Module 3: Tools to Manage Vulnerability Response Flashcards
What classify incoming data from Vulnerability Scanners automatically so that the data can be used by other rules?
Classification Rules
What are the two classification groups available?
Vulnerability Entry Classification
Discovered Item Classification
How can Classification rules be re-applied?
Via the Reapply Classification Rule UI Action
How do you migrate Classification Rules defined prior to v16.1.3 into a single classification group?
‘Migrate Existing Classification Rules’ Fix Script
When you enable the Advanced view to display the ‘Value Type’ field, which two options are available?
Template
Script
What is the Assignment Rule table?
[sn_vul_assignment_rule]
What is the Remediation Target Rules table?
[sn_vul_ttr_rule]
What is the Vulnerability Calculators table?
[sn_vul_calculator_groups]
When the rules are created from the modules in the Application Vulnerability Response section, then they will automatically be set to work for ______________ records.
AVIT
Rules that are created from the modules in the ___________________ section will be automatically set to work with the VIT records.
Vulnerability Response
Rules that are created from the modules in the Container Vulnerability Response section will be automatically set to work with the _________________ records.
CVIT
On Assignment Rules, what are the three assignment options (Assign using)?
Assignment group
Assignment group field
Script
T/F: CVSS score considers the company’s business priority.
False
What is used to transform third-party source severity fields into recognizable fields in Vulnerability Response?
Severity Mapping
ServiceNow normalizes different severity terms using the ________________ module.
Normalized Severity Maps
T/F: It is recommended that each organization modify normalized severity values in order to meet their specific needs.
False
T/F: The default risk weights for Infrastructure vulnerabilities and container vulnerabilities are the same.
True - Application vulnerabilities utilize a different default set of weights
Prior to Utah, the Risk Score to Risk Rating mappings were hard-coded in a script, but now customers have the option of setting there own weights using which table?
[sn_sec_cmn_risk_score_weight]
SLAs should run against which record type?
Remediation Task
Since platform SLAs cannot be created for Vulnerable Items, they instead use ___________________________.
Remediation Target Rules
Where do you configure SLAs for Vulnerability?
Service Level Management > SLA > SLA Definitions
Which system property provides an option to switch to a CSDM 4.0 product model-based lookup process in application vulnerability response?
sn_vul.use_product_model
What are the available integrations between Veracode and ServiceNow? Select all the responses that apply.
A) Applications List
B) Veracode Categories
C) Application Vulnerable Items
D) Veracode Risk Register
E) Veracode Controls
ABC
What types of scanner data does the Veracode integration injects into the ServiceNow platform? Select all the responses that apply.
A) SCA
B) SQLi
C) OWASP
D) SAST
E) DAST
ADE
What define the expected time frame for remediating a vulnerable item?
Remediation target rules
What are the targets associated with remediation target rules?
Remediation target
Reminder target
What is the Remediation Task table?
[sn_vul_remediation_task]
T/F: Vulnerable Items can belong to more than one Remediation Task
True
Manual Remediation Tasks can be created for which of the following? (Select Two)
A) Application Vulnerable Items
B) Container Vulnerable Items
C) Infrastructure Vulnerable Items
D) Configuration Compliance
CD
T/F: Manual Remediation Tasks can only be created from a workspace.
False - Manual RT’s can only be created from the platform UI
What role is required to create a manual Remediation Task?
sn_vul.write_all
Where do you go to define Filter Groups?
Security Operations > Groups > Filter Groups
T/F: Remediation Task Rules are only available for IVR/Host Infrastructure vulnerabilities
True
T/F: Best practice dictates that assignment should always be managed at the RT level rather than the VIT level
True
What is the Watch Topic table?
[sn_vul_watch_topic]
Vulnerability Manager uses _________________ workspace to create WT’s and RE’s.
Vulnerability Manager
Remediation Owners use the ___________________ workspace to remediate their assigned vulnerabilities.
IT Remediation
Remediation Efforts contain _____________ and __________________.
vulnerabilities, remediation tasks