Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which one of the following users is automatically added to the Request Assessments list?

A.

Any user that adds a worknote to the ticket

B.

The analyst assigned to the ticket

C.

Any user who has Response Tasks on the incident

D.

The Affected User on the incident

The EmailUserReportedPhishing script include processes inbound emails and creates a record in which table?

A.

ar_sn_si_phishing_email

B.

sn_si_incident

C.

sn_si_phishing_email_header

D.

sn_si_phishing_email

What is the first step when creating a security Playbook?

A.

Set the Response Task's state

B.

Create a Flow

C.

Create a Runbook

D.

Create a Knowledge Article

This type of integration workflow helps retrieve a list of active network connections from a host or endpoint, so it can be used to enrich incidents during investigation.

A.

Security Incident Response – Get Running Services

B.

Security Incident Response – Get Network Statistics

C.

Security Operations Integration – Sightings Search

D.

Security Operations Integration – Block Request

The severity field of the security incident is influenced by what?

A.

The cost of the response to the security breach

B.

The impact, urgency and priority of the incident

C.

The time taken to resolve the security incident

D.

The business value of the affected asset

Which Table would be commonly used for Security Incident Response?

A.

sysapproval_approver

B.

sec_ops_incident

C.

cmdb_rel_ci

D.

sn_si_incident

If a desired pre-built integration cannot be found in the platform, what should be your next step to find a certified integration?

A.

Build your own through the REST API Explorer

B.

Ask for assistance in the community page

C.

Download one from ServiceNow Share

D.

Look for one in the ServiceNow Store

The benefits of improved Security Incident Response are expressed.

A.

as desirable outcomes with clear, measurable Key Performance Indicators

B.

differently depending upon 3 stages: Process Improvement, Process Design, and Post Go-Live

C.

as a series of states with consistent, clear metrics

D.

as a value on a scale of 1-10 based on specific outcomes