100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

ServiceNow Implementation Specialist Vulnerability Response 2023 fully solved

Rating
-
Sold
-
Pages
5
Grade
A+
Uploaded on
01-03-2023
Written in
2022/2023

ServiceNow Implementation Specialist Vulnerability Response 2023 fully solvedWith Vulnerability Response you can do the following: • Configure vulnerability groups, CI identifiers, notifications, and SLAs. • Update your system from the vulnerability databases on demand or by running userconfigured scheduled jobs. • Configure integrations to import data from internal and external sources. If the Qualys Vulnerability Integration plugin is activated and configured, Vulnerability Response can receive vulnerability data from the Qualys scanner in the form of vulnerabilities and vulnerable items. • Create changes, problems, and security incidents from vulnerability groups. • Edit vulnerable items in bulk. • View the library of Common Weakness Enumeration (CWE) records from the NVD to understand how they relate to the Common Vulnerability and Exposure (CVE) records. Knowledge articles associated with the CWEs are included for reference. • Create and view reports. The Vulnerability Response tasks provides which roles by default? a) sn_ b) sn_rability_read c) sn_rability_write d) sn__import_admin Common Vulnerability and Exposure — a dictionary of publicly known information-security vulnerabilities and exposures. CVE Common Vulnerability Scoring System — an open framework for communicating the characteristics and severity of software vulnerabilities. CVSS Common Weakness Enumeration — a list of software vulnerabilities CWE Software models used to help normalize the software you own by analyzing and classifying models to reduce duplication. Discovery Models Calculators used to prioritize and categorize vulnerabilities based on user-defined criteria. Vulnerability calculators and calculator groups Vulnerability groups and group rules Used to group vulnerable items based on vulnerability, vulnerable item conditions, or filter group. Configure Vulnerability integrations A process that pulls report data from a thirdparty system, generally to retrieve vulnerability data. Vulnerabilities Records of potentially vulnerable software downloaded from the National Institute of Standards and Technology (NIST) NVD or third party integrations. Vulnerable items Pairings of vulnerable entries, downloaded from the NIST NVD or third-party integrations, and potentially vulnerable configuration items and software in your company network. Vulnerability Vulnerability Group Lists all vulnerability groups. Vulnerability Open Lists all open vulnerability groups Vulnerability Assigned to me Lists all vulnerability groups assigned to you. sn_vul_qualys_host_id, sn_vul_qualys_id, , all of the above, none When the Qualys Cloud Platform integration is installed, which the following rules are available sn_rability_admin What role is required to define a VR email template? sn_rability_admin What role is required to define a VR SLA? Asset Management module You can compare vulnerability data to CIs and software identified as VR's? Software Asset Management Core Plugin [] Provides the base tables for software asset management. Includes software installations, usages, suite calculations, and discovery models. Security Support Orchestration [stration] Provides an integration of Security Operations with Orchestration to allow the facilitation of workflow activities within Security Incident Response, Threat Intelligence, or Vulnerability Response. Vulnerability Response Support [ity_] Provides support functionality for use within the Vulnerability Response application. 1) Manually 2) Automatically How can you create vulnerability groups? Manually, using one of three options, to add vulnerable items to the group. 1) Add vulnerable items to the group by hand. 2) Use a Condition filter that automatically adds vulnerable items to the vulnerability group. 3) Use a Filter group that automatically adds vulnerable items to the vulnerability group. Note: Manually added vulnerable items are not automatically removed from vulnerability groups by vulnerability group rules or group conditions. How can you manually create vulnerability groups? True T/F - vulnerable item refresh automation applies only to groups created using the Condition filter, Filter group, or vulnerability group rules. If the VIs are added manually, automation does not apply. True T/F - If you want vulnerable items to continue being added to the group, regardless of state, disable the Set auto refresh vulnerable items business rule. True T/F - If a group is created by a vulnerable group rule, the Refresh associated vulnerable items, on the Vulnerability Group page is hidden. If the group filter type is condition or filter group, then it appears.

Show more Read less
Institution
Qualys
Course
Qualys









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Qualys
Course
Qualys

Document information

Uploaded on
March 1, 2023
Number of pages
5
Written in
2022/2023
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

  • ci identifiers
  • notifications
  • and

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
7Eleven nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
297
Member since
3 year
Number of followers
208
Documents
11956
Last sold
21 hours ago
Stuvia study hub

4.0

116 reviews

5
64
4
17
3
19
2
3
1
13

Trending documents

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions