Winter Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpm65

Hot Vendors

CIS-VR Certified Implementation Specialist - Vulnerability Response Questions and Answers

Questions 4

In order to more easily manage large sets of Vulnerable items, what should you create?

Options:

A.

Vulnerability Groups

B.

Calculator Group

C.

Filter Group

D.

Vulnerable item Conditions

Buy Now
Questions 5

Which Vulnerability maturity level provides advanced owner assignment?

Options:

A.

Enterprise risk trending

B.

Automated prioritization

C.

Manual operations

D.

Improved remediation

Buy Now
Questions 6

What option can be used to close out a Vulnerable item Record or initiate the Exception Process?

Options:

A.

Complete

B.

Update

C.

Close/Defer

D.

Save

Buy Now
Questions 7

What do Vulnerability Exceptions require?

Options:

A.

An Approval by default

B.

An Exception Workflow

C.

A GRC integration

D.

A Filter Group

Buy Now
Questions 8

What type of data would the CIO/CISO want on the dashboard?

Options:

A.

Aggregations for priority and workload

B.

Drill-down to granularity

C.

Single, clear indicators of organizational health

D.

Up to the minute views

Buy Now
Questions 9

Managers should have access to which role-based data access and visualizations? Choose 3 answers

Options:

A.

Aggregations for priority and workload

B.

Time period views

C.

Up-to-the-minute views

D.

Drill-down to granularity

Buy Now
Questions 10

A common Integration point with Vulnerability is:

Options:

A.

Workflow Mappings

B.

Risk Indicators within GRC

C.

Service Catalog

D.

Knowledge Base

Buy Now
Questions 11

Best Practices dictate that when creating a Change task from a Vulnerable Item which of the following fields should be used for assigning the Assigned To field on the Change task?

Options:

A.

Assigned To on Vulnerable item

B.

Managed By on CMDB_CI

C.

Assigned To on CMDB_CI Record

D.

Best Practice does not dictate a specific field

Buy Now
Questions 12

The three levels of users you will likely encounter that will need access to data displayed in the Vulnerability Response dashboard are: Choose 3 answers

Options:

A.

Security Analysts

B.

Customers

C.

CIO/CISO

D.

Fulfillers

Buy Now
Questions 13

In ServiceNow, which plugin needs to be added to enable Vulnerability integration with Qualys, Tenable, or Rapid7?

Options:

A.

Vulnerability Response

B.

Trusted Security Circles

C.

Threat Intelligence

D.

Security Incident Response

Buy Now
Questions 14

What system property allows for the auto creation of Vulnerability Groups based on the Vulnerable Item's Vulnerability?

Options:

A.

sn_vul.autocreate_vul_filter_group

B.

sn_vul.autocreate_vul_approval_group

C.

sn_vul.autocreate_vul_group_item

D.

sn_vul.autocreate_vul_centric_group

Buy Now
Questions 15

Which one of the following record types can be considered the intersection of Vulnerability source information and CMDB CI records?

Options:

A.

Vulnerability

B.

Vulnerability Task

C.

CMDB_CI_Vuln

D.

Vulnerable Item (VI)

Buy Now
Questions 16

Where in the platform can you create Filter Groups?

Options:

A.

Vulnerability > Administration > Filter Groups

B.

Vulnerability > Groups > Filter Groups

C.

Security Operations > Administration > Filter Groups

D.

Security Operations > Groups > Filter Groups

Buy Now
Questions 17

Ignoring a Vulnerable item:

Options:

A.

Permanently removes the item from the list of Active Vulnerable items

B.

Move the item to the Slushbucket

C.

Has no impact on the list of Active Vulnerable Items

D.

Temporarily removes the item from the list of Active Vulnerable items

Buy Now
Questions 18

Some customers may have a clearly-defined, well-documented vulnerability exception process and some may even provide a diagram illustrating that process What is the main advantage of having this documentation

when translating it into a Flow or Workflow?

Options:

A.

Perfect opportunity for process improvement

B.

Understand their internal process

C.

Build the Flow/WorKflow directly into the platform

D.

No advantage

Buy Now
Exam Code: CIS-VR
Exam Name: Certified Implementation Specialist - Vulnerability Response
Last Update: Nov 17, 2024
Questions: 60

PDF + Testing Engine

$56  $159.99

Testing Engine

$42  $119.99
buy now CIS-VR testing engine

PDF (Q&A)

$35  $99.99
buy now CIS-VR pdf
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 21 Nov 2024