What Business Rule creates a Configuration Item from a Vulnerable Item record?

What Business Rule creates a Configuration Item from a Vulnerable Item record?A . Create CI from Vulnerable Group DetailsB . Create CI from Closed Item DetailsC . Determine CI from Network DetailsD . Create CI from Vulnerable Item DetailsView AnswerAnswer: D

June 10, 2020 No Comments READ MORE +

Which field is used to determine the expected timeframe for remediating a VIT?

SLAs are used to ensure VUL are processed in a timely matter. Which field is used to determine the expected timeframe for remediating a VIT?A . UpdatedB . Remediation statusC . Remediation targetD . ClosedView AnswerAnswer: C Explanation: Reference: https://docs.servicenow.com/bundle/orlando-security-management/page/product/vulnerability­response/concept/time-to-remediate-rules.html

June 7, 2020 No Comments READ MORE +

Vulnerability Response can be best categorized as a ____________, focused on identifying and remediating vulnerabilities as early as possible.

Vulnerability Response can be best categorized as a ____________, focused on identifying and remediating vulnerabilities as early as possible.A . A proactive processB . An iterative processC . A tentative processD . A reactive processView AnswerAnswer: A

June 7, 2020 No Comments READ MORE +

Which module is used to adjust the frequency in which CVEs are updated?

Which module is used to adjust the frequency in which CVEs are updated?A . NVD Auto-updateB . UpdateC . CVE Auto-updateD . On-demand updateView AnswerAnswer: B Explanation: Reference: https://docs.servicenow.com/bundle/orlando-security-management/page/product/vulnerability­response/concept/c_NVDAndCWEDataImport.html

June 7, 2020 No Comments READ MORE +

What is the ID associated with the Vulnerability Response plugin?

What is the ID associated with the Vulnerability Response plugin?A . com.snc.threat.intelligenceB . com.snc.vulnerabilityC . com.snc.threat.feedsD . com.snc.security_incidentView AnswerAnswer: B

June 6, 2020 No Comments READ MORE +

What is the minimum role required to create and change Service Level Agreements for Vulnerability Response groups?

What is the minimum role required to create and change Service Level Agreements for Vulnerability Response groups? A. sla_manager B. admin C. sn_vul.vulnerability_write D. sn_vul.adminView AnswerAnswer: D Explanation: Reference: https://docs.servicenow.com/bundle/orlando-security-management/page/product/vulnerability-response/task/t_CreateVulnSLA.html

June 6, 2020 No Comments READ MORE +

In regard to the Security Operations Process, which of the following statements defines the “Identify” phase?

In regard to the Security Operations Process, which of the following statements defines the “Identify” phase?A . What processes and assets need protection?B . What techniques can identify incidents?C . What safeguards are available?D . What techniques can restore capabilities?E . What techniques can contain impacts of incidents?View AnswerAnswer: C

June 6, 2020 No Comments READ MORE +

What is the purpose of Scoped Applications?

What is the purpose of Scoped Applications?A . Suppliers can only charge for applications when they are scopedB . Scoped applications are scalable, Global applications are notC . Scoping encapsulates and protects data and functionalityD . An application needs to be scoped in order to be deployed as a pluginView...

June 5, 2020 No Comments READ MORE +

A list of software weaknesses is known as:

A list of software weaknesses is known as:A . National Vulnerability Database (NVD)B . Common Vulnerability and Exposure (CVE)C . National Institute of Science and Technology (NIST)D . Common Weaknesses Enumeration (CWE)View AnswerAnswer: D Explanation: Reference: https://docs.servicenow.com/bundle/orlando-security-management/page/product/vulnerability­response/concept/c_VulnerabilityResponse.html

June 5, 2020 No Comments READ MORE +

The components installed with Vulnerability Response include:

The components installed with Vulnerability Response include:A . Tables, Scheduled Jobs, Security Operations CommonB . Business Rules, Roles, WorkflowsC . Properties, Client Scripts, WizardsD . UI Pages, Business Rules, Vulnerability ScannersView AnswerAnswer: A Explanation: Reference: https://docs.servicenow.com/bundle/orlando-security-management/page/product/vulnerability­response/reference/installed-with-vr.html

June 4, 2020 No Comments READ MORE +