View Mode
Q: 1
After closing the Vulnerable Item (VI), it is recommended to:
Options
Q: 2

Select the three components of a Fitter Condition:

Options
Q: 3
The three levels of users you will likely encounter that will need access to data displayed in the Vulnerability Response dashboard are: Choose 3 answers
Options
Q: 4
SLAs are used to ensure VUL are processed in a timely matter. Which field is used to determine the expected timeframe for remediating a VlT?
Options
Q: 5
Some customers may have a clearly-defined, well-documented vulnerability exception process and some may even provide a diagram illustrating that process What is the main advantage of having this documentation when translating it into a Flow or Workflow?
Options
Q: 6
A common Integration point with Vulnerability is:
Options
Q: 7
Which statement about patching is most correct?
Options
Q: 8
ServiceNow Vulnerability Response tables typically start with which prefix?
Options
Q: 9
sn_vul.itsm_popup is the properly that is set to True or False based on the customer desire for a popup when creating a Problem or Change record from a Vulnerability or VI record.
Options
Q: 10
What Business Rule creates a Configuration Item from a Vulnerable Item record?
Options
Question 1 of 20 · Page 1 / 2

Premium Access Includes

  • Quiz Simulator
  • Exam Mode
  • Progress Tracking
  • Question Saving
  • Flash Cards
  • Drag & Drops
  • 3 Months Access
  • PDF Downloads
Get Premium Access
Scroll to Top

FLASH OFFER

Days
Hours
Minutes
Seconds

avail 10% DISCOUNT on YOUR PURCHASE