What is the ID associated with the Vulnerability Response plugln?
Where can you find Information related to the Common Vulnerabilities and Exposures (CVE)?
What is the purpose of Scoped Applications?
Which of the following best describes the Vulnerable item State Approval Workflow?
What type of data would the CIO/CISO want on the dashboard?
To ensure that Vulnerabilities are processed correctly, you can define a Service Level Agreement (SLA) for Vulnerability Response. To achieve this you would:
What option can be used to close out a Vulnerable item Record or initiate the Exception Process?
This functionality provides a simple way to build criteria once, which can be reused in other platform areas.
Select the three components of a Fitter Condition: Choose 3 answers
Qualys asset tags can be loaded into a table related to the configuration item and used to support business processes or reporting. Set the Qualys Host parameter of asset_tags to a value of___to have asset tag information from Qualys be included in the XML payload.
Which application provides the opportunity to align security events with organizational controls, automatically appraising other business functions of potential impact?
A list of software weaknesses is known as:
In order for Vulnerability admins to configure integrations, they must have the following Role(s):
What role Is required to view the Vulnerability Overview Dashboard?
Which of the following best describes a Vulnerability Group?
What is the ServiceNow application used for process automation?
What Business Rule creates a Configuration Item from a Vulnerable Item record?
What do Vulnerability Exceptions require?