Think of the three levels of users as a pyramid: Security Analysts at the bottom, Customers in the middle, and CIO/CISO at the top, each needing access to the Vulnerability Response dashboard.
What is the best way to develop a complete list of Vulnerability Reports?
B
The three levels of users you will likely encounter that will need access to data displayed in the
Vulnerability Response dashboard are: Choose 3 answers
A
Think of the three levels of users as a pyramid: Security Analysts at the bottom, Customers in the middle, and CIO/CISO at the top, each needing access to the Vulnerability Response dashboard.
What type of data would the CIO/CISO want on the dashboard?
A
The CIO/CISO would want single, clear indicators of organizational health on the dashboard, like a traffic light system showing green for good and red for bad to quickly assess the situation.
C. Single, clear indicators of organizational health
To get useful reporting regarding the most vulnerable CI's, which statement applies?
B
To effectively report on the most vulnerable Configuration Items (CIs), think of your CMDB as a well-organized library; if it's up-to-date, you can easily find and assess the most critical books (CIs).
Managers should have access to which role-based data access and visualizations? Choose 3 answers
D
Managers need access to summarized data for priorities (A), historical trends (B), and detailed insights (D) to make informed decisions, like using a telescope for big picture views and a microscope for details.
What role Is required to view the Vulnerability Overview Dashboard?
A
"sn_vuI.vulnerability.read" and "sn_vuI.vulnerability.write" is deprecated, use "sn_vul.read_all" and "sn_vul.vulnerability_analyst" respectively.
To view the Vulnerability Overview Dashboard, you need the role "sn_vul.vulnerability.read"
To ensure that Vulnerabilities are processed correctly, you can define a Service Level Agreement
(SLA) for Vulnerability Response. To achieve this you would:
B
To ensure vulnerabilities are handled correctly, you need the sn_vul.vulnerability_write role and baseline SLA Application Modules
Which of the following best describes the Vulnerable item State Approval Workflow?
C
D is correct answer
What is the ServiceNow application used for process automation?
B
Which of the following is a common Integration point between Vulnerability and GRC?
D
A common Integration point with Vulnerability is:
A
If fixing a Vulnerable Item outweighs the benefits, the correct course of action is:
A
Filter groups can be used In Vulnerability Response to group what type of vulnerability records?
C
Which of the following can NOT be used for building Vulnerability Groups?
B
Where in the platform can you create Filter Groups?
D
Recommend that the client purchase the full Performance Analytics package.
The best way to develop a complete list of Vulnerability Reports is to collaborate with the customer, like tailoring a suit to fit their specific needs and preferences.
C. Work with the customer to identify the things that will be most useful to them