Download ServiceNow.CIS-VR.VCEplus.2020-03-24.60q.vcex

Download Exam

File Info

Exam Certified Implementation Specialist - Vulnerability Response
Number CIS-VR
File Name ServiceNow.CIS-VR.VCEplus.2020-03-24.60q.vcex
Size 372 KB
Posted Mar 24, 2020
Download ServiceNow.CIS-VR.VCEplus.2020-03-24.60q.vcex


How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase

Coupon: MASTEREXAM
With discount: 20%






Demo Questions

Question 1

Select the three components of a Filter Condition: (Choose three.)


  1. Field
  2. Sum
  3. Operator
  4. Value
Correct answer: ACD
Explanation:
Reference: https://docs.servicenow.com/bundle/orlando-platform-user-interface/page/use/common-ui-elements/concept/c_ConditionBuilder.html
Reference: https://docs.servicenow.com/bundle/orlando-platform-user-interface/page/use/common-ui-elements/concept/c_ConditionBuilder.html



Question 2

SLAs are used to ensure VUL are processed in a timely matter. Which field is used to determine the expected timeframe for remediating a VIT?


  1. Updated
  2. Remediation status
  3. Remediation target
  4. Closed
Correct answer: C
Explanation:
Reference: https://docs.servicenow.com/bundle/orlando-security-management/page/product/vulnerability-response/concept/time-to-remediate-rules.html
Reference: https://docs.servicenow.com/bundle/orlando-security-management/page/product/vulnerability-response/concept/time-to-remediate-rules.html



Question 3

What is the minimum role required to create and change Service Level Agreements for Vulnerability Response groups?


  1. sla_manager
  2. admin
  3. sn_vul.vulnerability_write
  4. sn_vul.admin
Correct answer: D
Explanation:
Reference: https://docs.servicenow.com/bundle/orlando-security-management/page/product/vulnerability-response/task/t_CreateVulnSLA.html
Reference: https://docs.servicenow.com/bundle/orlando-security-management/page/product/vulnerability-response/task/t_CreateVulnSLA.html



Question 4

Changes made within a named Update Set in a different application scope:


  1. Will be captured
  2. Will throw errors
  3. Will not be captured
  4. Will be partially captured 
Correct answer: A



Question 5

ServiceNow Vulnerability Response tables typically start with which prefix?


  1. snvr_
  2. snvuln_
  3. vul_
  4. sn_vul_
Correct answer: D
Explanation:
Reference: https://docs.servicenow.com/bundle/jakarta-security-management/page/product/vulnerability-response/reference/r_TblVnlnlMgmt.html
Reference: https://docs.servicenow.com/bundle/jakarta-security-management/page/product/vulnerability-response/reference/r_TblVnlnlMgmt.html



Question 6

In regard to the Security Operations Process, which of the following statements defines the "Identify" phase?


  1. What processes and assets need protection?
  2. What techniques can identify incidents?
  3. What safeguards are available?
  4. What techniques can restore capabilities?
  5. What techniques can contain impacts of incidents?
Correct answer: C



Question 7

Which module is used to adjust the frequency in which CVEs are updated?


  1. NVD Auto-update 
  2. Update
  3. CVE Auto-update
  4. On-demand update
Correct answer: B
Explanation:
Reference: https://docs.servicenow.com/bundle/orlando-security-management/page/product/vulnerability-response/concept/c_NVDAndCWEDataImport.html
Reference: https://docs.servicenow.com/bundle/orlando-security-management/page/product/vulnerability-response/concept/c_NVDAndCWEDataImport.html



Question 8

A list of software weaknesses is known as:


  1. National Vulnerability Database (NVD)
  2. Common Vulnerability and Exposure (CVE)
  3. National Institute of Science and Technology (NIST) 
  4. Common Weaknesses Enumeration (CWE)
Correct answer: D
Explanation:
Reference: https://docs.servicenow.com/bundle/orlando-security-management/page/product/vulnerability-response/concept/c_VulnerabilityResponse.html
Reference: https://docs.servicenow.com/bundle/orlando-security-management/page/product/vulnerability-response/concept/c_VulnerabilityResponse.html



Question 9

Vulnerability Response can be best categorized as a ____________, focused on identifying and remediating vulnerabilities as early as possible.


  1. A proactive process
  2. An iterative process
  3. A tentative process
  4. A reactive process
Correct answer: A



Question 10

If a customer expects to ingest 2 million vulnerabilities during its initial load, which instance size should you recommend?


  1. L
  2. XL
  3. XXL
  4. Ultra
Correct answer: C









PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount!



HOW TO OPEN VCEX FILES

Use ProfExam Simulator to open VCEX files