
CIS - VR
Authored by Janis Thielen
Mathematics
KG
Used 95+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
117 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
ServiceNow Vulnerability Response tables typically start with which prefix?
vul
sn_vul_
snvr_
snvuln_
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The Vulnerability Response plugin does not include any dashboards
true
false
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a Vulnerability? (Select the best answer):
A system susceptibility or a flaw
Any system susceptibility, flaw, or weakness that allows an exploitation or an attacker to further reduce security posture
Attacker capability to exploit a flaw
Attacker access to a flaw
4.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Which of the following is NOT a source of vulnerabilities or vulnerability data that is commonly used in industry?
NVD
CWE
PCI-DSS
HIPAA
CVE
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is not contained in the “Libraries” module?
Vulnerable Software
National Vulnerability Database (NVD)
Common Weaknesses Enumeration (CWE)
Vulnerability Groups
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Vulnerability Response can be best categorized as a ________, focused on identifying and remediating vulnerabilities as early as possible.
A tentative process
A proactive process
A reactive process
An iterative process
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Vulnerability Response can be configured to integrate with vulnerability scanners and to ingest identified vulnerabilities and remediate through a standard process
true
false
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?