Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

ServiceNow CIS-VR - Certified Implementation Specialist - Vulnerability Response

Page: 1 / 2
Total 60 questions

Which of the following best describes the Vulnerable item State Approval Workflow?

A.

It is read-only, you can only change the Assignment Group members for the approval

B.

It exists in the Security Operations Common scope so it can be modified by any Security Operations Admin

C.

It can only be modified by System Adminstrators

D.

It runs against the [sn_vul_change_approval] table

In order to more easily manage large sets of Vulnerable items, what should you create?

A.

Vulnerability Groups

B.

Calculator Group

C.

Filter Group

D.

Vulnerable item Conditions

ServiceNow Vulnerability Response tables typically start with which prefix?

A.

snvr_

B.

snvuln_

C.

vul_

D.

sn_vul_

Items in the ServiceNow Store are built and supported by:

A.

An Implementation Partner

B.

The company that created the Application

C.

ServiceNow Professional Services

D.

ServiceNow Technical Support

sn_vul.itsm_popup is the properly that is set to True or False based on the customer desire for a popup when creating a Problem or Change record from a Vulnerability or VI record.

A.

True

B.

False

When an approval is rejected for a Vulnerable Item exception, what happens to the State field for that record?

A.

It reverts to 'Analysis'

B.

It is set to 'New'

C.

It is set to 'In Review'

D.

It will be set back to its previous value

After closing the Vulnerable Item (VI), it is recommended to:

A.

Update the values in the Vulnerability Score Indicator (VSl) based on the criticality of the Vulnerability.

B.

The VI remains active and in place until the Scanner rescans and closes the VI.

C.

Mark the CI as exempt from the Vulnerability if the vulnerability was remediated.

D.

Compare the Vulnerability with subsequent scans.

A common Integration point with Vulnerability is:

A.

Workflow Mappings

B.

Risk Indicators within GRC

C.

Service Catalog

D.

Knowledge Base

Best Practices dictate that when creating a Change task from a Vulnerable Item which of the following fields should be used for assigning the Assigned To field on the Change task?

A.

Assigned To on Vulnerable item

B.

Managed By on CMDB_CI

C.

Assigned To on CMDB_CI Record

D.

Best Practice does not dictate a specific field

Managers should have access to which role-based data access and visualizations? Choose 3 answers

A.

Aggregations for priority and workload

B.

Time period views

C.

Up-to-the-minute views

D.

Drill-down to granularity