11.11 Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CIS-VR Exam Dumps - Certified Implementation Specialist - Vulnerability Response

Question # 4

Which of the following is a common Integration point between Vulnerability and GRC?

A.

Security Incident Response

B.

Change

C.

Problem

D.

Risk Indicators

Full Access
Question # 5

The Vulnerability Admin role (sn_vul.admin) can modify Vulnerability Application Properties and can be delegated to the following role(s):

A.

ServiceNow Security Operations Admin (sn_sec.admin)

B.

Security Admin (security.admin)

C.

Vulnerability Response Admin (sn_vul_resp.admin)

D.

All of the above

E.

None of the above

Full Access
Question # 6

What must Vulnerability Exceptions be supplied by default?

A.

A reason for the exception

B.

Integrations with GRC to handle the exception

C.

Requirement Actions for the exception

D.

A manual approval authority for the exception

Full Access
Question # 7

Which one of the following record types can be considered the intersection of Vulnerability source information and CMDB CI records?

A.

Vulnerability

B.

Vulnerability Task

C.

CMDB_CI_Vuln

D.

Vulnerable Item (VI)

Full Access
Question # 8

Which of the following provides a list of software weaknesses?

A.

Third Party Entries

B.

NVD

C.

CWE

D.

Vulnerable Items

Full Access
Question # 9

In order to more easily manage large sets of Vulnerable items, what should you create?

A.

Vulnerability Groups

B.

Calculator Group

C.

Filter Group

D.

Vulnerable item Conditions

Full Access
Question # 10

When an approval is rejected for a Vulnerable Item exception, what happens to the State field for that record?

A.

It reverts to 'Analysis'

B.

It is set to 'New'

C.

It is set to 'In Review'

D.

It will be set back to its previous value

Full Access
Question # 11

If a customer expects to ingest 2 million vulnerabilities during it's initial load, which instance size should you recommend?

A.

L

B.

XL

C.

XXL

D.

Ultra

Full Access
Question # 12

What is the ID associated with the Vulnerability Response plugln?

A.

com.snc.threat.intelllgence

B.

com.snc.vulnerability

C.

com.snc.threat.feeds

D.

com.snc.securityjncident

Full Access
Question # 13

Changes made within a named Update Set in a different application scope:

A.

Will be captured

B.

Will throw errors

C.

Will not be captured

D.

Will be partially captured

Full Access
Question # 14

Which of the following can NOT be used for building Vulnerability Groups?

A.

Vulnerability

B.

Filter Groups

C.

Condition Builder

D.

Advanced Scripts

Full Access
Question # 15

What type of data would the CIO/CISO want on the dashboard?

A.

Aggregations for priority and workload

B.

Drill-down to granularity

C.

Single, clear indicators of organizational health

D.

Up to the minute views

Full Access
Question # 16

To get useful reporting regarding the most vulnerable CI's, which statement applies?

A.

You must purchase a separate PA module.

B.

Your CI population must be huge.

C.

You must have good KPi's defined.

D.

Your CMDB must be up to date and useful.

Full Access
Question # 17

Which statement about patching is most correct?

A.

Mature organizations abandon patching

B.

Patch management and Vulnerability Response are interchangeable terms

C.

Patching is one of many responses to a Vulnerability

D.

As long as you are patching actively. Vulnerability Response isn't necessary

Full Access
Question # 18

sn_vul.itsm_popup is the properly that is set to True or False based on the customer desire for a popup when creating a Problem or Change record from a Vulnerability or VI record.

A.

True

B.

False

Full Access