Labour Day - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

CIS-VR Questions and Answers

Question # 6

Ignoring a Vulnerable item:

A.

Permanently removes the item from the list of Active Vulnerable items

B.

Move the item to the Slushbucket

C.

Has no impact on the list of Active Vulnerable Items

D.

Temporarily removes the item from the list of Active Vulnerable items

Full Access
Question # 7

What option can be used to close out a Vulnerable item Record or initiate the Exception Process?

A.

Complete

B.

Update

C.

Close/Defer

D.

Save

Full Access
Question # 8

The components Installed with Vulnerability Response Include:

A.

Tables, Scheduled Jobs, Security Operations Common

B.

Business Rules, Roles, Workflows

C.

Properties, Client Scripts, Wizards

D.

Ul Pages. Business Rules, Vulnerability Scanners

Full Access
Question # 9

If fixing a Vulnerable Item outweighs the benefits, the correct course of action is:

A.

Mark the CI inactive in the CMDB and notify the CI owner

B.

Record the accepted risk and Close/Defer the Vulnerable Item

C.

Deprioritize the Vulnerable item Records (VlT) to push them further down the list so it can be ignored

D.

Add the Cl to the Vulnerability Scanners exclusions Related List

Full Access