CIS-VRM Dumps

CIS-VRM Braindumps CIS-VRM Real Questions CIS-VRM Practice Test

CIS-VRM Actual Questions


killexams.com


ServiceNow


CIS-VRM


ServiceNow Vendor Risk Management


https://killexams.com/pass4sure/exam-detail/CIS-VRM

Question: 158


Which of these must be true in order for a vendor risk issue to be visible in the Vendor Portal?


  1. There must be at least one secondary contact for the vendor

  2. The primary vendor contact must have the sn_vdr_issues role

  3. Issues are always visible in the vendor portal

  4. The Visible in vendor portal field must have a value of true


Answer: D Question: 159

What are the features of Vendor Risk Issues? (Choose two.)


  1. Generate audit tasks for the vendor risk team

  2. Can only be seen by the customerâs vendor risk team

  3. Provide vendor direct access to update and respond to Issues

  4. Can be generated on-demand or automatically due to an incorrect answer


Answer: A,C,D Question: 160

During the Generating Observations phase of the Vendor Risk Assessment, what action might be taken by the Risk Assessor?


  1. Create issues from the assessment if necessary

  2. Update the vendor risk score

  3. Email the vendor

  4. Answer questions the vendor forgot to answer


Answer: A Question: 161

Vendor Risk Tasks are saved to which one of the following tables?


  1. [task]

  2. [planned_task]

  3. [sn_vendor_risk_task]

  4. [sn_vdr_risk_asmt_task]


Answer: C Question: 162

How are Vendor Risk questionnaires and document requests displayed on the Vendor Portal?


  1. As separate requests and can be assigned to different vendor contacts

  2. As separate requests and can only be assigned to the same vendor contact

  3. As a single assessment assigned to a single vendor contact

  4. As a single assessment assigned to a single engagement contact


Answer: A Question: 163

Which of these options can be used in data cleansing when importing vendor data? (Choose three.)


  1. Data Policies

  2. Access Control Lists

  3. Field Normalization Rules

  4. Fix Scripts

  5. Data Import or Data Source Transform

  6. UI Policies


Answer: A,C,D,E Question: 164

What is the definition of âRisk Managementâ?


  1. Policies/Standards/Procedures established to ensure an organization is aligned with corporate strategy and expectations are clearly defined

  2. The process of conforming to standards, policies, and remediation of audit findings

  3. The elimination of vulnerable surface area in an enterprise environment

  4. Process to identify, assess, and respond to risks, threats and vulnerabilities that could compromise the business


Answer: D


Explanation:


Reference: https://www.techtarget.com/searchsecurity/definition/What-is-risk-management-and-why-is-it-important


Question: 165


The Vendor records are stored in which table?


  1. Company [core_company]

  2. Department [cmn_department]

  3. Task [task]

  4. User [sys_user]


Answer: A Question: 166

Which statements most accurately describe assignments to vendor contacts? (Choose two.)


  1. Individual sections in the questionnaire or document request can be assigned

  2. A questionnaire or document request cannot be assigned to multiple vendor contacts

  3. A questionnaire can be read by vendor contacts that are not assigned

  4. A questionnaire can only be completed by assigned vendor contacts


Answer: A,C,D Question: 167

What third-party vendor security evaluation solutions are commonly integrated with VRM out-of-the-box? (Choose two.)


  1. MyScoreMetrics

  2. Vendor Insights

  3. Bitsight

  4. Security Scorecard


Answer: A,C,D Question: 168

For each questionnaire template/assessment metric type, how many vendor risk areas can be designated?


  1. One

  2. As many as desired

  3. None

  4. Two


Answer: A Question: 169

Which functions can be performed in the Vendor Portal? (Choose three.)


  1. Assessment response

  2. Contact Management

  3. Issue remediation

  4. Schedule web meetings

  5. Requests via virtual agent


Answer: A,B,C Question: 170

Where can the score for each Assessment Metric or Metric Category be configured?


  1. Assessment Metric Category record

  2. Assessment Template record

  3. Assessment record

  4. Assessment Metric Type record


Answer: D Question: 171

Roles preceded by sn_vdr_risk are for which scope?


  1. GRC: Vendor Risk Remediation

  2. GRC: Vendor Risk Core

  3. GRC: Risk Management

  4. GRC: Vendor Risk Management


Answer: B Question: 172

Internal roles include: (Choose three.)


  1. Vendor Contact sn_vdr_risk.vendor_contact

  2. Vendor Risk Manager sn_vdr_risk_asmt.vendor_risk_manager

  3. Primary Vendor Contact sn_vdr_risk_asmt.prim_vendor_contact

  4. Vendor Risk Assessor sn_vdr_risk_asmt.vendor_assessor

  5. Vendor Risk Reviewer sn_vdr_risk_asmt.vendor_assessment_reviewer


Answer: A,B,D,E Question: 173

Who is able to change the password for the vendor contact? (Choose two.)


  1. Vendor Contract Relationship Manager

  2. sys_admin

  3. Vendor contact via the Forgot Password link

  4. Vendor Risk Reviewer


Answer: A,B,C Question: 174

Which statement accurately describes the visibility and audit history of actions and communications in the Vendor Risk Management application?


  1. The vendor and assessor interactions are captured in the Vendor Risk Issue record and are only visible from the portal view

  2. The Vendor Risk Issues created and the activity and history are lost from the Vendor Assessment Portal when the associated vendor contact changes

  3. The Vendor Risk Issues created and the activity and history will remain in the Vendor Assessment Portal even when vendor contacts change

  4. The vendor and assessor interactions are captured in the Vendor Risk Issue record and are only visible from the platform view


Answer: C Question: 175

To what type of assessment record can a vendor contact respond?

  1. Vendor tiering assessment

  2. Vendor risk assessment

  3. Customer assessment

  4. External monitoring assessment


Answer: B


Explanation:


Reference: https://www.smartsheet.com/content/vendor-assessment-evaluation


Question: 176


From an Assessment record, the vendor risk assessor can click on âView Responsesâ to see which of the following?


  1. Issue Responses

  2. Email Responses

  3. Task Responses

  4. Assessment Responses


Answer: D Question: 177

Before any changes to the configuration of an application are made, it is recommended that the correct update set and application scope are selected.


What role is required for this functionality?


  1. The Vendor Administrator role is required for this functionality

  2. The Data Administrator role is required for this functionality

  3. The User Administrator role is required for this functionality

  4. The System Administrator role is required for this functionality


Answer: D


Explanation:


Reference: https://www.bmc.com/blogs/sysadmin-role-responsibilities-salary/