Month End Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

ExamsBrite Dumps

Certified Implementation Specialist - Vulnerability Response Question and Answers

Certified Implementation Specialist - Vulnerability Response

Last Update Jan 25, 2025
Total Questions : 60

We are offering FREE CIS-VR ServiceNow exam questions. All you do is to just go and sign up. Give your details, prepare CIS-VR free exam questions and then go for complete pool of Certified Implementation Specialist - Vulnerability Response test questions that will help you more.

CIS-VR pdf

CIS-VR PDF

$36.75  $104.99
CIS-VR Engine

CIS-VR Testing Engine

$43.75  $124.99
CIS-VR PDF + Engine

CIS-VR PDF + Testing Engine

$57.75  $164.99
Questions 1

If a customer expects to ingest 2 million vulnerabilities during it's initial load, which instance size should you recommend?

Options:

A.  

L

B.  

XL

C.  

XXL

D.  

Ultra

Discussion 0
Questions 2

Vulnerability Response is a scoped application; which prefix is attached to all items related to the application?

Options:

A.  

cmn_vul

B.  

vul

C.  

sn_vul

D.  

x_vul

Discussion 0
Questions 3

To ensure that Vulnerabilities are processed correctly, you can define a Service Level Agreement (SLA) for Vulnerability Response. To achieve this you would:

Options:

A.  

Create a custom workflow to monitor the time between States

B.  

Log in as a system admin, and using the globally scoped baseline SLA Modules

C.  

Have the role of Vulnerability admin, but only in the Vulnerability Scope

D.  

Make sure you have at least the sn_vul.vulnerability_write role and using the baseline SLA Application Modules

Discussion 0
Questions 4

What do Vulnerability Exceptions require?

Options:

A.  

An Approval by default

B.  

An Exception Workflow

C.  

A GRC integration

D.  

A Filter Group

Discussion 0
Questions 5

Items in the ServiceNow Store are built and supported by:

Options:

A.  

An Implementation Partner

B.  

The company that created the Application

C.  

ServiceNow Professional Services

D.  

ServiceNow Technical Support

Discussion 0
Questions 6

What is the ID associated with the Vulnerability Response plugln?

Options:

A.  

com.snc.threat.intelllgence

B.  

com.snc.vulnerability

C.  

com.snc.threat.feeds

D.  

com.snc.securityjncident

Discussion 0
Questions 7

Which of the following provides a list of software weaknesses?

Options:

A.  

Third Party Entries

B.  

NVD

C.  

CWE

D.  

Vulnerable Items

Discussion 0
Questions 8

Changes made within a named Update Set in a different application scope:

Options:

A.  

Will be captured

B.  

Will throw errors

C.  

Will not be captured

D.  

Will be partially captured

Discussion 0
Questions 9

Where can you find Information related to the Common Vulnerabilities and Exposures (CVE)?

Options:

A.  

Tenable

B.  

MITRE

C.  

NIST

D.  

Qualys

Discussion 0
Questions 10

Vulnerability Response can be best categorized as a_______, focused on identifying and remediating vulnerabilities as early as possible.

Options:

A.  

A proactive process

B.  

An iterative process

C.  

A tentative process

D.  

A reactive process

Discussion 0
Questions 11

In order for Vulnerability admins to configure integrations, they must have the following Role(s):

Options:

A.  

admin only

B.  

sn_vul.admin only

C.  

sn_vul.vulnerability_write

D.  

admin and sn_vul_qualys.admin

Discussion 0
Questions 12

Filter Groups provide a way to:

Options:

A.  

Decouple the use of the grouping from the definition of the grouping

B.  

Build criteria once

C.  

Reuse criteria in a variety of places

D.  

All of the above

Discussion 0
Questions 13

In order to more easily manage large sets of Vulnerable Items, you would want to create:

Options:

A.  

Vulnerability Groups

B.  

Script Includes

C.  

Filter Groups

D.  

Vulnerability Sets

Discussion 0
Questions 14

Which of the following can NOT be used for building Vulnerability Groups?

Options:

A.  

Vulnerability

B.  

Filter Groups

C.  

Condition Builder

D.  

Advanced Scripts

Discussion 0
Questions 15

What is the minimum role required to create and change Service Level Agreements for Vulnerability Response groups?

Options:

A.  

sla_manager

B.  

admin

C.  

sn_vul.vulnerability_write

D.  

sn_vul.admin

Discussion 0
Questions 16

Managers should have access to which role-based data access and visualizations? Choose 3 answers

Options:

A.  

Aggregations for priority and workload

B.  

Time period views

C.  

Up-to-the-minute views

D.  

Drill-down to granularity

Discussion 0
Questions 17

After closing the Vulnerable Item (VI), it is recommended to:

Options:

A.  

Update the values in the Vulnerability Score Indicator (VSl) based on the criticality of the Vulnerability.

B.  

The VI remains active and in place until the Scanner rescans and closes the VI.

C.  

Mark the CI as exempt from the Vulnerability if the vulnerability was remediated.

D.  

Compare the Vulnerability with subsequent scans.

Discussion 0
Questions 18

Best Practices dictate that when creating a Change task from a Vulnerable Item which of the following fields should be used for assigning the Assigned To field on the Change task?

Options:

A.  

Assigned To on Vulnerable item

B.  

Managed By on CMDB_CI

C.  

Assigned To on CMDB_CI Record

D.  

Best Practice does not dictate a specific field

Discussion 0