ServiceNow CIS-VRM Certified Implementation Specialist -Vendor Risk Management Online Training
ServiceNow CIS-VRM Online Training
The questions for CIS-VRM were last updated at Nov 19,2024.
- Exam Code: CIS-VRM
- Exam Name: Certified Implementation Specialist -Vendor Risk Management
- Certification Provider: ServiceNow
- Latest update: Nov 19,2024
Which of these must be true in order for a vendor risk issue to be visible in the Vendor Portal?
- A . There must be at least one secondary contact for the vendor
- B . The primary vendor contact must have the sn_vdr_issues role
- C . Issues are always visible in the vendor portal
- D . The Visible in vendor portal field must have a value of true
What are the features of Vendor Risk Issues? (Choose two.)
- A . Generate audit tasks for the vendor risk team
- B . Can only be seen by the customer’s vendor risk team
- C . Provide vendor direct access to update and respond to Issues
- D . Can be generated on-demand or automatically due to an incorrect answer
During the Generating Observations phase of the Vendor Risk Assessment, what action might be taken by the Risk Assessor?
- A . Create issues from the assessment if necessary
- B . Update the vendor risk score
- C . Email the vendor
- D . Answer questions the vendor forgot to answer
Vendor Risk Tasks are saved to which one of the following tables?
- A . [task]
- B . [planned_task]
- C . [sn_vendor_risk_task]
- D . [sn_vdr_risk_asmt_task]
How are Vendor Risk questionnaires and document requests displayed on the Vendor Portal?
- A . As separate requests and can be assigned to different vendor contacts
- B . As separate requests and can only be assigned to the same vendor contact
- C . As a single assessment assigned to a single vendor contact
- D . As a single assessment assigned to a single engagement contact
Which of these options can be used in data cleansing when importing vendor data? (Choose three.)
- A . Data Policies
- B . Access Control Lists
- C . Field Normalization Rules
- D . Fix Scripts
- E . Data Import or Data Source Transform
- F . UI Policies
What is the definition of ‘Risk Management’?
- A . Policies/Standards/Procedures established to ensure an organization is aligned with corporate strategy and expectations are clearly defined
- B . The process of conforming to standards, policies, and remediation of audit findings
- C . The elimination of vulnerable surface area in an enterprise environment
- D . Process to identify, assess, and respond to risks, threats and vulnerabilities that could compromise the business
The Vendor records are stored in which table?
- A . Company [core_company]
- B . Department [cmn_department]
- C . Task [task]
- D . User [sys_user]
Which statements most accurately describe assignments to vendor contacts? (Choose two.)
- A . Individual sections in the questionnaire or document request can be assigned
- B . A questionnaire or document request cannot be assigned to multiple vendor contacts
- C . A questionnaire can be read by vendor contacts that are not assigned
- D . A questionnaire can only be completed by assigned vendor contacts
What third-party vendor security evaluation solutions are commonly integrated with VRM out-of-the-box? (Choose two.)
- A . MyScoreMetrics
- B . Vendor Insights
- C . Bitsight
- D . Security Scorecard