Download Certified Implementation Specialist - Vulnerability Response.CIS-VR.ExamLabs.2020-03-25.36q.vcex

Vendor: ServiceNow
Exam Code: CIS-VR
Exam Name: Certified Implementation Specialist - Vulnerability Response
Date: Mar 25, 2020
File Size: 384 KB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Purchase
Coupon: EXAM_HUB

Discount: 20%

Demo Questions

Question 1
Select the three components of a Filter Condition: (Choose three.)
  1. Field
  2. Sum
  3. Operator
  4. Value
Correct answer: ACD
Explanation:
Reference: https://docs.servicenow.com/bundle/orlando-platform-user-interface/page/use/common-ui-elements/concept/c_ConditionBuilder.html
Reference: https://docs.servicenow.com/bundle/orlando-platform-user-interface/page/use/common-ui-elements/concept/c_ConditionBuilder.html
Question 2
SLAs are used to ensure VUL are processed in a timely matter. Which field is used to determine the expected timeframe for remediating a VIT?
  1. Updated
  2. Remediation status
  3. Remediation target
  4. Closed
Correct answer: C
Explanation:
Reference: https://docs.servicenow.com/bundle/orlando-security-management/page/product/vulnerability-response/concept/time-to-remediate-rules.html
Reference: https://docs.servicenow.com/bundle/orlando-security-management/page/product/vulnerability-response/concept/time-to-remediate-rules.html
Question 3
Changes made within a named Update Set in a different application scope:
  1. Will be captured
  2. Will throw errors
  3. Will not be captured
  4. Will be partially captured
Correct answer: A
Question 4
ServiceNow Vulnerability Response tables typically start with which prefix?
  1. snvr_
  2. snvuln_
  3. vul_
  4. sn_vul_
Correct answer: D
Explanation:
Reference: https://docs.servicenow.com/bundle/jakarta-security-management/page/product/vulnerability-response/reference/r_TblVnlnlMgmt.html
Reference: https://docs.servicenow.com/bundle/jakarta-security-management/page/product/vulnerability-response/reference/r_TblVnlnlMgmt.html
Question 5
In regard to the Security Operations Process, which of the following statements defines the “Identify” phase?
  1. What processes and assets need protection?
  2. What techniques can identify incidents?
  3. What safeguards are available?
  4. What techniques can restore capabilities?
  5. What techniques can contain impacts of incidents?
Correct answer: C
Question 6
Which module is used to adjust the frequency in which CVEs are updated?
  1. NVD Auto-update
  2. Update
  3. CVE Auto-update
  4. On-demand update
Correct answer: B
Explanation:
Reference: https://docs.servicenow.com/bundle/orlando-security-management/page/product/vulnerability-response/concept/c_NVDAndCWEDataImport.html
Reference: https://docs.servicenow.com/bundle/orlando-security-management/page/product/vulnerability-response/concept/c_NVDAndCWEDataImport.html
Question 7
A list of software weaknesses is known as:
  1. National Vulnerability Database (NVD)
  2. Common Vulnerability and Exposure (CVE)
  3. National Institute of Science and Technology (NIST)
  4. Common Weaknesses Enumeration (CWE)
Correct answer: D
Explanation:
Reference: https://docs.servicenow.com/bundle/orlando-security-management/page/product/vulnerability-response/concept/c_VulnerabilityResponse.html
Reference: https://docs.servicenow.com/bundle/orlando-security-management/page/product/vulnerability-response/concept/c_VulnerabilityResponse.html
Question 8
What Business Rule creates a Configuration Item from a Vulnerable Item record?
  1. Create CI from Vulnerable Group Details
  2. Create CI from Closed Item Details
  3. Determine CI from Network Details
  4. Create CI from Vulnerable Item Details
Correct answer: D
Question 9
What is the purpose of Scoped Applications?
  1. Suppliers can only charge for applications when they are scoped
  2. Scoped applications are scalable, Global applications are not
  3. Scoping encapsulates and protects data and functionality
  4. An application needs to be scoped in order to be deployed as a plugin
Correct answer: C
Explanation:
Reference: https://docs.servicenow.com/bundle/orlando-application-development/page/build/applications/concept/c_ApplicationScope.html
Reference: https://docs.servicenow.com/bundle/orlando-application-development/page/build/applications/concept/c_ApplicationScope.html
Question 10
What is the ID associated with the Vulnerability Response plugin?
  1. com.snc.threat.intelligence
  2. com.snc.vulnerability
  3. com.snc.threat.feeds
  4. com.snc.security_incident
Correct answer: B
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!