Which field is used to determine the expected timeframe for remediating a VIT?

SLAs are used to ensure VUL are processed in a timely matter. Which field is used to determine the expected timeframe for remediating a VIT?A . UpdatedB . Remediation statusC . Remediation targetD . Closed View Answer Answer: C Explanation: Reference: https://docs.servicenow.com/bundle/orlando-security-management/page/product/vulnerability­response/concept/time-to-remediate-rules.html...

Continue reading

What is the minimum role required to create and change Service Level Agreements for Vulnerability Response groups?

What is the minimum role required to create and change Service Level Agreements for Vulnerability Response groups? A. sla_manager B. admin C. sn_vul.vulnerability_write D. sn_vul.admin View Answer Answer: D Explanation: Reference: https://docs.servicenow.com/bundle/orlando-security-management/page/product/vulnerability-response/task/t_CreateVulnSLA.html...

Continue reading

In regard to the Security Operations Process, which of the following statements defines the “Identify” phase?

In regard to the Security Operations Process, which of the following statements defines the “Identify” phase?A . What processes and assets need protection?B . What techniques can identify incidents?C . What safeguards are available?D . What techniques can restore capabilities?E . What techniques can contain impacts of incidents? View Answer Answer: C...

Continue reading

A list of software weaknesses is known as:

A list of software weaknesses is known as:A . National Vulnerability Database (NVD)B . Common Vulnerability and Exposure (CVE)C . National Institute of Science and Technology (NIST)D . Common Weaknesses Enumeration (CWE) View Answer Answer: D Explanation: Reference: https://docs.servicenow.com/bundle/orlando-security-management/page/product/vulnerability­response/concept/c_VulnerabilityResponse.html...

Continue reading

The components installed with Vulnerability Response include:

The components installed with Vulnerability Response include:A . Tables, Scheduled Jobs, Security Operations CommonB . Business Rules, Roles, WorkflowsC . Properties, Client Scripts, WizardsD . UI Pages, Business Rules, Vulnerability Scanners View Answer Answer: A Explanation: Reference: https://docs.servicenow.com/bundle/orlando-security-management/page/product/vulnerability­response/reference/installed-with-vr.html...

Continue reading