What is the best way to develop a complete list of Vulnerability Reports?
Answer : B
The three levels of users you will likely encounter that will need access to data displayed in the Vulnerability Response dashboard are: Choose 3 answers
Answer : A
What type of data would the CIO/CISO want on the dashboard?
Answer : A
To get useful reporting regarding the most vulnerable CI's, which statement applies?
Answer : B
Managers should have access to which role-based data access and visualizations? Choose 3 answers
Answer : D
What role Is required to view the Vulnerability Overview Dashboard?
Answer : A
To ensure that Vulnerabilities are processed correctly, you can define a Service Level Agreement (SLA) for Vulnerability Response. To achieve this you would:
Answer : B