لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
What is the ID associated with the Vulnerability Response plugin?
A. com
B. com
C. com
D. com
عرض الإجابة
اجابة صحيحة: B
السؤال #2
Filter groups can be used In Vulnerability Response to group what type of vulnerability records?
A. Vulnerability groups
B. Third Party Entries
C. Vulnerable Items
D. Vulnerable Software
عرض الإجابة
اجابة صحيحة: C
السؤال #3
What Business Rule creates a Configuration Item from a Vulnerable Item record?
A. Create CI from Vulnerable Group Details
B. Create CI from Closed Item Details
C. Determine CI from Network Details
D. Create CI from Vulnerable Item Detailscorrect
عرض الإجابة
اجابة صحيحة: D
السؤال #4
Changes made within a named Update Set in a different application scope:
A. Will be capturedcorrect
B. Will throw errors
C. Will not be captured
D. Will be partially captured
عرض الإجابة
اجابة صحيحة: A
السؤال #5
The components installed with Vulnerability Response include:
A. Tables, Scheduled Jobs, Security Operations Commoncorrect
B. Business Rules, Roles, Workflows
C. Properties, Client Scripts, Wizards
D. UI Pages, Business Rules, Vulnerability Scanners
عرض الإجابة
اجابة صحيحة: A
السؤال #6
What must Vulnerability Exceptions be supplied by default?
A. A reason for the exception
B. Integrations with GRC to handle the exception
C. Requirement Actions for the exception
D. A manual approval authority for the exception
عرض الإجابة
اجابة صحيحة: A
السؤال #7
To ensure that Vulnerabilities are processed correctly, you can define a Service Level Agreement (SLA) for Vulnerability Response. To achieve this you would:
A. Create a custom workflow to monitor the time between States
B. Log in as a system admin, and using the globally scoped baseline SLA Modules
C. Have the role of Vulnerability admin, but only in the Vulnerability Scope
D. Make sure you have at least the sn_vul
عرض الإجابة
اجابة صحيحة: C
السؤال #8
What is the purpose of Scoped Applications?
A. Suppliers can only charge for applications when they are scopedcorrect
B. Scoped applications are scalable, Global applications are not
C. Scoping encapsulates and protects data and functionalitycorrect
D. An application needs to be scoped in order to be deployed as a plugin
عرض الإجابة
اجابة صحيحة: AC
السؤال #9
Which of the following best describes the Vulnerable item State Approval Workflow?
A. AIt is read-only, you can only change the Assignment Group members for the approval
B. BIt exists in the Security Operations Common scope so it can be modified by any Security Operations Admin
C. CIt can only be modified by System Adminstrators
D. DIt runs against the [sn_vul_change_approval] table
عرض الإجابة
اجابة صحيحة: C
السؤال #10
Best Practices dictate that when creating a Change task from a Vulnerable Item which of the following fields should be used for assigning the Assigned To field on the Change task?
A. Assigned To on Vulnerable item
B. Managed By on CMDB_CI
C. Assigned To on CMDB_CI Record
D. Best Practice does not dictate a specific field
عرض الإجابة
اجابة صحيحة: C
السؤال #11
To get useful reporting regarding the most vulnerable CI's, which statement applies?
A. You must purchase a separate PA module
B. Your CI population must be huge
C. You must have good KPi's defined
D. Your CMDB must be up to date and useful
عرض الإجابة
اجابة صحيحة: B
السؤال #12
In order to more easily manage large sets of Vulnerable Items, you would want to create:
A. Vulnerability Groups
B. Script Includes
C. Filter Groups
D. Vulnerability Sets
عرض الإجابة
اجابة صحيحة: B
السؤال #13
ServiceNow Vulnerability Response tables typically start with which prefix?
A. snvr_
B. snvuln_
C. vul_
D. sn_vul_
عرض الإجابة
اجابة صحيحة: D
السؤال #14
Vulnerability Response is a scoped application; which prefix is attached to all items related to the application?
A. mn_vul
B. ul
C. n_vul
D. _vul
عرض الإجابة
اجابة صحيحة: C
السؤال #15
In order to more easily manage large sets of Vulnerable Items, you would want to create:
A. ulnerability Groups
B. cript Includes
C. ilter Groups
D. ulnerability Sets
عرض الإجابة
اجابة صحيحة: A
السؤال #16
To ensure that Vulnerabilities are processed correctly, you can define a Service Level Agreement (SLA) for Vulnerability Response. To achieve this you would:
A. Create a custom workflow to monitor the time between States
B. Log in as a system admin, and using the globally scoped baseline SLA Modules
C. Have the role of Vulnerability admin, but only in the Vulnerability Scope
D. Make sure you have at least the sn_vul
عرض الإجابة
اجابة صحيحة: B
السؤال #17
SLAs are used to ensure VUL are processed in a timely matter. Which field is used to determine the expected timeframe for remediating a VIT?
A. Updated
B. Remediation status
C. Remediation target
D. Closed
عرض الإجابة
اجابة صحيحة: C
السؤال #18
Which of the following is the property that controls whether Vulnerability Groups are created by default based on Vulnerabilities in the system?
A. sn_vul
B. sn_vul
C. sn_vul
D. sn_vul
عرض الإجابة
اجابة صحيحة: C
السؤال #19
A common Integration point with Vulnerability is:
A. Workflow Mappings
B. Risk Indicators within GRC
C. Service Catalog
D. Knowledge Base
عرض الإجابة
اجابة صحيحة: A
السؤال #20
Select the three components of a Filter Condition: (Choose three.)
A. Field
B. Sum
C. Operator
D. Value
عرض الإجابة
اجابة صحيحة: ACD
السؤال #21
Which of the following best describes a Vulnerability Group?
A. Groups Vis using a Filter against Vulnerable Item Fields
B. A Filter defining a sub-set of Cls to be treated as a group
C. The User Group assigned to resolving the Vulnerable Item
D. Must have a corresponding filter group
عرض الإجابة
اجابة صحيحة: D
السؤال #22
What system property allows for the auto creation of Vulnerability Groups based on the Vulnerable Item's Vulnerability?
A. sn_vul
B. sn_vul
C. sn_vul
D. sn_vul
عرض الإجابة
اجابة صحيحة: A
السؤال #23
Some customers may have a clearly-defined, well-documented vulnerability exception process and some may even provide a diagram illustrating that process What is the main advantage of having this documentation when translating it into a Flow or Workflow?
A. Perfect opportunity for process improvement
B. Understand their internal process
C. Build the Flow/WorKflow directly into the platform
D. No advantage
عرض الإجابة
اجابة صحيحة: B
السؤال #24
Changes made within a named Update Set in a different application scope:
A. Will be captured
B. Will throw errors
C. Will not be captured
D. Will be partially captured
عرض الإجابة
اجابة صحيحة: A
السؤال #25
sn_vul.itsm_popup is the properly that is set to True or False based on the customer desire for a popup when creating a Problem or Change record from a Vulnerability or VI record.
A. False
B. True
عرض الإجابة
اجابة صحيحة: B
السؤال #26
What type of data would the CIO/CISO want on the dashboard?
A. Aggregations for priority and workload
B. Drill-down to granularity
C. Single, clear indicators of organizational health
D. Up to the minute views
عرض الإجابة
اجابة صحيحة: A
السؤال #27
In regard to the Security Operations Process, which of the following statements defines the “Identify” phase?
A. What processes and assets need protection?
B. What techniques can identify incidents?
C. What safeguards are available?correct
D. What techniques can restore capabilities?
E. What techniques can contain impacts of incidents?
عرض الإجابة
اجابة صحيحة: C
السؤال #28
What option can be used to close out a Vulnerable Item Record or initiate the Exception Process?
A. omplete
B. pdate
C. lose/Defer
D. ave
عرض الإجابة
اجابة صحيحة: C
السؤال #29
What is the minimum role required to create and change Service Level Agreements for Vulnerability Response groups?
A. sla_manager
B. admin
C. sn_vul
D. sn_vul
عرض الإجابة
اجابة صحيحة: D
السؤال #30
Best Practices dictate that when creating a Change task from a Vulnerable Item, which of the following fields should be used for assigning the Assigned To field on the Change task?
A. ssigned To on Vulnerable Item
B. anaged By on CMDB_CI
C. ssigned To on CMDB_CI Record
D. est Practice does not dictate a specific field
عرض الإجابة
اجابة صحيحة: A

View The Updated ServiceNow Exam Questions

SPOTO Provides 100% Real ServiceNow Exam Questions for You to Pass Your ServiceNow Exam!

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: