The components installed with Vulnerability Response include
The components installed with Vulnerability Response include: A. Tables, Scheduled Jobs, Security Operations Common B. Business Rules, Roles, Workflows C. Properties, Client Scripts, Wizards D. UI Pages, Business Rules, Vulnerability Scanners Reference: https://docs.servicenow.com/bundle/orlando-security-management/page/product/vulnerability-response/reference/installed-with-vr.html
What Business Rule creates a Configuration Item from a Vulnerable Item record?
What Business Rule creates a Configuration Item from a Vulnerable Item record? A. Create CI from Vulnerable Group Details B. Create CI from Closed Item Details C. Determine CI from Network Details D. Create CI from Vulnerable Item Details
If a customer expects to ingest 2 million vulnerabilities during its initial load, which instance size should
If a customer expects to ingest 2 million vulnerabilities during its initial load, which instance size should you recommend? A. L B. XL C. XXL D. Ultra
Vulnerability Response can be best categorized as a ____________, focused on identifying and remediating vulne
Vulnerability Response can be best categorized as a ____________, focused on identifying and remediating vulnerabilities as early as possible. A. A proactive process B. An iterative process C. A tentative process D. A reactive process
A list of software weaknesses is known as
A list of software weaknesses is known as: A. National Vulnerability Database (NVD) B. Common Vulnerability and Exposure (CVE) C. National Institute of Science and Technology (NIST) D. Common Weaknesses Enumeration (CWE) Reference: https://docs.servicenow.com/bundle/orlando-security-management/page/product/vulnerability-response/concept/c_VulnerabilityResponse.html
Which module is used to adjust the frequency in which CVEs are updated?
Which module is used to adjust the frequency in which CVEs are updated? A. NVD Auto-update B. Update C. CVE Auto-update D. On-demand update Reference: https://docs.servicenow.com/bundle/orlando-security-management/page/product/vulnerability-response/concept/c_NVDAndCWEDataImport.html
In regard to the Security Operations Process, which of the following statements defines the “Identify” pha
In regard to the Security Operations Process, which of the following statements defines the “Identify” phase? A. What processes and assets need protection? B. What techniques can identify incidents? C. What safeguards are available? D. What techniques can restore capabilities? E. What techniques can contain impacts of incidents?
ServiceNow Vulnerability Response tables typically start with which prefix?
ServiceNow Vulnerability Response tables typically start with which prefix? A. snvr_ B. snvuln_ C. vul_ D. sn_vul_ Reference: https://docs.servicenow.com/bundle/jakarta-security-management/page/product/vulnerability-response/reference/r_TblVnlnlMgmt.html
Changes made within a named Update Set in a different application scope
Changes made within a named Update Set in a different application scope: A. Will be captured B. Will throw errors C. Will not be captured D. Will be partially captured
What is the minimum role required to create and change Service Level Agreements for Vulnerability Response gro
What is the minimum role required to create and change Service Level Agreements for Vulnerability Response groups? A. sla_manager B. admin C. sn_vul.vulnerability_write D. sn_vul.admin Reference: https://docs.servicenow.com/bundle/orlando-security-management/page/product/vulnerability-response/task/t_CreateVulnSLA.html