New Year Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

CIS-VR Questions and Answers

Question # 6

What must Vulnerability Exceptions be supplied by default?

A.

A reason for the exception

B.

Integrations with GRC to handle the exception

C.

Requirement Actions for the exception

D.

A manual approval authority for the exception

Full Access
Question # 7

What option can be used to close out a Vulnerable item Record or initiate the Exception Process?

A.

Complete

B.

Update

C.

Close/Defer

D.

Save

Full Access
Question # 8

In ServiceNow, which plugin needs to be added to enable Vulnerability integration with Qualys, Tenable, or Rapid7?

A.

Vulnerability Response

B.

Trusted Security Circles

C.

Threat Intelligence

D.

Security Incident Response

Full Access
Question # 9

What is the ServiceNow application used for process automation?

A.

Knowledge Base

B.

Workflows

C.

SLAs

D.

Service Catalog

Full Access
Question # 10

What system property allows for the auto creation of Vulnerability Groups based on the Vulnerable Item's Vulnerability?

A.

sn_vul.autocreate_vul_filter_group

B.

sn_vul.autocreate_vul_approval_group

C.

sn_vul.autocreate_vul_group_item

D.

sn_vul.autocreate_vul_centric_group

Full Access
Question # 11

ServiceNow Vulnerability Response tables typically start with which prefix?

A.

snvr_

B.

snvuln_

C.

vul_

D.

sn_vul_

Full Access
Question # 12

Best Practices dictate that when creating a Change task from a Vulnerable Item which of the following fields should be used for assigning the Assigned To field on the Change task?

A.

Assigned To on Vulnerable item

B.

Managed By on CMDB_CI

C.

Assigned To on CMDB_CI Record

D.

Best Practice does not dictate a specific field

Full Access
Question # 13

When an approval is rejected for a Vulnerable Item exception, what happens to the State field for that record?

A.

It reverts to 'Analysis'

B.

It is set to 'New'

C.

It is set to 'In Review'

D.

It will be set back to its previous value

Full Access
Question # 14

Where can you find Information related to the Common Vulnerabilities and Exposures (CVE)?

A.

Tenable

B.

MITRE

C.

NIST

D.

Qualys

Full Access
Question # 15

Which module within the Vulnerability Response application could be used to get information from the National Vulnerability Database (NVD) at any moment?

A.

On-Demand Update

B.

NVD Auto-Update

C.

Vulnerable Software

D.

NVD Patch

Full Access
Question # 16

In order for Vulnerability admins to configure integrations, they must have the following Role(s):

A.

admin only

B.

sn_vul.admin only

C.

sn_vul.vulnerability_write

D.

admin and sn_vul_qualys.admin

Full Access
Question # 17

in regard to the Security Operations Process, which of the following statements defines the "identify" phase?

A.

What processes and assets need protection?

B.

What techniques can identify incidents?

C.

What safeguards are available?

D.

What techniques can restore capabilities?

E.

What techniques can contain impacts of incidents?

Full Access
Question # 18

sn_vul.itsm_popup is the properly that is set to True or False based on the customer desire for a popup when creating a Problem or Change record from a Vulnerability or VI record.

A.

True

B.

False

Full Access