Pass4itsure > ServiceNow > Vulnerability Response Implementation > CIS-VR > CIS-VR Online Practice Questions and Answers

CIS-VR Online Practice Questions and Answers

Questions 4

A list of software weaknesses is known as:

A. National Vulnerability Database (NVD)

B. Common Vulnerability and Exposure (CVE)

C. National Institute of Science and Technology (NIST)

D. Common Weaknesses Enumeration (CWE)

Buy Now
Questions 5

Vulnerability Response can be best categorized as a ____________, focused on identifying and remediating vulnerabilities as early as possible.

A. A proactive process

B. An iterative process

C. A tentative process

D. A reactive process

Buy Now
Questions 6

What is the ID associated with the Vulnerability Response plugin?

A. com.snc.threat.intelligence

B. com.snc.vulnerability

C. com.snc.threat.feeds

D. com.snc.security_incident

Buy Now
Questions 7

Which Vulnerability maturity level provides advanced owner assignment?

A. Enterprise risk trending

B. Automated prioritization

C. Manual operations

D. Improved remediation

Buy Now
Questions 8

Ignoring a Vulnerable Item:

A. Permanently removes the item from the list of Active Vulnerable Items

B. Move the item to the Slushbucket

C. Has no impact on the list of Active Vulnerable Items

D. Temporarily removes the item from the list of Active Vulnerable Items

Buy Now
Questions 9

Best Practices dictate that when creating a Change task from a Vulnerable Item, which of the following fields should be used for assigning the Assigned To field on the Change task?

A. Assigned To on Vulnerable Item

B. Managed By on CMDB_CI

C. Assigned To on CMDB_CI Record

D. Best Practice does not dictate a specific field

Buy Now
Questions 10

Approvals within the Vulnerability Application are created based on:

A. The sys_approval and the sn_vul_vulnerable_item tables

B. The sn_vul_vulnerable_item and sn_vul_vulnerability tables

C. The sn_vul_change_approval table

D. The sys_approval table

Buy Now
Questions 11

What must Vulnerability Exceptions be supplied by default?

A. A reason for the exception

B. Integrations with GRC to handle the exception

C. Requirement Actions for the exception

D. A manual approval authority for the exception

Buy Now
Questions 12

Which of the following best describes a Vulnerability Group?

A. Groups VIs using a Filter against Vulnerable Item Fields

B. A Filter defining a sub-set of CIs to be treated as a group

C. The User Group assigned to resolving the Vulnerable Item

D. Must have a corresponding filter group

Buy Now
Questions 13

Filter Groups can be used in Vulnerability Response to group what type of vulnerability records?

A. Vulnerability groups

B. Third Party Entries

C. Vulnerable Items

D. Vulnerable Software

Buy Now
Exam Code: CIS-VR
Exam Name: Certified Implementation Specialist - Vulnerability Response
Last Update: Apr 20, 2024
Questions: 60
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$45.99

VCE

$49.99

PDF + VCE

$59.99