لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
What is the name of the Inbound Action that validates whether an inbound email should be processed as a phishing email for URP v2?
A. User Reporting Phishing (for Forwarded emails)
B. Scan email for threats
C. User Reporting Phishing (for New emails)
D. Create Phishing Email
عرض الإجابة
اجابة صحيحة: A
السؤال #2
This type of integration workflow helps retrieve a list of active network connections from a host or endpoint, so it can be used to enrich incidents during investigation.
A. ecurity Incident Response – Get Running Services
B. ecurity Incident Response – Get Network Statistics
C. ecurity Operations Integration – Sightings Search
D. ecurity Operations Integration – Block Request
عرض الإجابة
اجابة صحيحة: B
السؤال #3
What makes a playbook appear for a Security Incident if using Flow Designer?
A. Actions defined to create tasks
B. Trigger set to conditions that match the security incident
C. Runbook property set to true
D. Service Criticality set to High
عرض الإجابة
اجابة صحيحة: B
السؤال #4
What makes a playbook appear for a Security Incident if using Flow Designer?
A. Actions defined to create tasks
B. Trigger set to conditions that match the security incident
C. Runbook property set to true
D. Service Criticality set to High
عرض الإجابة
اجابة صحيحة: B
السؤال #5
The severity field of the security incident is influenced by what?
A. The time taken to resolve the security incident
B. The cost of the response to the security breach
C. The business value of the affected asset
D. The impact, urgency and priority of the incident
عرض الإجابة
اجابة صحيحة: C
السؤال #6
If a desired pre-built integration cannot be found in the platform, what should be your next step to find a certified integration?
A. uild your own through the REST API Explorer
B. sk for assistance in the community page
C. ownload one from ServiceNow Share
D. ook for one in the ServiceNow Store
عرض الإجابة
اجابة صحيحة: D
السؤال #7
What role(s) are required to add new items to the Security Incident Catalog?
A. requires the sn_si
B. requires the sn_si
C. requires both sn_si
D. requires the admin role
عرض الإجابة
اجابة صحيحة: D
السؤال #8
The Risk Score is calculated by combining all the weights using .
A. Aan arithmetic mean
B. Baddition
C. Cthe Risk Score script include
D. Da geometric mean
عرض الإجابة
اجابة صحيحة: A
السؤال #9
Joe is on the SIR Team and needs to be able to configure Territories and Skills. What role does he need?
A. ecurity Basic
B. anager
C. ecurity Analyst
D. ecurity Admin
عرض الإجابة
اجابة صحيحة: D
السؤال #10
Security tag used when a piece of information requires support to be effectively acted upon, yet carries risks to privacy, reputation, or operations if shared outside of the organizations involved.
A. TLP: GREENcorrect
B. TLP: AMBERcorrect
C. TLP: RED
D. TLP: WHITEcorrect
عرض الإجابة
اجابة صحيحة: ABD
السؤال #11
What is calculated as an arithmetic mean taking into consideration different values in the CI, Security Incident, and User records?
A. riority
B. usiness Impact
C. everity
D. isk Score
عرض الإجابة
اجابة صحيحة: B
السؤال #12
Which one of the following users is automatically added to the Request Assessments list?
A. AAny user that adds a worknote to the ticket
B. BThe analyst assigned to the ticket
C. CAny user who has Response Tasks on the incident
D. DThe Affected User on the incident
عرض الإجابة
اجابة صحيحة: C
السؤال #13
If a desired pre-built integration cannot be found in the platform, what should be your next step to find a certified integration?
A. Build your own through the REST API Explorer
B. Ask for assistance in the community page
C. Download one from ServiceNow Share
D. Look for one in the ServiceNow Store
عرض الإجابة
اجابة صحيحة: D
السؤال #14
What is the key to a successful implementation?
A. Sell customer the most expensive package
B. Implementing everything that we offer
C. Understanding the customer's goals and objectives
D. Building custom integrations
عرض الإجابة
اجابة صحيحة: C
السؤال #15
The Risk Score is calculated by combining all the weights using .
A. an arithmetic mean
B. addition
C. the Risk Score script include
D. a geometric mean
عرض الإجابة
اجابة صحيحة: A
السؤال #16
The following term is used to describe any observable occurrence: _____________.
A. Incident
B. Log
C. Ticket
D. Alert
E. Event
عرض الإجابة
اجابة صحيحة: E
السؤال #17
Which of the following are potential benefits for utilizing Security Incident assignment automation? (Choose two.)
A. Decreased Time to Containment
B. Increased Mean Time to Remediationcorrect
C. Decreased Time to Ingestion
D. Increased resolution process consistencycorrect
عرض الإجابة
اجابة صحيحة: BD
السؤال #18
The severity field of the security incident is influenced by what?
A. The cost of the response to the security breach
B. The impact, urgency and priority of the incident
C. The time taken to resolve the security incident
D. The business value of the affected asset
عرض الإجابة
اجابة صحيحة: D
السؤال #19
Which Table would be commonly used for Security Incident Response?
A. sysapproval_approver
B. sec_ops_incident
C. cmdb_rel_ci
D. sn_si_incident
عرض الإجابة
اجابة صحيحة: D
السؤال #20
Using the KB articles for Playbooks tasks also gives you which of these advantages?
A. Automated activities to run scans and enrich Security Incidents with real time data
B. Automated activities to resolve security Incidents through patching
C. Improved visibility to threats and vulnerabilitiescorrect
D. Enhanced ability to create and present concise, descriptive tasks
عرض الإجابة
اجابة صحيحة: C
السؤال #21
The benefits of improved Security Incident Response are expressed.
A. as desirable outcomes with clear, measurable Key Performance Indicators
B. differently depending upon 3 stages: Process Improvement, Process Design, and Post Go-Live
C. as a series of states with consistent, clear metricscorrect
D. as a value on a scale of 1-10 based on specific outcomes
عرض الإجابة
اجابة صحيحة: C
السؤال #22
In order to see the Actions in Flow Designer for Security Incident, what plugin must be activated?
A. erformance Analytics for Security Incident Response
B. ecurity Spoke
C. ecurity Operations Spoke
D. ecurity Incident Spoke
عرض الإجابة
اجابة صحيحة: C
السؤال #23
The following term is used to describe any observable occurrence: .
A. Incident
B. Log
C. Ticket
D. Alert
E. Event
عرض الإجابة
اجابة صحيحة: E
السؤال #24
When a record is created in the Security Incident Phishing Email table what is triggered to create a Security Incident?
A. Transform workflow
B. Ingestion Rule
C. Duplication Rule
D. Transform flow
عرض الإجابة
اجابة صحيحة: B
السؤال #25
What are some of the recommended duties each SIR team should have?
A. Coaching
B. Monitoring activities
C. Testing
D. All of the above
عرض الإجابة
اجابة صحيحة: D
السؤال #26
There are several methods in which security incidents can be raised, which broadly fit into one of these categories: . (Choose two.)
A. AIntegrations
B. BManually created
C. CAutomatically created
D. DEmail parsing
عرض الإجابة
اجابة صحيحة: BC
السؤال #27
What three steps enable you to include a new playbook in the Selected Playbook choice list? (Choose three.)
A. AAdd the TLP: GREEN tag to the playbooks that you want to include in the Selected Playbook choice list
B. BNavigate to the sys_hub_flow
C. CSearch for the new playbook you have created using Flow Designer
D. DAdd the sir_playbook tag to the playbooks that you want to include in the Selected Playbook choice list
E. ENavigate to the sys_playbook_flow
عرض الإجابة
اجابة صحيحة: BCD
السؤال #28
The severity field of the security incident is influenced by what?
A. The cost of the response to the security breach
B. The impact, urgency and priority of the incident
C. The time taken to resolve the security incident
D. The business value of the affected asset
عرض الإجابة
اجابة صحيحة: D
السؤال #29
What roles are required to modify Security Incident Catalog items?
A. sn_si
B. (platform) admin and sn_si
C. (platform) admin and sn_si
D. sn_si
عرض الإجابة
اجابة صحيحة: C
السؤال #30
Incident severity is influenced by the business value of the affected asset. Which of the following are asset types that can be affected by an incident? (Choose two.)
A. usiness Service
B. onfiguration Item
C. alculator Group
D. everity Calculator
عرض الإجابة
اجابة صحيحة: AB

View The Updated ServiceNow Exam Questions

SPOTO Provides 100% Real ServiceNow Exam Questions for You to Pass Your ServiceNow Exam!

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: