Pass the ServiceNow Vulnerability Response Implementation CIS-VR Questions and answers with CertsForce

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

When an approval is rejected for a Vulnerable Item exception, what happens to the State field for that record?

Options:

A.

It reverts to 'Analysis'


B.

It is set to 'New'


C.

It is set to 'In Review'


D.

It will be set back to its previous value


Expert Solution
Questions # 2:

Changes made within a named Update Set in a different application scope:

Options:

A.

Will be captured


B.

Will throw errors


C.

Will not be captured


D.

Will be partially captured


Expert Solution
Questions # 3:

What role Is required to view the Vulnerability Overview Dashboard?

Options:

A.

sn_vuI.vulnerability.read


B.

sn_vuI.manager


C.

sn_vul.ciso


D.

sn_vul.vulnerability.wnte


Expert Solution
Questions # 4:

What must Vulnerability Exceptions be supplied by default?

Options:

A.

A reason for the exception


B.

Integrations with GRC to handle the exception


C.

Requirement Actions for the exception


D.

A manual approval authority for the exception


Expert Solution
Questions # 5:

Which one of the following record types can be considered the intersection of Vulnerability source information and CMDB CI records?

Options:

A.

Vulnerability


B.

Vulnerability Task


C.

CMDB_CI_Vuln


D.

Vulnerable Item (VI)


Expert Solution
Questions # 6:

Approvals within the Vulnerability Application are created based on:

Options:

A.

The sys_approval and the and the sn_vul_vulnerable_item tables


B.

The sn_vul_vulnerable_item and sn_vul_vulnerability tables


C.

The sn_vul_change_approval table


D.

Ths sys_approval table


Expert Solution
Questions # 7:

Filter Groups provide a way to:

Options:

A.

Decouple the use of the grouping from the definition of the grouping


B.

Build criteria once


C.

Reuse criteria in a variety of places


D.

All of the above


Expert Solution
Questions # 8:

To ensure that Vulnerabilities are processed correctly, you can define a Service Level Agreement (SLA) for Vulnerability Response. To achieve this you would:

Options:

A.

Create a custom workflow to monitor the time between States


B.

Log in as a system admin, and using the globally scoped baseline SLA Modules


C.

Have the role of Vulnerability admin, but only in the Vulnerability Scope


D.

Make sure you have at least the sn_vul.vulnerability_write role and using the baseline SLA Application Modules


Expert Solution
Questions # 9:

Vulnerability Response is a scoped application; which prefix is attached to all items related to the application?

Options:

A.

cmn_vul


B.

vul


C.

sn_vul


D.

x_vul


Expert Solution
Questions # 10:

in regard to the Security Operations Process, which of the following statements defines the "identify" phase?

Options:

A.

What processes and assets need protection?


B.

What techniques can identify incidents?


C.

What safeguards are available?


D.

What techniques can restore capabilities?


E.

What techniques can contain impacts of incidents?


Expert Solution
Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions