Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dcdisc65

Page: 1 / 2
Total 18 questions
Exam Code: CIS-VR                Update: Oct 16, 2025
Exam Name: Certified Implementation Specialist - Vulnerability Response

ServiceNow Certified Implementation Specialist - Vulnerability Response CIS-VR Exam Dumps: Updated Questions & Answers (October 2025)

Question # 1

Which statement about patching is most correct?

A.

Mature organizations abandon patching

B.

Patch management and Vulnerability Response are interchangeable terms

C.

Patching is one of many responses to a Vulnerability

D.

As long as you are patching actively. Vulnerability Response isn't necessary

Question # 2

Changes made within a named Update Set in a different application scope:

A.

Will be captured

B.

Will throw errors

C.

Will not be captured

D.

Will be partially captured

Question # 3

What Business Rule creates a Configuration Item from a Vulnerable Item record?

A.

Create CI from Vulnerable Group Details

B.

Create CI from Closed Item Details

C.

Determine CI from Network Details

D.

Create CI from Vulnerable item Details

Question # 4

In ServiceNow, which plugin needs to be added to enable Vulnerability integration with Qualys, Tenable, or Rapid7?

A.

Vulnerability Response

B.

Trusted Security Circles

C.

Threat Intelligence

D.

Security Incident Response

Question # 5

In order to more easily manage large sets of Vulnerable Items, you would want to create:

A.

Vulnerability Groups

B.

Script Includes

C.

Filter Groups

D.

Vulnerability Sets

Question # 6

Items in the ServiceNow Store are built and supported by:

A.

An Implementation Partner

B.

The company that created the Application

C.

ServiceNow Professional Services

D.

ServiceNow Technical Support

Question # 7

Best Practices dictate that when creating a Change task from a Vulnerable Item which of the following fields should be used for assigning the Assigned To field on the Change task?

A.

Assigned To on Vulnerable item

B.

Managed By on CMDB_CI

C.

Assigned To on CMDB_CI Record

D.

Best Practice does not dictate a specific field

Question # 8

What is the ID associated with the Vulnerability Response plugln?

A.

com.snc.threat.intelllgence

B.

com.snc.vulnerability

C.

com.snc.threat.feeds

D.

com.snc.securityjncident

Question # 9

Qualys asset tags can be loaded into a table related to the configuration item and used to support business processes or reporting. Set the Qualys Host parameter of asset_tags to a value of___to have asset tag information from Qualys be included in the XML payload.

A.

1

B.

3

C.

2

D.

0

Question # 10

Which of the following is the property that controls whether Vulnerability Groups are created by default based on Vulnerabilities in the system?

A.

sn_vul.autocreate_vul_centric_group

B.

sn_vul.autocreate_groups

C.

sn_vul.autocreate_vul_grouping

D.

sn_vul.create_default_vul_groups

Page: 1 / 2
Total 18 questions

Most Popular Certification Exams

Payment

       

Contact us

dumpscollection live chat

Site Secure

mcafee secure

TESTED 16 Oct 2025