What is the best way to develop a complete list of Vulnerability Reports?
B
The three levels of users you will likely encounter that will need access to data displayed in the
Vulnerability Response dashboard are: Choose 3 answers
A
What type of data would the CIO/CISO want on the dashboard?
A
To get useful reporting regarding the most vulnerable CI's, which statement applies?
B
Managers should have access to which role-based data access and visualizations? Choose 3 answers
D
What role Is required to view the Vulnerability Overview Dashboard?
A
To ensure that Vulnerabilities are processed correctly, you can define a Service Level Agreement
(SLA) for Vulnerability Response. To achieve this you would:
B
Which of the following best describes the Vulnerable item State Approval Workflow?
C
What is the ServiceNow application used for process automation?
B
Which of the following is a common Integration point between Vulnerability and GRC?
D
A common Integration point with Vulnerability is:
A
If fixing a Vulnerable Item outweighs the benefits, the correct course of action is:
A
Filter groups can be used In Vulnerability Response to group what type of vulnerability records?
C
Which of the following can NOT be used for building Vulnerability Groups?
B
Where in the platform can you create Filter Groups?
D