Module 2: Data Organization in Vulnerability Response Flashcards

1
Q

What is the community-developed list of common software security weaknesses which serves as a common language, a measuring stick for software security tools, and as a baseline for weakness identification, mitigation, and prevention efforts?

A

Common Weakness Enumeration (CWE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Where are common Vulnerabilties and Exposures CVE-ID records downloaded from?

A

National Vulnerability Database (NVD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

When VR matches vulnerabilities with items in your environment, what type of record is created?

A

Vulnerable Item

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

When scanners pass the data into ServiceNow, what is used to identify the Configuration Item affected by a particular vulnerability?

A

CI Lookup rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

T/F: Vulnerable Items and Remediation Tasks follow the same process flow

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the Vulnerable Item table name?

A

[sn_vul_vulnerable_item]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A Vulnerable Item (VIT) is the Vulnerability as it relates to a specific ________________________.

A

Configuration Item (CI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

T/F: A VIT can exist without a specific Configuration Item.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are distinct occurrences of vulnerabilities as reported by the scanners of third-party integrations?

A

Detections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are vulnerabilities on custom software applications scanned throughout the application’s development life cycle?

A

Application vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What three user groups does Application Vulnerability Response use?

A

App-Sec Manager
Application Security Champion
Developer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

T/F: ServiceNow’s Application Vulnerability Response application focuses on DAST and SAST.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is SAST?

A

Static Application Security Testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is DAST?

A

Dynamic Application Security Testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the scanned application table?

A

[sn_vul_app_scanned_application]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How is the Scanned Applications table populated?

A

From the integrated scanner

17
Q

Where do you go to update a Scanned Application?

A

Application Vulnerability Response > Administration > Applications

18
Q

What do Scanned Applications often correspond to in the CMDB?

A

Mapped Application Services

19
Q

Scanned Applications should be mapped to ______________________ in a manner consistent with the Common Service Data Model adopted by the environment.

A

Technical Services

20
Q

What is the Application Vulnerable Item table?

A

[sn_vul_app_vulnerable_item]