Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: netbudy65

CIS-VR Certified Implementation Specialist - Vulnerability Response Questions and Answers

Questions 4

Managers should have access to which role-based data access and visualizations? Choose 3 answers

Options:

A.

Aggregations for priority and workload

B.

Time period views

C.

Up-to-the-minute views

D.

Drill-down to granularity

Buy Now
Questions 5

Which of the following can NOT be used for building Vulnerability Groups?

Options:

A.

Vulnerability

B.

Filter Groups

C.

Condition Builder

D.

Advanced Scripts

Buy Now
Questions 6

SLAs are used to ensure VUL are processed in a timely matter. Which field is used to determine the expected timeframe for remediating a VlT?

Options:

A.

Updated

B.

Remediation status

C.

Remediation target

D.

Closed

Buy Now
Questions 7

Which of the following best describes the Vulnerable item State Approval Workflow?

Options:

A.

It is read-only, you can only change the Assignment Group members for the approval

B.

It exists in the Security Operations Common scope so it can be modified by any Security Operations Admin

C.

It can only be modified by System Adminstrators

D.

It runs against the [sn_vul_change_approval] table

Buy Now
Questions 8

Which application provides the opportunity to align security events with organizational controls, automatically appraising other business functions of potential impact?

Options:

A.

Performance Analytics

B.

Event Management

C.

Governance. Risk, and Compliance

D.

Service Mapping

Buy Now
Questions 9

Where in the platform can you create Filter Groups?

Options:

A.

Vulnerability > Administration > Filter Groups

B.

Vulnerability > Groups > Filter Groups

C.

Security Operations > Administration > Filter Groups

D.

Security Operations > Groups > Filter Groups

Questions 10

Which module is used to adjust the frequency in which CVEs are updated?

Options:

A.

NVD Auto-update

B.

Update

C.

CVE Auto-update

D.

On-demand update

Buy Now
Questions 11

What is the ID associated with the Vulnerability Response plugln?

Options:

A.

com.snc.threat.intelllgence

B.

com.snc.vulnerability

C.

com.snc.threat.feeds

D.

com.snc.securityjncident

Questions 12

Which of the following provides a list of software weaknesses?

Options:

A.

Third Party Entries

B.

NVD

C.

CWE

D.

Vulnerable Items

Buy Now
Questions 13

To facilitate the remediation of a Vulnerable Item what type of Item is most commonly used?

Options:

A.

Create a Problem

B.

Create a Security Incident

C.

Create a KB article

D.

Create a Change

Buy Now
Questions 14

If fixing a Vulnerable Item outweighs the benefits, the correct course of action is:

Options:

A.

Mark the CI inactive in the CMDB and notify the CI owner

B.

Record the accepted risk and Close/Defer the Vulnerable Item

C.

Deprioritize the Vulnerable item Records (VlT) to push them further down the list so it can be ignored

D.

Add the Cl to the Vulnerability Scanners exclusions Related List

Buy Now
Questions 15

in regard to the Security Operations Process, which of the following statements defines the "identify" phase?

Options:

A.

What processes and assets need protection?

B.

What techniques can identify incidents?

C.

What safeguards are available?

D.

What techniques can restore capabilities?

E.

What techniques can contain impacts of incidents?

Buy Now
Questions 16

What do Vulnerability Exceptions require?

Options:

A.

An Approval by default

B.

An Exception Workflow

C.

A GRC integration

D.

A Filter Group

Questions 17

To ensure that Vulnerabilities are processed correctly, you can define a Service Level Agreement (SLA) for Vulnerability Response. To achieve this you would:

Options:

A.

Create a custom workflow to monitor the time between States

B.

Log in as a system admin, and using the globally scoped baseline SLA Modules

C.

Have the role of Vulnerability admin, but only in the Vulnerability Scope

D.

Make sure you have at least the sn_vul.vulnerability_write role and using the baseline SLA Application Modules

Questions 18

What option can be used to close out a Vulnerable item Record or initiate the Exception Process?

Options:

A.

Complete

B.

Update

C.

Close/Defer

D.

Save

Buy Now
Exam Code: CIS-VR
Exam Name: Certified Implementation Specialist - Vulnerability Response
Last Update: Nov 21, 2024
Questions: 60

PDF + Testing Engine

$130

Testing Engine

$95

PDF (Q&A)

$80