Weekend Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: suredis

ServiceNow CIS-VR Certified Implementation Specialist - Vulnerability Response Exam Practice Test

Page: 1 / 6
Total 60 questions

Certified Implementation Specialist - Vulnerability Response Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$42  $119.99

PDF Study Guide

  • Product Type: PDF Study Guide
$36.75  $104.99
Question 1

What is the purpose of Scoped Applications?

Options:

A.

Suppliers can only charge for applications when they are scoped

B.

Scoped applications are scalable. Global applications are not

C.

Scoping encapsulates and protects data and functionality

D.

An application needs to be scoped in order to be deployed as a plugin

Question 2

Best Practices dictate that when creating a Change task from a Vulnerable Item which of the following fields should be used for assigning the Assigned To field on the Change task?

Options:

A.

Assigned To on Vulnerable item

B.

Managed By on CMDB_CI

C.

Assigned To on CMDB_CI Record

D.

Best Practice does not dictate a specific field

Question 3

What must Vulnerability Exceptions be supplied by default?

Options:

A.

A reason for the exception

B.

Integrations with GRC to handle the exception

C.

Requirement Actions for the exception

D.

A manual approval authority for the exception

Question 4

What Business Rule creates a Configuration Item from a Vulnerable Item record?

Options:

A.

Create CI from Vulnerable Group Details

B.

Create CI from Closed Item Details

C.

Determine CI from Network Details

D.

Create CI from Vulnerable item Details

Question 5

A list of software weaknesses is known as:

Options:

A.

National Vulnerability Database (NVD)

B.

Common Vulnerability and Exposure (CVE)

C.

National Institute of Science and Technology (NIST)

D.

Common Weaknesses Enumeration (CWE)

Question 6

In order to more easily manage large sets of Vulnerable items, what should you create?

Options:

A.

Vulnerability Groups

B.

Calculator Group

C.

Filter Group

D.

Vulnerable item Conditions

Question 7

What is the ServiceNow application used for process automation?

Options:

A.

Knowledge Base

B.

Workflows

C.

SLAs

D.

Service Catalog

Question 8

If a customer expects to ingest 2 million vulnerabilities during it's initial load, which instance size should you recommend?

Options:

A.

L

B.

XL

C.

XXL

D.

Ultra

Question 9

Where can you find Information related to the Common Vulnerabilities and Exposures (CVE)?

Options:

A.

Tenable

B.

MITRE

C.

NIST

D.

Qualys

Page: 1 / 6
Total 60 questions