There are several methods in which security incidents can be raised, which broadly fit into one of these categ
There are several methods in which security incidents can be raised, which broadly fit into one of these categories: __________. (Choose two.) A. Integrations B. Manually created C. Automatically created D. Email parsing Reference: https://docs.servicenow.com/bundle/paris-security-management/page/product/security-incident-response/concept/si-creation.html
Which Table would be commonly used for Security Incident Response?
Which Table would be commonly used for Security Incident Response? A. sysapproval_approver B. sec_ops_incident C. cmdb_rel_ci D. sn_si_incident Reference: https://docs.servicenow.com/bundle/quebec-security-management/page/product/security-incident-response/reference/installed-with-sir.html
Select the one capability that retrieves a list of running processes on a CI from a host or endpoint.
Select the one capability that retrieves a list of running processes on a CI from a host or endpoint. A. Get Network Statistics B. Isolate Host C. Get Running Processes D. Publish Watchlist E. Block Action F. Sightings Search Reference: https://docs.servicenow.com/bundle/quebec-security-management/page/product/security-operations-common/concept/get-running-processes-capability.html
What is the fastest way for security incident administrators to remove unwanted widgets from the Security Inci
What is the fastest way for security incident administrators to remove unwanted widgets from the Security Incident Catalog? A. Clicking the X on the top right corner B. Talking to the system administrator C. Can’t be removed D. Through the Catalog Definition record
Which improvement opportunity can be found baseline which can contribute towards process maturity and strength
Which improvement opportunity can be found baseline which can contribute towards process maturity and strengthen costumer’s overall security posture? A. Post-Incident Review B. Fast Eradication C. Incident Containment D. Incident Analysis
What three steps enable you to include a new playbook in the Selected Playbook choice list?
What three steps enable you to include a new playbook in the Selected Playbook choice list? (Choose three.) A. Add the TLP: GREEN tag to the playbooks that you want to include in the Selected Playbook choice list B. Navigate to the sys_hub_flow.list table C. Search for the new playbook you have created using Flow […]
What are two of the audiences identified that will need reports and insight into Security Incident Response re
What are two of the audiences identified that will need reports and insight into Security Incident Response reports? (Choose two.) A. Analysts B. Vulnerability Managers C. Chief Information Security Officer (CISO) D. Problem Managers Reference: https://www.servicenow.com/content/dam/servicenow-assets/public/en-us/doc-type/resource-center/data-sheet/ds-security-operations.pdf
The Risk Score is calculated by combining all the weights using
The Risk Score is calculated by combining all the weights using __________. A. an arithmetic mean B. addition C. the Risk Score script include D. a geometric mean Reference: https://docs.servicenow.com/bundle/paris-security-management/page/product/security-incident-response/reference/setup-assistant-reference.html
The severity field of the security incident is influenced by what?
The severity field of the security incident is influenced by what? A. The cost of the response to the security breach B. The impact, urgency and priority of the incident C. The time taken to resolve the security incident D. The business value of the affected asset
The following term is used to describe any observable occurrence:
The following term is used to describe any observable occurrence: __________. A. Incident B. Log C. Ticket D. Alert E. Event