RESPONSE QUESTIONS WITH 100%
CORRECT ANSWERS!!
1 of 66
Term
Approvals within the Vulnerability Application are created based on:
The sys_approval and the sn_vul_vulnerable_item tables
The sn_vul_vulnerable_item and sn_vul_vulnerability tables
The sn_vul_change_approval table
The sys_approval table
Give this one a try later!
, C B
D A
Don't know?
2 of 66
Term
Ignoring a Vulnerable Item:
A. Permanently removes the item from the list of Active
Vulnerable Items
B.Move the item to the Slushbucket
C. Has no impact on the list of Active Vulnerable Items
D.Temporarily removes the item from the list of Active
Vulnerable Items
Give this one a try later!
D A
B C
Don't know?
3 of 66
,Term
In order to more easily manage large sets of Vulnerable Items,
what should you create? (Appears twice)
A. Vulnerability Groups
B.Calculator Group
C. Filter Group
D.Vulnerable Item Conditions
Give this one a try later!
D C
B A
Don't know?
4 of 66
Term
In order for Vulnerability admins to configure integrations, they
must have the following Role(s):
A. admin only
B.sn_vul.admin only
C. sn_vul.vulnerability_write
D.admin and sn_vul_qualys.admin
, Give this one a try later!
C B
D A
Don't know?
5 of 66
Term
(CHECK ANSWER) Some customers may have a clearly-
defined, well-documented vulnerability exception
process and some may even provide a diagram
illustrating that process.
What is the main advantage of having this documentation when
translating it into a Flow or Workflow?
A. Perfect opportunity for process improvement
B.Understand their internal process
C. Build the Flow/Workflow directly into the platform
D.No advantage
Give this one a try later!
B C
A, B, D A