Black Friday Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

Which of the following is the property that controls whether Vulnerability Groups are created by default based on Vulnerabilities in the system?

A.

sn_vul.autocreate_vul_centric_group

B.

sn_vul.autocreate_groups

C.

sn_vul.autocreate_vul_grouping

D.

sn_vul.create_default_vul_groups

Full Access
Question # 5

What must Vulnerability Exceptions be supplied by default?

A.

A reason for the exception

B.

Integrations with GRC to handle the exception

C.

Requirement Actions for the exception

D.

A manual approval authority for the exception

Full Access
Question # 6

Which one of the following record types can be considered the intersection of Vulnerability source information and CMDB CI records?

A.

Vulnerability

B.

Vulnerability Task

C.

CMDB_CI_Vuln

D.

Vulnerable Item (VI)

Full Access
Question # 7

ServiceNow Vulnerability Response tables typically start with which prefix?

A.

snvr_

B.

snvuln_

C.

vul_

D.

sn_vul_

Full Access
Question # 8

The Vulnerability Admin role (sn_vul.admin) can modify Vulnerability Application Properties and can be delegated to the following role(s):

A.

ServiceNow Security Operations Admin (sn_sec.admin)

B.

Security Admin (security.admin)

C.

Vulnerability Response Admin (sn_vul_resp.admin)

D.

All of the above

E.

None of the above

Full Access
Question # 9

Select the three components of a Fitter Condition: Choose 3 answers

A.

Field

B.

Sum

C.

Operator

D.

Value

Full Access
Question # 10

Which module is used to adjust the frequency in which CVEs are updated?

A.

NVD Auto-update

B.

Update

C.

CVE Auto-update

D.

On-demand update

Full Access
Question # 11

A common Integration point with Vulnerability is:

A.

Workflow Mappings

B.

Risk Indicators within GRC

C.

Service Catalog

D.

Knowledge Base

Full Access
Question # 12

Where can you find Information related to the Common Vulnerabilities and Exposures (CVE)?

A.

Tenable

B.

MITRE

C.

NIST

D.

Qualys

Full Access
Question # 13

If fixing a Vulnerable Item outweighs the benefits, the correct course of action is:

A.

Mark the CI inactive in the CMDB and notify the CI owner

B.

Record the accepted risk and Close/Defer the Vulnerable Item

C.

Deprioritize the Vulnerable item Records (VlT) to push them further down the list so it can be ignored

D.

Add the Cl to the Vulnerability Scanners exclusions Related List

Full Access
Question # 14

What type of data would the CIO/CISO want on the dashboard?

A.

Aggregations for priority and workload

B.

Drill-down to granularity

C.

Single, clear indicators of organizational health

D.

Up to the minute views

Full Access
Question # 15

The components Installed with Vulnerability Response Include:

A.

Tables, Scheduled Jobs, Security Operations Common

B.

Business Rules, Roles, Workflows

C.

Properties, Client Scripts, Wizards

D.

Ul Pages. Business Rules, Vulnerability Scanners

Full Access
Question # 16

sn_vul.itsm_popup is the properly that is set to True or False based on the customer desire for a popup when creating a Problem or Change record from a Vulnerability or VI record.

A.

True

B.

False

Full Access
Question # 17

After closing the Vulnerable Item (VI), it is recommended to:

A.

Update the values in the Vulnerability Score Indicator (VSl) based on the criticality of the Vulnerability.

B.

The VI remains active and in place until the Scanner rescans and closes the VI.

C.

Mark the CI as exempt from the Vulnerability if the vulnerability was remediated.

D.

Compare the Vulnerability with subsequent scans.

Full Access
Question # 18

What is the ServiceNow application used for process automation?

A.

Knowledge Base

B.

Workflows

C.

SLAs

D.

Service Catalog

Full Access