Black Friday Special Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > ServiceNow > Vulnerability Response Implementation > CIS-VR

CIS-VR Certified Implementation Specialist - Vulnerability Response Question and Answers

Question # 4

What option can be used to close out a Vulnerable item Record or initiate the Exception Process?

A.

Complete

B.

Update

C.

Close/Defer

D.

Save

Full Access
Question # 5

If a customer expects to ingest 2 million vulnerabilities during it's initial load, which instance size should you recommend?

A.

L

B.

XL

C.

XXL

D.

Ultra

Full Access
Question # 6

Some customers may have a clearly-defined, well-documented vulnerability exception process and some may even provide a diagram illustrating that process What is the main advantage of having this documentation

when translating it into a Flow or Workflow?

A.

Perfect opportunity for process improvement

B.

Understand their internal process

C.

Build the Flow/WorKflow directly into the platform

D.

No advantage

Full Access
Question # 7

What type of data would the CIO/CISO want on the dashboard?

A.

Aggregations for priority and workload

B.

Drill-down to granularity

C.

Single, clear indicators of organizational health

D.

Up to the minute views

Full Access
Question # 8

What system property allows for the auto creation of Vulnerability Groups based on the Vulnerable Item's Vulnerability?

A.

sn_vul.autocreate_vul_filter_group

B.

sn_vul.autocreate_vul_approval_group

C.

sn_vul.autocreate_vul_group_item

D.

sn_vul.autocreate_vul_centric_group

Full Access
Question # 9

In order to more easily manage large sets of Vulnerable items, what should you create?

A.

Vulnerability Groups

B.

Calculator Group

C.

Filter Group

D.

Vulnerable item Conditions

Full Access
Question # 10

To facilitate the remediation of a Vulnerable Item what type of Item is most commonly used?

A.

Create a Problem

B.

Create a Security Incident

C.

Create a KB article

D.

Create a Change

Full Access
Question # 11

Which one of the following record types can be considered the intersection of Vulnerability source information and CMDB CI records?

A.

Vulnerability

B.

Vulnerability Task

C.

CMDB_CI_Vuln

D.

Vulnerable Item (VI)

Full Access
Question # 12

Best Practices dictate that when creating a Change task from a Vulnerable Item which of the following fields should be used for assigning the Assigned To field on the Change task?

A.

Assigned To on Vulnerable item

B.

Managed By on CMDB_CI

C.

Assigned To on CMDB_CI Record

D.

Best Practice does not dictate a specific field

Full Access
Question # 13

Qualys asset tags can be loaded into a table related to the configuration item and used to support business processes or reporting. Set the Qualys Host parameter of asset_tags to a value of___to have asset tag information from Qualys be included in the XML payload.

A.

1

B.

3

C.

2

D.

0

Full Access
Question # 14

This functionality provides a simple way to build criteria once, which can be reused in other platform areas.

A.

Conditions

B.

Favorites

C.

Filte Group

D.

Filters

Full Access
Question # 15

Which Vulnerability maturity level provides advanced owner assignment?

A.

Enterprise risk trending

B.

Automated prioritization

C.

Manual operations

D.

Improved remediation

Full Access
Question # 16

sn_vul.itsm_popup is the properly that is set to True or False based on the customer desire for a popup when creating a Problem or Change record from a Vulnerability or VI record.

A.

True

B.

False

Full Access
Question # 17

To get useful reporting regarding the most vulnerable CI's, which statement applies?

A.

You must purchase a separate PA module.

B.

Your CI population must be huge.

C.

You must have good KPi's defined.

D.

Your CMDB must be up to date and useful.

Full Access
Question # 18

When an approval is rejected for a Vulnerable Item exception, what happens to the State field for that record?

A.

It reverts to 'Analysis'

B.

It is set to 'New'

C.

It is set to 'In Review'

D.

It will be set back to its previous value

Full Access