Think of the three levels of users as a pyramid: Security Analysts at the bottom, Customers in the middle, and CIO/CISO at the top, each needing access to the Vulnerability Response dashboard.
What is the best way to develop a complete list of Vulnerability Reports?
B
The three levels of users you will likely encounter that will need access to data displayed in the
Vulnerability Response dashboard are: Choose 3 answers
A
Think of the three levels of users as a pyramid: Security Analysts at the bottom, Customers in the middle, and CIO/CISO at the top, each needing access to the Vulnerability Response dashboard.
What type of data would the CIO/CISO want on the dashboard?
A
The CIO/CISO would want single, clear indicators of organizational health on the dashboard, like a traffic light system showing green for good and red for bad to quickly assess the situation.
To get useful reporting regarding the most vulnerable CI's, which statement applies?
B
To effectively report on the most vulnerable Configuration Items (CIs), think of your CMDB as a well-organized library; if it's up-to-date, you can easily find and assess the most critical books (CIs).
Managers should have access to which role-based data access and visualizations? Choose 3 answers
D
Managers need access to summarized data for priorities (A), historical trends (B), and detailed insights (D) to make informed decisions, like using a telescope for big picture views and a microscope for details.
What role Is required to view the Vulnerability Overview Dashboard?
A
"sn_vuI.vulnerability.read" and "sn_vuI.vulnerability.write" is deprecated, use "sn_vul.read_all" and "sn_vul.vulnerability_analyst" respectively.
To view the Vulnerability Overview Dashboard, you need the role "sn_vul.vulnerability.read"
To ensure that Vulnerabilities are processed correctly, you can define a Service Level Agreement
(SLA) for Vulnerability Response. To achieve this you would:
B
To ensure vulnerabilities are handled correctly, you need the sn_vul.vulnerability_write role and baseline SLA Application Modules
Which of the following best describes the Vulnerable item State Approval Workflow?
C
D is correct answer
What is the ServiceNow application used for process automation?
B
Which of the following is a common Integration point between Vulnerability and GRC?
D
A common Integration point with Vulnerability is:
A
If fixing a Vulnerable Item outweighs the benefits, the correct course of action is:
A
Filter groups can be used In Vulnerability Response to group what type of vulnerability records?
C
Which of the following can NOT be used for building Vulnerability Groups?
B
Where in the platform can you create Filter Groups?
D
Recommend that the client purchase the full Performance Analytics package.
The best way to develop a complete list of Vulnerability Reports is to collaborate with the customer, like tailoring a suit to fit their specific needs and preferences.