If a customer expects to ingest 2 million vulnerabilities during its initial load, which instance size should you recommend?
A. L
B. XL
C. XXL
D. Ultra
The components installed with Vulnerability Response include:
A. Tables, Scheduled Jobs, Security Operations Common
B. Business Rules, Roles, Workflows
C. Properties, Client Scripts, Wizards
D. UI Pages, Business Rules, Vulnerability Scanners
Which module within the Vulnerability Response application could be used to get information from the National Vulnerability Database (NVD) at any moment?
A. On-Demand Update
B. NVD Auto-Update
C. Vulnerable Software
D. NVD Patch
Which statement about patching is most correct?
A. Mature organizations abandon patching
B. Patch management and Vulnerability Response are interchangeable terms
C. Patching is one of many responses to a Vulnerability
D. As long as you are patching actively, Vulnerability Response isn't necessary
In order to more easily manage large sets of Vulnerable Items, what should you create?
A. Vulnerability Groups
B. Calculator Group
C. Filter Group
D. Vulnerable Item Conditions
Approvals within the Vulnerability Application are created based on:
A. The sys_approval and the sn_vul_vulnerable_item tables
B. The sn_vul_vulnerable_item and sn_vul_vulnerability tables
C. The sn_vul_change_approval table
D. The sys_approval table
What option can be used to close out a Vulnerable Item Record or initiate the Exception Process?
A. Complete
B. Update
C. Close/Defer
D. Save
To ensure that Vulnerabilities are processed correctly, you can define a Service Level Agreement (SLA) for Vulnerability Response. To achieve this, you would:
A. Create a custom workflow to monitor the time between States
B. Log in as a system admin, and using the globally scoped baseline SLA Modules
C. Have the role of Vulnerability admin, but only in the Vulnerability Scope
D. Make sure you have at least the sn_vul.vulnerability_write role and using the baseline SLA Application Modules