ServiceNow cis-vr practice test

Exam Title: Vulnerability Response

Last update: Dec 16 ,2025
Question 1

What Business Rule creates a Configuration Item from a Vulnerable Item record?

  • A. Create CI from Vulnerable Group Details
  • B. Create CI from Closed Item Details
  • C. Determine CI from Network Details
  • D. Create CI from Vulnerable item Details
Answer:

A

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 2

The components Installed with Vulnerability Response Include:

  • A. Tables, Scheduled Jobs, Security Operations Common
  • B. Business Rules, Roles, Workflows
  • C. Properties, Client Scripts, Wizards
  • D. Ul Pages. Business Rules, Vulnerability Scanners
Answer:

B

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 3

What is the purpose of Scoped Applications?

  • A. Suppliers can only charge for applications when they are scoped
  • B. Scoped applications are scalable. Global applications are not
  • C. Scoping encapsulates and protects data and functionality
  • D. An application needs to be scoped in order to be deployed as a plugin
Answer:

D

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 4

What is the ID associated with the Vulnerability Response plugln?

  • A. com.snc.threat.intelllgence
  • B. com.snc.vulnerability
  • C. com.snc.threat.feeds
  • D. com.snc.securityjncident
Answer:

C

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 5

Where can you find Information related to the Common Vulnerabilities and Exposures (CVE)?

  • A. Tenable
  • B. MITRE
  • C. NIST
  • D. Qualys
Answer:

B

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 6

Which one of the following record types can be considered the intersection of Vulnerability source
information and CMDB CI records?

  • A. Vulnerability
  • B. Vulnerability Task
  • C. CMDB_CI_Vuln
  • D. Vulnerable Item (VI)
Answer:

A

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 7

Which of the following provides a list of software weaknesses?

  • A. Third Party Entries
  • B. NVD
  • C. CWE
  • D. Vulnerable Items
Answer:

B

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 8

Filter Groups provide a way to:

  • A. Decouple the use of the grouping from the definition of the grouping
  • B. Build criteria once
  • C. Reuse criteria in a variety of places
  • D. All of the above
Answer:

D

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 9

Which module within the Vulnerability Response application could be used to get information from
the National Vulnerability Database (NVD) at any moment?

  • A. On-Demand Update
  • B. NVD Auto-Update
  • C. Vulnerable Software
  • D. NVD Patch
Answer:

A

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 10

Which statement about patching is most correct?

  • A. Mature organizations abandon patching
  • B. Patch management and Vulnerability Response are interchangeable terms
  • C. Patching is one of many responses to a Vulnerability
  • D. As long as you are patching actively. Vulnerability Response isn't necessary
Answer:

C

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Page 1 out of 5
Viewing questions 1-10 out of 60
Go To
page 2