Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

CIS-VR ServiceNow Certified Implementation Specialist - Vulnerability Response Free Practice Exam Questions (2025 Updated)

Prepare effectively for your ServiceNow CIS-VR Certified Implementation Specialist - Vulnerability Response certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 1 / 1
Total 60 questions

Filter Groups provide a way to:

A.

Decouple the use of the grouping from the definition of the grouping

B.

Build criteria once

C.

Reuse criteria in a variety of places

D.

All of the above

What system property allows for the auto creation of Vulnerability Groups based on the Vulnerable Item's Vulnerability?

A.

sn_vul.autocreate_vul_filter_group

B.

sn_vul.autocreate_vul_approval_group

C.

sn_vul.autocreate_vul_group_item

D.

sn_vul.autocreate_vul_centric_group

Vulnerability Response can be best categorized as a_______, focused on identifying and remediating vulnerabilities as early as possible.

A.

A proactive process

B.

An iterative process

C.

A tentative process

D.

A reactive process

The Vulnerability Admin role (sn_vul.admin) can modify Vulnerability Application Properties and can be delegated to the following role(s):

A.

ServiceNow Security Operations Admin (sn_sec.admin)

B.

Security Admin (security.admin)

C.

Vulnerability Response Admin (sn_vul_resp.admin)

D.

All of the above

E.

None of the above

The three levels of users you will likely encounter that will need access to data displayed in the Vulnerability Response dashboard are: Choose 3 answers

A.

Security Analysts

B.

Customers

C.

CIO/CISO

D.

Fulfillers

Which application provides the opportunity to align security events with organizational controls, automatically appraising other business functions of potential impact?

A.

Performance Analytics

B.

Event Management

C.

Governance. Risk, and Compliance

D.

Service Mapping

What Business Rule creates a Configuration Item from a Vulnerable Item record?

A.

Create CI from Vulnerable Group Details

B.

Create CI from Closed Item Details

C.

Determine CI from Network Details

D.

Create CI from Vulnerable item Details

When an approval is rejected for a Vulnerable Item exception, what happens to the State field for that record?

A.

It reverts to 'Analysis'

B.

It is set to 'New'

C.

It is set to 'In Review'

D.

It will be set back to its previous value

Which of the following is a common Integration point between Vulnerability and GRC?

A.

Security Incident Response

B.

Change

C.

Problem

D.

Risk Indicators

In order for Vulnerability admins to configure integrations, they must have the following Role(s):

A.

admin only

B.

sn_vul.admin only

C.

sn_vul.vulnerability_write

D.

admin and sn_vul_qualys.admin

To facilitate the remediation of a Vulnerable Item what type of Item is most commonly used?

A.

Create a Problem

B.

Create a Security Incident

C.

Create a KB article

D.

Create a Change

Changes made within a named Update Set in a different application scope:

A.

Will be captured

B.

Will throw errors

C.

Will not be captured

D.

Will be partially captured

Which of the following provides a list of software weaknesses?

A.

Third Party Entries

B.

NVD

C.

CWE

D.

Vulnerable Items

Where in the platform can you create Filter Groups?

A.

Vulnerability > Administration > Filter Groups

B.

Vulnerability > Groups > Filter Groups

C.

Security Operations > Administration > Filter Groups

D.

Security Operations > Groups > Filter Groups

Where can you find Information related to the Common Vulnerabilities and Exposures (CVE)?

A.

Tenable

B.

MITRE

C.

NIST

D.

Qualys

Vulnerability Response is a scoped application; which prefix is attached to all items related to the application?

A.

cmn_vul

B.

vul

C.

sn_vul

D.

x_vul

In order to more easily manage large sets of Vulnerable items, what should you create?

A.

Vulnerability Groups

B.

Calculator Group

C.

Filter Group

D.

Vulnerable item Conditions

Which of the following best describes a Vulnerability Group?

A.

Groups Vis using a Filter against Vulnerable Item Fields

B.

A Filter defining a sub-set of Cls to be treated as a group

C.

The User Group assigned to resolving the Vulnerable Item

D.

Must have a corresponding filter group

Page: 1 / 1
Total 60 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved