Vulnerability Response can be best categorized as a ____________, focused on identifying and remediating vulnerabilities as early as possible.
A. A proactive process
B. An iterative process
C. A tentative process
D. A reactive process
What is the purpose of Scoped Applications?
A. Suppliers can only charge for applications when they are scoped
B. Scoped applications are scalable, Global applications are not
C. Scoping encapsulates and protects data and functionality
D. An application needs to be scoped in order to be deployed as a plugin
In ServiceNow, which plugin needs to be added to enable Vulnerability Integration with Qualys, Tenable, or Rapid7?
A. Vulnerability Response
B. Trusted Security Circles
C. Threat Intelligence
D. Security Incident Response
Ignoring a Vulnerable Item:
A. Permanently removes the item from the list of Active Vulnerable Items
B. Move the item to the Slushbucket
C. Has no impact on the list of Active Vulnerable Items
D. Temporarily removes the item from the list of Active Vulnerable Items
When an approval is rejected for a Vulnerable Item exception, what happens to the State field for that record?
A. It reverts to `Analysis'
B. It is set to `New'
C. It is set to `In Review'
D. It will be set back to its previous value
Which of the following best describes a Vulnerability Group?
A. Groups VIs using a Filter against Vulnerable Item Fields
B. A Filter defining a sub-set of CIs to be treated as a group
C. The User Group assigned to resolving the Vulnerable Item
D. Must have a corresponding filter group
What system property allows for the auto creation of Vulnerability Groups based on the Vulnerable Item's Vulnerability?
A. sn_vul.autocreate_vul_filter_group
B. sn_vul.autocreate_vul_approval_group
C. sn_vul.autocreate_vul_group_item
D. sn_vul.autocreate_vul_centric_group
Which of the following best describes the Vulnerable Item State Approval Workflow?
A. It is read-only, you can only change the Assignment Group members for the approval
B. It exists in the Security Operations Common scope so it can be modified by any Security Operations Admin
C. It can only be modified by System Administrators
D. It runs against the [sn_vul_change_approval] table
To ensure that Vulnerabilities are processed correctly, you can define a Service Level Agreement (SLA) for Vulnerability Response. To achieve this, you would:
A. Create a custom workflow to monitor the time between States
B. Log in as a system admin, and using the globally scoped baseline SLA Modules
C. Have the role of Vulnerability admin, but only in the Vulnerability Scope
D. Make sure you have at least the sn_vul.vulnerability_write role and using the baseline SLA Application Modules
What type of data would the CIO/CISO want on the dashboard?
A. Aggregations for priority and workload
B. Drill-down to granularity
C. Single, clear indicators of organizational health
D. Up to the minute views