Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

A list of software weaknesses is known as:

A.

National Vulnerability Database (NVD)

B.

Common Vulnerability and Exposure (CVE)

C.

National Institute of Science and Technology (NIST)

D.

Common Weaknesses Enumeration (CWE)

Full Access
Question # 5

When an approval is rejected for a Vulnerable Item exception, what happens to the State field for that record?

A.

It reverts to 'Analysis'

B.

It is set to 'New'

C.

It is set to 'In Review'

D.

It will be set back to its previous value

Full Access
Question # 6

ServiceNow Vulnerability Response tables typically start with which prefix?

A.

snvr_

B.

snvuln_

C.

vul_

D.

sn_vul_

Full Access
Question # 7

Select the three components of a Fitter Condition: Choose 3 answers

A.

Field

B.

Sum

C.

Operator

D.

Value

Full Access
Question # 8

The components Installed with Vulnerability Response Include:

A.

Tables, Scheduled Jobs, Security Operations Common

B.

Business Rules, Roles, Workflows

C.

Properties, Client Scripts, Wizards

D.

Ul Pages. Business Rules, Vulnerability Scanners

Full Access
Question # 9

Which application provides the opportunity to align security events with organizational controls, automatically appraising other business functions of potential impact?

A.

Performance Analytics

B.

Event Management

C.

Governance. Risk, and Compliance

D.

Service Mapping

Full Access