Pass the ServiceNow Vulnerability Response Implementation CIS-VR Questions and answers with CertsForce

Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions
Questions # 11:

Managers should have access to which role-based data access and visualizations? Choose 3 answers

Options:

A.

Aggregations for priority and workload


B.

Time period views


C.

Up-to-the-minute views


D.

Drill-down to granularity


Expert Solution
Questions # 12:

What is the purpose of Scoped Applications?

Options:

A.

Suppliers can only charge for applications when they are scoped


B.

Scoped applications are scalable. Global applications are not


C.

Scoping encapsulates and protects data and functionality


D.

An application needs to be scoped in order to be deployed as a plugin


Expert Solution
Questions # 13:

Which module is used to adjust the frequency in which CVEs are updated?

Options:

A.

NVD Auto-update


B.

Update


C.

CVE Auto-update


D.

On-demand update


Expert Solution
Questions # 14:

ServiceNow Vulnerability Response tables typically start with which prefix?

Options:

A.

snvr_


B.

snvuln_


C.

vul_


D.

sn_vul_


Expert Solution
Questions # 15:

What Business Rule creates a Configuration Item from a Vulnerable Item record?

Options:

A.

Create CI from Vulnerable Group Details


B.

Create CI from Closed Item Details


C.

Determine CI from Network Details


D.

Create CI from Vulnerable item Details


Expert Solution
Questions # 16:

If fixing a Vulnerable Item outweighs the benefits, the correct course of action is:

Options:

A.

Mark the CI inactive in the CMDB and notify the CI owner


B.

Record the accepted risk and Close/Defer the Vulnerable Item


C.

Deprioritize the Vulnerable item Records (VlT) to push them further down the list so it can be ignored


D.

Add the Cl to the Vulnerability Scanners exclusions Related List


Expert Solution
Questions # 17:

If a customer expects to ingest 2 million vulnerabilities during it's initial load, which instance size should you recommend?

Options:

A.

L


B.

XL


C.

XXL


D.

Ultra


Expert Solution
Questions # 18:

What is the best way to develop a complete list of Vulnerability Reports?

Options:

A.

Recommend that the client purchase the full Performance Analytics package.


B.

Ask the CISO.


C.

Work with the customer to identify the things that will be most useful to them.


D.

Use the standard out of the box reports only.


Expert Solution
Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions