Black Friday Special Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

ServiceNow CIS-VR Certified Implementation Specialist - Vulnerability Response Exam Practice Test

Page: 1 / 6
Total 60 questions

Certified Implementation Specialist - Vulnerability Response Questions and Answers

Question 1

What is the ID associated with the Vulnerability Response plugln?

Options:

A.

com.snc.threat.intelllgence

B.

com.snc.vulnerability

C.

com.snc.threat.feeds

D.

com.snc.securityjncident

Question 2

Where can you find Information related to the Common Vulnerabilities and Exposures (CVE)?

Options:

A.

Tenable

B.

MITRE

C.

NIST

D.

Qualys

Question 3

What is the purpose of Scoped Applications?

Options:

A.

Suppliers can only charge for applications when they are scoped

B.

Scoped applications are scalable. Global applications are not

C.

Scoping encapsulates and protects data and functionality

D.

An application needs to be scoped in order to be deployed as a plugin

Question 4

Which of the following best describes the Vulnerable item State Approval Workflow?

Options:

A.

It is read-only, you can only change the Assignment Group members for the approval

B.

It exists in the Security Operations Common scope so it can be modified by any Security Operations Admin

C.

It can only be modified by System Adminstrators

D.

It runs against the [sn_vul_change_approval] table

Question 5

What type of data would the CIO/CISO want on the dashboard?

Options:

A.

Aggregations for priority and workload

B.

Drill-down to granularity

C.

Single, clear indicators of organizational health

D.

Up to the minute views

Question 6

To ensure that Vulnerabilities are processed correctly, you can define a Service Level Agreement (SLA) for Vulnerability Response. To achieve this you would:

Options:

A.

Create a custom workflow to monitor the time between States

B.

Log in as a system admin, and using the globally scoped baseline SLA Modules

C.

Have the role of Vulnerability admin, but only in the Vulnerability Scope

D.

Make sure you have at least the sn_vul.vulnerability_write role and using the baseline SLA Application Modules

Question 7

What option can be used to close out a Vulnerable item Record or initiate the Exception Process?

Options:

A.

Complete

B.

Update

C.

Close/Defer

D.

Save

Question 8

This functionality provides a simple way to build criteria once, which can be reused in other platform areas.

Options:

A.

Conditions

B.

Favorites

C.

Filte Group

D.

Filters

Question 9

Select the three components of a Fitter Condition: Choose 3 answers

Options:

A.

Field

B.

Sum

C.

Operator

D.

Value

Question 10

Qualys asset tags can be loaded into a table related to the configuration item and used to support business processes or reporting. Set the Qualys Host parameter of asset_tags to a value of___to have asset tag information from Qualys be included in the XML payload.

Options:

A.

1

B.

3

C.

2

D.

0

Question 11

Which application provides the opportunity to align security events with organizational controls, automatically appraising other business functions of potential impact?

Options:

A.

Performance Analytics

B.

Event Management

C.

Governance. Risk, and Compliance

D.

Service Mapping

Question 12

A list of software weaknesses is known as:

Options:

A.

National Vulnerability Database (NVD)

B.

Common Vulnerability and Exposure (CVE)

C.

National Institute of Science and Technology (NIST)

D.

Common Weaknesses Enumeration (CWE)

Question 13

In order for Vulnerability admins to configure integrations, they must have the following Role(s):

Options:

A.

admin only

B.

sn_vul.admin only

C.

sn_vul.vulnerability_write

D.

admin and sn_vul_qualys.admin

Question 14

What role Is required to view the Vulnerability Overview Dashboard?

Options:

A.

sn_vuI.vulnerability.read

B.

sn_vuI.manager

C.

sn_vul.ciso

D.

sn_vul.vulnerability.wnte

Question 15

Which of the following best describes a Vulnerability Group?

Options:

A.

Groups Vis using a Filter against Vulnerable Item Fields

B.

A Filter defining a sub-set of Cls to be treated as a group

C.

The User Group assigned to resolving the Vulnerable Item

D.

Must have a corresponding filter group

Question 16

What is the ServiceNow application used for process automation?

Options:

A.

Knowledge Base

B.

Workflows

C.

SLAs

D.

Service Catalog

Question 17

What Business Rule creates a Configuration Item from a Vulnerable Item record?

Options:

A.

Create CI from Vulnerable Group Details

B.

Create CI from Closed Item Details

C.

Determine CI from Network Details

D.

Create CI from Vulnerable item Details

Question 18

What do Vulnerability Exceptions require?

Options:

A.

An Approval by default

B.

An Exception Workflow

C.

A GRC integration

D.

A Filter Group

Page: 1 / 6
Total 60 questions