Reports can be created from which different places in the platform?
Reports can be created from which different places in the platform? (Choose two.) A. List column heading B. Metrics module C. Statistics module D. View / Run module
The display sequence is controlled in a Service Catalog Item using which of the following?
The display sequence is controlled in a Service Catalog Item using which of the following? A. The Default Value field in the Catalog Item form B. The Sequence field in the Catalog Item form C. The Order field in the Variable form D. The Choice field in the Variable form
As it relates to ServiceNow reporting, which of the following statements describes what a metric can do?
As it relates to ServiceNow reporting, which of the following statements describes what a metric can do? A. A metric is a report gauge used on homepages to display real-time data B. A metric is a time measurement used to report the effectiveness of workflows and SLAs C. A metric is used to measure and […]
Which one of the following statements applies to a set of fields when they are coalesced during an import?
Which one of the following statements applies to a set of fields when they are coalesced during an import? A. If a match is found using the coalesce fields, the existing record is updated with the information being imported B. If a match is not found using the coalesce fields, the system does not create […]
A Service Catalog may include which of the following components?
A Service Catalog may include which of the following components? A. Order Guides, Exchange Rates, Calendars B. Order Guides, Catalog Items, and Interceptors C. Catalog Items, Asset Contracts, Task Surveys D. Record Producers, Order Guides, and Catalog Items
The components installed with Vulnerability Response include
The components installed with Vulnerability Response include: A. Tables, Scheduled Jobs, Security Operations Common B. Business Rules, Roles, Workflows C. Properties, Client Scripts, Wizards D. UI Pages, Business Rules, Vulnerability Scanners Reference: https://docs.servicenow.com/bundle/orlando-security-management/page/product/vulnerability-response/reference/installed-with-vr.html
What Business Rule creates a Configuration Item from a Vulnerable Item record?
What Business Rule creates a Configuration Item from a Vulnerable Item record? A. Create CI from Vulnerable Group Details B. Create CI from Closed Item Details C. Determine CI from Network Details D. Create CI from Vulnerable Item Details
If a customer expects to ingest 2 million vulnerabilities during its initial load, which instance size should
If a customer expects to ingest 2 million vulnerabilities during its initial load, which instance size should you recommend? A. L B. XL C. XXL D. Ultra
Vulnerability Response can be best categorized as a ____________, focused on identifying and remediating vulne
Vulnerability Response can be best categorized as a ____________, focused on identifying and remediating vulnerabilities as early as possible. A. A proactive process B. An iterative process C. A tentative process D. A reactive process
A list of software weaknesses is known as
A list of software weaknesses is known as: A. National Vulnerability Database (NVD) B. Common Vulnerability and Exposure (CVE) C. National Institute of Science and Technology (NIST) D. Common Weaknesses Enumeration (CWE) Reference: https://docs.servicenow.com/bundle/orlando-security-management/page/product/vulnerability-response/concept/c_VulnerabilityResponse.html