Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the ServiceNow Vulnerability Response Implementation CIS-VR Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam CIS-VR Premium Access

View all detail and faqs for the CIS-VR exam


436 Students Passed

95% Average Score

97% Same Questions
Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

What is the ServiceNow application used for process automation?

Options:

A.

Knowledge Base

B.

Workflows

C.

SLAs

D.

Service Catalog

Questions # 2:

If fixing a Vulnerable Item outweighs the benefits, the correct course of action is:

Options:

A.

Mark the CI inactive in the CMDB and notify the CI owner

B.

Record the accepted risk and Close/Defer the Vulnerable Item

C.

Deprioritize the Vulnerable item Records (VlT) to push them further down the list so it can be ignored

D.

Add the Cl to the Vulnerability Scanners exclusions Related List

Questions # 3:

Which Vulnerability maturity level provides advanced owner assignment?

Options:

A.

Enterprise risk trending

B.

Automated prioritization

C.

Manual operations

D.

Improved remediation

Questions # 4:

Ignoring a Vulnerable item:

Options:

A.

Permanently removes the item from the list of Active Vulnerable items

B.

Move the item to the Slushbucket

C.

Has no impact on the list of Active Vulnerable Items

D.

Temporarily removes the item from the list of Active Vulnerable items

Questions # 5:

Which module within the Vulnerability Response application could be used to get information from the National Vulnerability Database (NVD) at any moment?

Options:

A.

On-Demand Update

B.

NVD Auto-Update

C.

Vulnerable Software

D.

NVD Patch

Questions # 6:

Qualys asset tags can be loaded into a table related to the configuration item and used to support business processes or reporting. Set the Qualys Host parameter of asset_tags to a value of___to have asset tag information from Qualys be included in the XML payload.

Options:

A.

1

B.

3

C.

2

D.

0

Questions # 7:

What is the minimum role required to create and change Service Level Agreements for Vulnerability Response groups?

Options:

A.

sla_manager

B.

admin

C.

sn_vul.vulnerability_write

D.

sn_vul.admin

Questions # 8:

Filter groups can be used In Vulnerability Response to group what type of vulnerability records?

Options:

A.

Vulnerability groups

B.

Third Party Entries

C.

Vulnerable Items

D.

Vulnerable Software

Questions # 9:

Which of the following best describes a Vulnerability Group?

Options:

A.

Groups Vis using a Filter against Vulnerable Item Fields

B.

A Filter defining a sub-set of Cls to be treated as a group

C.

The User Group assigned to resolving the Vulnerable Item

D.

Must have a corresponding filter group

Questions # 10:

Vulnerability Response can be best categorized as a_______, focused on identifying and remediating vulnerabilities as early as possible.

Options:

A.

A proactive process

B.

An iterative process

C.

A tentative process

D.

A reactive process

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.