New Year Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtick70

CIS-VR Certified Implementation Specialist - Vulnerability Response Questions and Answers

Questions 4

If a customer expects to ingest 2 million vulnerabilities during it's initial load, which instance size should you recommend?

Options:

A.

L

B.

XL

C.

XXL

D.

Ultra

Buy Now
Questions 5

Some customers may have a clearly-defined, well-documented vulnerability exception process and some may even provide a diagram illustrating that process What is the main advantage of having this documentation

when translating it into a Flow or Workflow?

Options:

A.

Perfect opportunity for process improvement

B.

Understand their internal process

C.

Build the Flow/WorKflow directly into the platform

D.

No advantage

Buy Now
Questions 6

This functionality provides a simple way to build criteria once, which can be reused in other platform areas.

Options:

A.

Conditions

B.

Favorites

C.

Filte Group

D.

Filters

Buy Now
Questions 7

What option can be used to close out a Vulnerable item Record or initiate the Exception Process?

Options:

A.

Complete

B.

Update

C.

Close/Defer

D.

Save

Buy Now
Questions 8

Which of the following best describes the Vulnerable item State Approval Workflow?

Options:

A.

It is read-only, you can only change the Assignment Group members for the approval

B.

It exists in the Security Operations Common scope so it can be modified by any Security Operations Admin

C.

It can only be modified by System Adminstrators

D.

It runs against the [sn_vul_change_approval] table

Buy Now
Questions 9

Vulnerability Response can be best categorized as a_______, focused on identifying and remediating vulnerabilities as early as possible.

Options:

A.

A proactive process

B.

An iterative process

C.

A tentative process

D.

A reactive process

Buy Now
Questions 10

In order for Vulnerability admins to configure integrations, they must have the following Role(s):

Options:

A.

admin only

B.

sn_vul.admin only

C.

sn_vul.vulnerability_write

D.

admin and sn_vul_qualys.admin

Buy Now
Questions 11

Which module is used to adjust the frequency in which CVEs are updated?

Options:

A.

NVD Auto-update

B.

Update

C.

CVE Auto-update

D.

On-demand update

Buy Now
Questions 12

Filter groups can be used In Vulnerability Response to group what type of vulnerability records?

Options:

A.

Vulnerability groups

B.

Third Party Entries

C.

Vulnerable Items

D.

Vulnerable Software

Buy Now
Questions 13

in regard to the Security Operations Process, which of the following statements defines the "identify" phase?

Options:

A.

What processes and assets need protection?

B.

What techniques can identify incidents?

C.

What safeguards are available?

D.

What techniques can restore capabilities?

E.

What techniques can contain impacts of incidents?

Buy Now
Questions 14

Qualys asset tags can be loaded into a table related to the configuration item and used to support business processes or reporting. Set the Qualys Host parameter of asset_tags to a value of___to have asset tag information from Qualys be included in the XML payload.

Options:

A.

1

B.

3

C.

2

D.

0

Buy Now
Questions 15

What system property allows for the auto creation of Vulnerability Groups based on the Vulnerable Item's Vulnerability?

Options:

A.

sn_vul.autocreate_vul_filter_group

B.

sn_vul.autocreate_vul_approval_group

C.

sn_vul.autocreate_vul_group_item

D.

sn_vul.autocreate_vul_centric_group

Buy Now
Questions 16

What Business Rule creates a Configuration Item from a Vulnerable Item record?

Options:

A.

Create CI from Vulnerable Group Details

B.

Create CI from Closed Item Details

C.

Determine CI from Network Details

D.

Create CI from Vulnerable item Details

Buy Now
Questions 17

ServiceNow Vulnerability Response tables typically start with which prefix?

Options:

A.

snvr_

B.

snvuln_

C.

vul_

D.

sn_vul_

Buy Now
Questions 18

Approvals within the Vulnerability Application are created based on:

Options:

A.

The sys_approval and the and the sn_vul_vulnerable_item tables

B.

The sn_vul_vulnerable_item and sn_vul_vulnerability tables

C.

The sn_vul_change_approval table

D.

Ths sys_approval table

Buy Now
Exam Code: CIS-VR
Exam Name: Certified Implementation Specialist - Vulnerability Response
Last Update: Dec 25, 2024
Questions: 60
CIS-VR pdf

CIS-VR PDF

$25.5  $84.99
CIS-VR Engine

CIS-VR Testing Engine

$30  $99.99
CIS-VR PDF + Engine

CIS-VR PDF + Testing Engine

$40.5  $134.99