Vulnerability Response is a scoped application; which prefix is attached to all items related to the application?
Answer : C
Which Vulnerability maturity level provides advanced owner assignment?
Answer : D
Which application provides the opportunity to align security events with organizational controls, automatically appraising other business functions of potential impact?
Answer : C
Ignoring a Vulnerable Item:
Answer : A
What do Vulnerability Exceptions require?
Answer : C
Best Practices dictate that when creating a Change task from a Vulnerable Item, which of the following fields should be used for assigning the Assigned To field on the Change task?
Answer : A
Approvals within the Vulnerability Application are created based on:
Answer : C
Some customers may have a clearly-defined, well-documented vulnerability exception process and some may even provide a diagram illustrating that process.
What is the main advantage of having this documentation when translating it into a Flow or Workflow?
Answer : B
When an approval is rejected for a Vulnerable Item exception, what happens to the State field for that record?
Answer : C
What option can be used to close out a Vulnerable Item Record or initiate the Exception Process?
Answer : C
What must Vulnerability Exceptions be supplied by default?
Answer : C
Which of the following best describes a Vulnerability Group?
Answer : D
In order to more easily manage large sets of Vulnerable Items, you would want to create:
Answer : A
Which of the following is the property that controls whether Vulnerability Groups are created by default based on Vulnerabilities in the system?
Answer : A
What system property allows for the auto creation of Vulnerability Groups based on the Vulnerable Item’s Vulnerability?
Answer : C
Have any questions or issues ? Please dont hesitate to contact us