Download ServiceNow.CIS-VR.ExamLabs.2020-03-25.36q.vcex

Download Exam

File Info

Exam Certified Implementation Specialist - Vulnerability Response
Number CIS-VR
File Name ServiceNow.CIS-VR.ExamLabs.2020-03-25.36q.vcex
Size 384 KB
Posted Mar 25, 2020
Download ServiceNow.CIS-VR.ExamLabs.2020-03-25.36q.vcex


How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase

Coupon: MASTEREXAM
With discount: 20%






Demo Questions

Question 1

Select the three components of a Filter Condition: (Choose three.)


  1. Field
  2. Sum
  3. Operator
  4. Value
Correct answer: ACD
Explanation:
Reference: https://docs.servicenow.com/bundle/orlando-platform-user-interface/page/use/common-ui-elements/concept/c_ConditionBuilder.html
Reference: https://docs.servicenow.com/bundle/orlando-platform-user-interface/page/use/common-ui-elements/concept/c_ConditionBuilder.html



Question 2

SLAs are used to ensure VUL are processed in a timely matter. Which field is used to determine the expected timeframe for remediating a VIT?


  1. Updated
  2. Remediation status
  3. Remediation target
  4. Closed
Correct answer: C
Explanation:
Reference: https://docs.servicenow.com/bundle/orlando-security-management/page/product/vulnerability-response/concept/time-to-remediate-rules.html
Reference: https://docs.servicenow.com/bundle/orlando-security-management/page/product/vulnerability-response/concept/time-to-remediate-rules.html



Question 3

Changes made within a named Update Set in a different application scope:


  1. Will be captured
  2. Will throw errors
  3. Will not be captured
  4. Will be partially captured
Correct answer: A



Question 4

ServiceNow Vulnerability Response tables typically start with which prefix?


  1. snvr_
  2. snvuln_
  3. vul_
  4. sn_vul_
Correct answer: D
Explanation:
Reference: https://docs.servicenow.com/bundle/jakarta-security-management/page/product/vulnerability-response/reference/r_TblVnlnlMgmt.html
Reference: https://docs.servicenow.com/bundle/jakarta-security-management/page/product/vulnerability-response/reference/r_TblVnlnlMgmt.html



Question 5

In regard to the Security Operations Process, which of the following statements defines the “Identify” phase?


  1. What processes and assets need protection?
  2. What techniques can identify incidents?
  3. What safeguards are available?
  4. What techniques can restore capabilities?
  5. What techniques can contain impacts of incidents?
Correct answer: C



Question 6

Which module is used to adjust the frequency in which CVEs are updated?


  1. NVD Auto-update
  2. Update
  3. CVE Auto-update
  4. On-demand update
Correct answer: B
Explanation:
Reference: https://docs.servicenow.com/bundle/orlando-security-management/page/product/vulnerability-response/concept/c_NVDAndCWEDataImport.html
Reference: https://docs.servicenow.com/bundle/orlando-security-management/page/product/vulnerability-response/concept/c_NVDAndCWEDataImport.html



Question 7

A list of software weaknesses is known as:


  1. National Vulnerability Database (NVD)
  2. Common Vulnerability and Exposure (CVE)
  3. National Institute of Science and Technology (NIST)
  4. Common Weaknesses Enumeration (CWE)
Correct answer: D
Explanation:
Reference: https://docs.servicenow.com/bundle/orlando-security-management/page/product/vulnerability-response/concept/c_VulnerabilityResponse.html
Reference: https://docs.servicenow.com/bundle/orlando-security-management/page/product/vulnerability-response/concept/c_VulnerabilityResponse.html



Question 8

What Business Rule creates a Configuration Item from a Vulnerable Item record?


  1. Create CI from Vulnerable Group Details
  2. Create CI from Closed Item Details
  3. Determine CI from Network Details
  4. Create CI from Vulnerable Item Details
Correct answer: D



Question 9

What is the purpose of Scoped Applications?


  1. Suppliers can only charge for applications when they are scoped
  2. Scoped applications are scalable, Global applications are not
  3. Scoping encapsulates and protects data and functionality
  4. An application needs to be scoped in order to be deployed as a plugin
Correct answer: C
Explanation:
Reference: https://docs.servicenow.com/bundle/orlando-application-development/page/build/applications/concept/c_ApplicationScope.html
Reference: https://docs.servicenow.com/bundle/orlando-application-development/page/build/applications/concept/c_ApplicationScope.html



Question 10

What is the ID associated with the Vulnerability Response plugin?


  1. com.snc.threat.intelligence
  2. com.snc.vulnerability
  3. com.snc.threat.feeds
  4. com.snc.security_incident
Correct answer: B









PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount!



HOW TO OPEN VCEX FILES

Use ProfExam Simulator to open VCEX files