What option can be used to close out a Vulnerable item Record or initiate the Exception Process?
If a customer expects to ingest 2 million vulnerabilities during it's initial load, which instance size should you recommend?
Some customers may have a clearly-defined, well-documented vulnerability exception process and some may even provide a diagram illustrating that process What is the main advantage of having this documentation
when translating it into a Flow or Workflow?
What system property allows for the auto creation of Vulnerability Groups based on the Vulnerable Item's Vulnerability?
In order to more easily manage large sets of Vulnerable items, what should you create?
To facilitate the remediation of a Vulnerable Item what type of Item is most commonly used?
Which one of the following record types can be considered the intersection of Vulnerability source information and CMDB CI records?
Best Practices dictate that when creating a Change task from a Vulnerable Item which of the following fields should be used for assigning the Assigned To field on the Change task?
Qualys asset tags can be loaded into a table related to the configuration item and used to support business processes or reporting. Set the Qualys Host parameter of asset_tags to a value of___to have asset tag information from Qualys be included in the XML payload.
This functionality provides a simple way to build criteria once, which can be reused in other platform areas.
sn_vul.itsm_popup is the properly that is set to True or False based on the customer desire for a popup when creating a Problem or Change record from a Vulnerability or VI record.
To get useful reporting regarding the most vulnerable CI's, which statement applies?
When an approval is rejected for a Vulnerable Item exception, what happens to the State field for that record?