Which of the following best describes a Vulnerability Group?
AGroups VIs using a Filter against Vulnerable Item Fields
BA Filter defining a sub-set of CIs to be treated as a group
CThe User Group assigned to resolving the Vulnerable Item
DMust have a corresponding filter group
To ensure that Vulnerabilities are processed correctly, you can define a Service Level Agreement (SLA) for Vulnerability Response. To achieve this, you would:
ACreate a custom workflow to monitor the time between States
BLog in as a system admin, and using the globally scoped baseline SLA Modules
CHave the role of Vulnerability admin, but only in the Vulnerability Scope
DMake sure you have at least the sn_vul.vulnerability_write role and using the baseline SLA Application Modules
What role is required to view the Vulnerability Overview Dashboard?
Asn_vul.vulnerability.read
Bsn_vul.manager
Csn_vul.ciso
Dsn_vul.vulnerability.write
Managers should have access to which role-based data access and visualizations? (Choose three.)
AAggregations for priority and workload
BTime period views
CUp-to-the-minute views
DDrill-down to granularity
Question 6
Additional Recommended
0
Question 7
Prerequisites
Question 8
Prerequisites
Question 9
Additional Recommended
Question 10
Product Line Specific
Question 11
Product Line Specific
Question 12
Additional Recommended
Question 13
Product Line Specific
Question 14
Prerequisites
Question 15
Prerequisites
Question 16
Product Line Specific
Question 17
Prerequisites
Question 19
Prerequisites
Question 20
Prerequisites
Question 22
Additional Recommended
Question 23
Prerequisites
Question 24
Prerequisites
Question 25
Prerequisites
Question 26
Prerequisites
Question 27
Prerequisites
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ad
Want a break from the ads?
Become a Supporter and enjoy a completely ad-free experience, plus unlock Learn Mode, Exam Mode, AstroTutor AI, and more.
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
After closing the Vulnerable Item (VI), it is recommended to:
AUpdate the values in the Vulnerability Score Indicator (VSI) based on the critically of the Vulnerability
BThe VI remains active and in place until the Scanner rescans and closes the VI
CMark the CI as exempt from the Vulnerability if the vulnerability was remediated
DCompare the Vulnerability with subsequent scans
What must Vulnerability Exceptions be supplied by default?
AA reason for the exception
BIntegrations with GRC to handle the exception
CRequirement Actions for the exception
DA manual approval authority for the exception
What system property allows for the auto creation of Vulnerability Groups based on the Vulnerable Item’s Vulnerability?
Asn_vul.autocreate_vul_filter_group
Bsn_vul.autocreate_vul_approval_group
Csn_vul.autocreate_vul_group_item
Dsn_vul.autocreate_vul_centric_group
Which of the following is a common integration point between Vulnerability and GRC?
ASecurity Incident Response
BChange
CProblem
DRisk Indicators
Which module within the Vulnerability Response application could be used to get information from the National Vulnerability Database (NVD) at any moment?
AOn-Demand Update
BNVD Auto-Update
CVulnerable Software
DNVD Patch
Where in the platform can you create Filter Groups?
AVulnerability > Administration > Filter Groups
BVulnerability > Groups > Filter Groups
CSecurity Operations > Administration > Filter Groups
DSecurity Operations > Groups > Filter Groups
This functionality provides a simple way to build criteria once, which can be reused in other platform areas.
AConditions
BFavorites
CFilter Group
DFilters
In regard to the Security Operations Process, which of the following statements defines the “Identify” phase?
AWhat processes and assets need protection?
BWhat techniques can identify incidents?
CWhat safeguards are available?
DWhat techniques can restore capabilities?
EWhat techniques can contain impacts of incidents?
If a customer expects to ingest 2 million vulnerabilities during its initial load, which instance size should you recommend?
AL
BXL
CXXL
DUltra
What Business Rule creates a Configuration Item from a Vulnerable Item record?
ACreate CI from Vulnerable Group Details
BCreate CI from Closed Item Details
CDetermine CI from Network Details
DCreate CI from Vulnerable Item Details
What is the ID associated with the Vulnerability Response plugin?
Acom.snc.threat.intelligence
Bcom.snc.vulnerability
Ccom.snc.threat.feeds
Dcom.snc.security_incident
Select the three components of a Filter Condition: (Choose three.)
AField
BSum
COperator
DValue
To facilitate the remediation of a Vulnerable Item what type of item is most commonly used?
ACreate a Problem
BCreate a Security Incident
CCreate a KB article
DCreate a Change
What do Vulnerability Exceptions require?
AAn Approval by default
BAn Exception Workflow
CA GRC integration
DA Filter Group
Where can you find information related to the Common Vulnerabilities and Exposures (CVE)?
ATenable
BMITRE
CNIST
DQualys
What is the purpose of Scoped Applications?
ASuppliers can only charge for applications when they are scoped
BScoped applications are scalable, Global applications are not
CScoping encapsulates and protects data and functionality
DAn application needs to be scoped in order to be deployed as a plugin
What is the minimum role required to create and change Service Level Agreements for Vulnerability Response groups?
Asla_manager
Badmin
Csn_vul.vulnerability_write
Dsn_vul.admin
Which module is used to adjust the frequency in which CVEs are updated?
ANVD Auto-update
BUpdate
CCVE Auto-update
DOn-demand update
Changes made within a named Update Set in a different application scope:
AWill be captured
BWill throw errors
CWill not be captured
DWill be partially captured
Filter Groups provide a way to:
ADecouple the use of the grouping from the definition of the grouping