Winter Special Flat 65% Limited Time Discount offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

ServiceNow CIS-VR Certified Implementation Specialist - Vulnerability Response Exam Practice Test

Page: 1 / 6
Total 60 questions

Certified Implementation Specialist - Vulnerability Response Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$42  $119.99

PDF Study Guide

  • Product Type: PDF Study Guide
$36.75  $104.99
Question 1

What is the minimum role required to create and change Service Level Agreements for Vulnerability Response groups?

Options:

A.

sla_manager

B.

admin

C.

sn_vul.vulnerability_write

D.

sn_vul.admin

Question 2

Select the three components of a Fitter Condition: Choose 3 answers

Options:

A.

Field

B.

Sum

C.

Operator

D.

Value

Question 3

Which of the following is a common Integration point between Vulnerability and GRC?

Options:

A.

Security Incident Response

B.

Change

C.

Problem

D.

Risk Indicators

Question 4

sn_vul.itsm_popup is the properly that is set to True or False based on the customer desire for a popup when creating a Problem or Change record from a Vulnerability or VI record.

Options:

A.

True

B.

False

Question 5

Vulnerability Response can be best categorized as a_______, focused on identifying and remediating vulnerabilities as early as possible.

Options:

A.

A proactive process

B.

An iterative process

C.

A tentative process

D.

A reactive process

Question 6

Changes made within a named Update Set in a different application scope:

Options:

A.

Will be captured

B.

Will throw errors

C.

Will not be captured

D.

Will be partially captured

Question 7

What is the best way to develop a complete list of Vulnerability Reports?

Options:

A.

Recommend that the client purchase the full Performance Analytics package.

B.

Ask the CISO.

C.

Work with the customer to identify the things that will be most useful to them.

D.

Use the standard out of the box reports only.

Question 8

Approvals within the Vulnerability Application are created based on:

Options:

A.

The sys_approval and the and the sn_vul_vulnerable_item tables

B.

The sn_vul_vulnerable_item and sn_vul_vulnerability tables

C.

The sn_vul_change_approval table

D.

Ths sys_approval table

Question 9

What Business Rule creates a Configuration Item from a Vulnerable Item record?

Options:

A.

Create CI from Vulnerable Group Details

B.

Create CI from Closed Item Details

C.

Determine CI from Network Details

D.

Create CI from Vulnerable item Details

Question 10

SLAs are used to ensure VUL are processed in a timely matter. Which field is used to determine the expected timeframe for remediating a VlT?

Options:

A.

Updated

B.

Remediation status

C.

Remediation target

D.

Closed

Question 11

A list of software weaknesses is known as:

Options:

A.

National Vulnerability Database (NVD)

B.

Common Vulnerability and Exposure (CVE)

C.

National Institute of Science and Technology (NIST)

D.

Common Weaknesses Enumeration (CWE)

Question 12

What is the purpose of Scoped Applications?

Options:

A.

Suppliers can only charge for applications when they are scoped

B.

Scoped applications are scalable. Global applications are not

C.

Scoping encapsulates and protects data and functionality

D.

An application needs to be scoped in order to be deployed as a plugin

Question 13

A common Integration point with Vulnerability is:

Options:

A.

Workflow Mappings

B.

Risk Indicators within GRC

C.

Service Catalog

D.

Knowledge Base

Question 14

If fixing a Vulnerable Item outweighs the benefits, the correct course of action is:

Options:

A.

Mark the CI inactive in the CMDB and notify the CI owner

B.

Record the accepted risk and Close/Defer the Vulnerable Item

C.

Deprioritize the Vulnerable item Records (VlT) to push them further down the list so it can be ignored

D.

Add the Cl to the Vulnerability Scanners exclusions Related List

Question 15

In order for Vulnerability admins to configure integrations, they must have the following Role(s):

Options:

A.

admin only

B.

sn_vul.admin only

C.

sn_vul.vulnerability_write

D.

admin and sn_vul_qualys.admin

Question 16

Filter groups can be used In Vulnerability Response to group what type of vulnerability records?

Options:

A.

Vulnerability groups

B.

Third Party Entries

C.

Vulnerable Items

D.

Vulnerable Software

Question 17

Which one of the following record types can be considered the intersection of Vulnerability source information and CMDB CI records?

Options:

A.

Vulnerability

B.

Vulnerability Task

C.

CMDB_CI_Vuln

D.

Vulnerable Item (VI)

Question 18

This functionality provides a simple way to build criteria once, which can be reused in other platform areas.

Options:

A.

Conditions

B.

Favorites

C.

Filte Group

D.

Filters

Page: 1 / 6
Total 60 questions