR 2.0, enterprises are empowered with visibility and insight into cyber risk exposure - making it easy to prioritize vulnerabilities, assets, or groups of assets based on business risk. easy to use and deploy across complex hybrid environments, which are a challenge for companies to secure. Positioned as a revolutionary step in the country's healthcare sector, the system was developed to track medicines, blood supplies and medical equipment from production to consumption. "Now, we can offer VMDR as part of our security-as-a-service offering and provide customers with visibility across their entire hybridITenvironment. Dragging traffic back to a VPN concentration point will likely not be the preferred method indefinitely, if only for availability and capacity considerations alone. (choose 3) Host ID Bugtraq ID CVE ID QID, Appreciate urgent action to answer all the below Questions related toQualys Reporting Strategies and Best Practices (Qualys RSBA) ASAP 1-Which of the following scenarios can lead to gaps in the patch. The transparency of the rating algorithm also made it easy to justify prioritization and align all relevant security and IT stakeholders so we could move quickly to remediate the risk. Only with this VMDR cloud-based architecture can you obtain end-to-end inventorying, assessment, prioritization and remediation of assets everywhere on premises, in public clouds, in IoT networks, in Operational Technology systems, in mobile devices and more. Cyber risk is business risk with risks growing faster than what traditional VM and SIEM tools can manage. If patching is the course of action, an effective VMDR solution will automatically correlate vulnerabilities and patches, and select the most recent patch available for fixing a particular vulnerability in a specific asset. Then the next step is that if you look at performing vulnerability management, then you go ahead and perform vulnerability assessment, vulnerability management of those devices, the existing ones, the ones which are already discovered and the ones which are now getting discovered. Choose an answer: Presently, you can add up to _____ patches to a single job. If Qualys Passive Sensor discovers an asset that is not managed within your Qualys account, it is placed in the ____________ section of the Asset Inventory application. Qualys and the Qualys logo are proprietary trademarks of Qualys, Inc. All other products or names may be trademarks of their respective companies. CDC twenty four seven. Please join us on Thursday, April 16, at 11 am PT for Qualys' Response to Rapid7 Campaign. VMDR seamlessly integrates with configuration management databases (CMDB) and patch management solutions to quickly discover, prioritize, and automatically remediate vulnerabilities at scale to reduce risk. A cloud-based, all-in-one VMDR solution provides end-to-end vulnerability management, detection and response, with a single pane of glass view and centralized control of your networks security posture. According to the Center for Internet Security (CIS), you can slash your cyber attack risk by 85% if you implement the first five of its 20 core. Organizations lose so much time, money and effort when infosec teams must use a plethora of point tools that provide a limited, fragmented view of the IT environment. "I would like to thank our customers who have helped in this endeavor and our engineers, who, despite the current difficulty, have been working from home to finalize and ship VMDR. The next phase of the integration will allow Qualys customers to patch MacOS systems, as well as over 70 third-party Mac applications, directly through Qualys VMDR. This all, putting right from asset discovery to asset inventory, to vulnerability management, then prioritizing on the basis of the threats which are active, and then go about remediating and fixing those problems. "Furthermore, VMDR is cloud-native and built with scale in mind; it uses a scanning agent and passive scanning technology to provide accurate telemetry, which positions Qualys to move further into cloud security and traditional enterprise solutions such as EDR and SIEM.". Qualys VMDR 2.0 has helped us improve our program by providing additional threat and risk context to better identify high-risk vulnerabilities. As an employee, we get a lifetime license for personal use, and that's what I'm using. If the network devices or if the network level authentication is already enabled on the network, that means I do not need to worry about the BlueKeep vulnerability. internet-facing systems), and let Qualys VMDR propose the most effective remediation based on data from your own environment. Quantify risk across vulnerabilities, assets, and groups of assets to help your organization proactively mitigate risk exposure and track risk reduction over time with TruRisk, Automate remediation with no-code workflows, Save valuable time by automating and orchestrating operational tasks for vulnerability management and patching with Qualys Flow, Leverage insights from over 180k vulnerabilities sourced from over 25+ threat sources to receive preemptive alerts on potential attacks with the Qualys Threat DB, Detect all IT, OT, and IoT assets for a complete, categorized inventory enriched with details such as vendor lifecycle information and much more, Analyze vulnerabilities and misconfigurations with six sigma accuracy, Automatically detect vulnerabilities and critical misconfigurations per Center for Internet Security (CIS) benchmarks, by asset, Rule-based integrations with ITSM tools such as ServiceNow and JIRA automatically assign tickets and enable orchestration of remediation to reduce MTTR. as well as Software vulnerabilities affecting SCADA servers, Engineering software, HMI Software, License Management Software, MES and ERPs systems are covered via Passive sensor and Qualys scanner or a Cloud . That way, infosec pros can work smarter and faster, optimizing resources and reducing risk. Container Inventory Discover and track container hosts and their information from build to runtime. . It sets policies and governs execution of PDLC - managing processes from cradle . Vulnerability Management, Detection and Response (VMDR) establishes the cyber security foundation that today's hybrid, dynamic and distributed IT environments require. Priced on a per-asset basis and with no software to update, VMDR drastically reduces your total cost of ownership. To showcase the solution's innovative approach to vulnerability management, Qualys is hosting an online event, VMDR Live, featuring an in-depth demo and Q&A on April 21, at 11 am PT. Choose an answer: Qualys provides virtual scanner appliances for which of the following cloud platforms? Qualys, Inc. (NASDAQ: QLYS) is a pioneer and leading provider of cloud-based security and compliance solutions with over 15,700 active customers in more than 130 countries, including a majority of each of the Forbes Global 100 and Fortune 100. You can take the exam several times, but the instructor said that there is a limit of 5 attempts. Security teams can take action to mitigate risk, helping the business measure its true risk, and track risk reduction over time. The Qualys Cloud Platform, combined with its powerful lightweight Cloud Agents, Virtual Scanners, and Network Analysis (passive scanning) capabilities bring together all four key elements of an effective vulnerability management program into a single app unified by powerful out-of-the-box orchestration workflows. Qualys Vulnerability Management, Detection and Response enables organizations to automatically discover every asset in their environment, including unmanaged assets appearing on the network, inventory all hardware and software, and classify and tag critical assets. On the basis of so many other internal context filters that are available with the VMDR concept and VMDR platform, you would be able to identify those vulnerabilities, those hundred vulnerabilities out of a thousand vulnerabilities, which you should pay immediate attention to. FOSTER CITY, Calif., April 15, 2020 /PRNewswire/ -- Qualys, Inc . What users are saying about Qualys Web Application Scanning pricing: "The cost is $30,000 USD for one year to cover WAS (Web Application Security) and the VM (Virtual Machine) security in a company with 200 employees." You will be subject to the destination website's privacy policy when you follow the link. A database query is a string of search attributes (we call them 'search tokens' or simply 'tokens') structured in the compatible syntax, which returns the targeted values. 1 (800) 745-4355. Contact us below to request a quote, or for any product-related questions. Scale up globally, on demand. 1 billion by 2027, rising at a market growth of 16. Qualys VMDR, the latest generation of the Qualys security application, incorporates machine learning to correlate issues and prioritize actionable remediation. VMDR starts with asset discovery and inventory to make sure you have an accurate account of all devices in your environment. SLS provides data destruction, resale and recycling of all IT equipment. So, what are the vulnerabilities that you should pay immediate attention to, so that you can prioritize your efforts because you have limited amount of remediation efforts, limited number of personnel, limited number of resources to work on vulnerability management, so that you would be able to focus on the areas which would be all the way more impactful then what it is today. The steps in the Vulnerability Management Life Cycle are described below. Vulnerability Management 2) Which phase of the VMDR Lifecycle is addressed by Qualys Patch Management (PM)? <br> Working with Unisys, Hyderabad as . There are two ways to authorize a Cloud Service Offering (CSO) through FedRAMP, through an individual agency or the Joint Authorization Board (JAB). Our priority must be to help customers rather than take this dire moment to attack competitors. E-mail our sales team or call us at +1 800 745 4355. Must this asset comply with PCI? Click Start Prioritizing 3. Qualys announces two virtual events: VMDR Live and Qualys response to Rapid7 marketing campaign against VMDR. VMDR includes, UNLIMITED: Qualys Virtual Passive Scanning Sensors (for discovery), Qualys Virtual Scanners, Qualys Cloud It's a continuous, seamlessly orchestrated workflow of automated asset discovery, vulnerability management, threat prioritization, and remediation. ";s:7:"keyword";s:28:"qualys vmdr lifecycle phases";s:5:"links";s:314:"338 Lapua Vs 9mm,
Royal Mail Hazard Perception Test,
Articles Q
";s:7:"expired";i:-1;}
{{ keyword }}Leave a reply