Black Friday Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium ServiceNow CIS-VR Dumps Questions Answers

Page: 1 / 5
Total 60 questions

Certified Implementation Specialist - Vulnerability Response Questions and Answers

Question 1

Which of the following best describes a Vulnerability Group?

Options:

A.

Groups Vis using a Filter against Vulnerable Item Fields

B.

A Filter defining a sub-set of Cls to be treated as a group

C.

The User Group assigned to resolving the Vulnerable Item

D.

Must have a corresponding filter group

Buy Now
Question 2

If fixing a Vulnerable Item outweighs the benefits, the correct course of action is:

Options:

A.

Mark the CI inactive in the CMDB and notify the CI owner

B.

Record the accepted risk and Close/Defer the Vulnerable Item

C.

Deprioritize the Vulnerable item Records (VlT) to push them further down the list so it can be ignored

D.

Add the Cl to the Vulnerability Scanners exclusions Related List

Question 3

Which module is used to adjust the frequency in which CVEs are updated?

Options:

A.

NVD Auto-update

B.

Update

C.

CVE Auto-update

D.

On-demand update

Question 4

Which of the following is a common Integration point between Vulnerability and GRC?

Options:

A.

Security Incident Response

B.

Change

C.

Problem

D.

Risk Indicators

Question 5

Select the three components of a Fitter Condition: Choose 3 answers

Options:

A.

Field

B.

Sum

C.

Operator

D.

Value

Question 6

Which application provides the opportunity to align security events with organizational controls, automatically appraising other business functions of potential impact?

Options:

A.

Performance Analytics

B.

Event Management

C.

Governance. Risk, and Compliance

D.

Service Mapping

Question 7

What is the best way to develop a complete list of Vulnerability Reports?

Options:

A.

Recommend that the client purchase the full Performance Analytics package.

B.

Ask the CISO.

C.

Work with the customer to identify the things that will be most useful to them.

D.

Use the standard out of the box reports only.

Question 8

in regard to the Security Operations Process, which of the following statements defines the "identify" phase?

Options:

A.

What processes and assets need protection?

B.

What techniques can identify incidents?

C.

What safeguards are available?

D.

What techniques can restore capabilities?

E.

What techniques can contain impacts of incidents?

Question 9

Filter groups can be used In Vulnerability Response to group what type of vulnerability records?

Options:

A.

Vulnerability groups

B.

Third Party Entries

C.

Vulnerable Items

D.

Vulnerable Software

Question 10

To facilitate the remediation of a Vulnerable Item what type of Item is most commonly used?

Options:

A.

Create a Problem

B.

Create a Security Incident

C.

Create a KB article

D.

Create a Change

Question 11

The components Installed with Vulnerability Response Include:

Options:

A.

Tables, Scheduled Jobs, Security Operations Common

B.

Business Rules, Roles, Workflows

C.

Properties, Client Scripts, Wizards

D.

Ul Pages. Business Rules, Vulnerability Scanners

Question 12

When an approval is rejected for a Vulnerable Item exception, what happens to the State field for that record?

Options:

A.

It reverts to 'Analysis'

B.

It is set to 'New'

C.

It is set to 'In Review'

D.

It will be set back to its previous value

Question 13

Approvals within the Vulnerability Application are created based on:

Options:

A.

The sys_approval and the and the sn_vul_vulnerable_item tables

B.

The sn_vul_vulnerable_item and sn_vul_vulnerability tables

C.

The sn_vul_change_approval table

D.

Ths sys_approval table

Question 14

SLAs are used to ensure VUL are processed in a timely matter. Which field is used to determine the expected timeframe for remediating a VlT?

Options:

A.

Updated

B.

Remediation status

C.

Remediation target

D.

Closed

Question 15

Which Vulnerability maturity level provides advanced owner assignment?

Options:

A.

Enterprise risk trending

B.

Automated prioritization

C.

Manual operations

D.

Improved remediation

Question 16

Which of the following can NOT be used for building Vulnerability Groups?

Options:

A.

Vulnerability

B.

Filter Groups

C.

Condition Builder

D.

Advanced Scripts

Question 17

Where can you find Information related to the Common Vulnerabilities and Exposures (CVE)?

Options:

A.

Tenable

B.

MITRE

C.

NIST

D.

Qualys

Question 18

Which one of the following record types can be considered the intersection of Vulnerability source information and CMDB CI records?

Options:

A.

Vulnerability

B.

Vulnerability Task

C.

CMDB_CI_Vuln

D.

Vulnerable Item (VI)

Page: 1 / 5
Total 60 questions