Labour Day Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > ServiceNow > Vulnerability Response Implementation > CIS-VR

CIS-VR Certified Implementation Specialist - Vulnerability Response Question and Answers

Question # 4

If a customer expects to ingest 2 million vulnerabilities during it's initial load, which instance size should you recommend?

A.

L

B.

XL

C.

XXL

D.

Ultra

Full Access
Question # 5

in regard to the Security Operations Process, which of the following statements defines the "identify" phase?

A.

What processes and assets need protection?

B.

What techniques can identify incidents?

C.

What safeguards are available?

D.

What techniques can restore capabilities?

E.

What techniques can contain impacts of incidents?

Full Access
Question # 6

What system property allows for the auto creation of Vulnerability Groups based on the Vulnerable Item's Vulnerability?

A.

sn_vul.autocreate_vul_filter_group

B.

sn_vul.autocreate_vul_approval_group

C.

sn_vul.autocreate_vul_group_item

D.

sn_vul.autocreate_vul_centric_group

Full Access
Question # 7

A list of software weaknesses is known as:

A.

National Vulnerability Database (NVD)

B.

Common Vulnerability and Exposure (CVE)

C.

National Institute of Science and Technology (NIST)

D.

Common Weaknesses Enumeration (CWE)

Full Access
Question # 8

SLAs are used to ensure VUL are processed in a timely matter. Which field is used to determine the expected timeframe for remediating a VlT?

A.

Updated

B.

Remediation status

C.

Remediation target

D.

Closed

Full Access
Question # 9

Where in the platform can you create Filter Groups?

A.

Vulnerability > Administration > Filter Groups

B.

Vulnerability > Groups > Filter Groups

C.

Security Operations > Administration > Filter Groups

D.

Security Operations > Groups > Filter Groups

Full Access