لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
What is the purpose of Calculator Groups as opposed to Calculators?
A. ATo provide metadata about the calculators
B. BTo allow the agent to select which calculator they want to execute
C. CTo set the condition for all calculators to run
D. DTo ensure one at maximum will run per group
عرض الإجابة
اجابة صحيحة: C
السؤال #2
The creation of custom process definitions would require which of the following platform components? (Choose two.)
A. Client-Side Script
B. Process Definition record
C. Business Rule
D. Script Include
عرض الإجابة
اجابة صحيحة: BC
السؤال #3
What is the first step when creating a security Playbook?
A. Create a Flow
B. Create a Runbook
C. Create a Knowledge Article
D. Set the Response Task's state
عرض الإجابة
اجابة صحيحة: A
السؤال #4
There are several methods in which security incidents can be raised, which broadly fit into one of these categories:. (Choose two.)
A. Integrationscorrect
B. Manually createdcorrect
C. Automatically created
D. Email parsing
عرض الإجابة
اجابة صحيحة: AB
السؤال #5
Why should discussions focus with the end in mind?
A. o understand desired outcomes
B. o understand current posture
C. o understand customer’s process
D. o understand required tools
عرض الإجابة
اجابة صحيحة: A
السؤال #6
Knowledge articles that describe steps an analyst needs to follow to complete Security incident tasks might be associated to those tasks through which of the following?
A. Work Instruction Playbookcorrect
B. Flow
C. Workflow
D. Runbookcorrect
E. Flow Designercorrect
عرض الإجابة
اجابة صحيحة: ADE
السؤال #7
When the Security Phishing Email record is created what types of observables are stored in the record? (Choose three.)
A. URLs, domains, or IP addresses appearing in the bodycorrect
B. Who reported the phishing attempt
C. State of the phishing email
D. IP addresses from the headercorrect
E. Hashes and/or file names found in the EML attachment
F. Type of Ingestion Rule used to identify this email as a phishing attempt
عرض الإجابة
اجابة صحيحة: AD
السؤال #8
The Risk Score is calculated by combining all the weights using __________.
A. an arithmetic mean
B. addition
C. the Risk Score script include
D. a geometric mean
عرض الإجابة
اجابة صحيحة: A
السؤال #9
The EmailUserReportedPhishing script include processes inbound emails and creates a record in which table?
A. ar_sn_si_phishing_emailcorrect
B. sn_si_incident
C. sn_si_phishing_email_header
D. sn_si_phishing_email
عرض الإجابة
اجابة صحيحة: A
السؤال #10
What does a flow require?
A. Security orchestration flows
B. Runbooks
C. CAB orders
D. A triggercorrect
عرض الإجابة
اجابة صحيحة: D
السؤال #11
What is the name of the Inbound Action that validates whether an inbound email should be processed as a phishing email for URP v2?
A. ser Reporting Phishing (for Forwarded emails)
B. can email for threats
C. ser Reporting Phishing (for New emails)
D. reate Phishing Email
عرض الإجابة
اجابة صحيحة: A
السؤال #12
What is the purpose of Calculator Groups as opposed to Calculators?
A. To provide metadata about the calculators
B. To allow the agent to select which calculator they want to execute
C. To set the condition for all calculators to run
D. To ensure one at maximum will run per group
عرض الإجابة
اجابة صحيحة: D
السؤال #13
The severity field of the security incident is influenced by what?
A. The cost of the response to the security breach
B. The impact, urgency and priority of the incident
C. The time taken to resolve the security incident
D. The business value of the affected asset
عرض الإجابة
اجابة صحيحة: D
السؤال #14
Which of the following fields is used to identify an Event that is to be used for Security purposes?
A. ITcorrect
B. Classificationcorrect
C. Security
D. CI
عرض الإجابة
اجابة صحيحة: AB
السؤال #15
What is the purpose of Calculator Groups as opposed to Calculators?
A. To provide metadata about the calculators
B. To allow the agent to select which calculator they want to execute
C. To set the condition for all calculators to run
D. To ensure one at maximum will run per group
عرض الإجابة
اجابة صحيحة: C
السؤال #16
A flow consists of one or more actions and a what?
A. AChange formatter
B. BCatalog Designer
C. CNIST Ready State
D. DTrigger
عرض الإجابة
اجابة صحيحة: D
السؤال #17
Which Table would be commonly used for Security Incident Response?
A. sysapproval_approvercorrect
B. sec_ops_incident
C. cmdb_rel_ci
D. sn_si_incidentcorrect
عرض الإجابة
اجابة صحيحة: AD
السؤال #18
Which of the following State Flows are provided for Security Incidents? (Choose three.)
A. IST Open
B. ANS Open
C. IST Stateful
D. ANS Stateful
عرض الإجابة
اجابة صحيحة: ACD
السؤال #19
Chief factors when configuring auto-assignment of Security Incidents are.
A. Agent group membership, Agent location and time zonecorrect
B. Security incident priority, CI Location and agent time zone
C. Agent skills, System Schedules and agent locationcorrect
D. Agent location, Agent skills and agent time zonecorrect
عرض الإجابة
اجابة صحيحة: ACD
السؤال #20
What makes a playbook appear for a Security Incident if using Flow Designer?
A. Actions defined to create tasks
B. Trigger set to conditions that match the security incident
C. Runbook property set to true
D. Service Criticality set to High
عرض الإجابة
اجابة صحيحة: B
السؤال #21
Knowledge articles that describe steps an analyst needs to follow to complete Security incident tasks might be associated to those tasks through which of the following?
A. Work Instruction Playbook
B. Flow
C. Workflow
D. Runbook
E. Flow Designer
عرض الإجابة
اجابة صحيحة: D
السؤال #22
What is the key to a successful implementation?
A. Sell customer the most expensive package
B. Implementing everything that we offer
C. Understanding the customer’s goals and objectivescorrect
D. Building custom integrations
عرض الإجابة
اجابة صحيحة: C
السؤال #23
Which ServiceNow automation capability extends Flow Designer to integrate business processes with other systems?
A. orkflow
B. rchestration
C. ubflows
D. ntegration Hub
عرض الإجابة
اجابة صحيحة: D
السؤال #24
When a record is created in the Security Incident Phishing Email table what is triggered to create a Security Incident?
A. ngestion Rule
B. ransform flow
C. ransform workflow
D. uplication Rule
عرض الإجابة
اجابة صحيحة: A
السؤال #25
When the Security Phishing Email record is created what types of observables are stored in the record? (Choose three.)
A. Type of Ingestion Rule used to identify this email as a phishing attempt
B. IP addresses from the header
C. URLs, domains, or IP addresses appearing in the body
D. State of the phishing email
E. Hashes and/or file names found in the EML attachment
F. Who reported the phishing attempt
عرض الإجابة
اجابة صحيحة: BCE
السؤال #26
When a Post-Incident Review report is created, it can be found
A. as a published article in a knowledge base
B. as an unpublished article in a knowledge base
C. as an attachment to the original security incident
D. as an article pending approval in a knowledge base
عرض الإجابة
اجابة صحيحة: C
السؤال #27
What is the purpose of Calculator Groups as opposed to Calculators?
A. To provide metadata about the calculators
B. To allow the agent to select which calculator they want to execute
C. To set the condition for all calculators to run
D. To ensure one at maximum will run per group
عرض الإجابة
اجابة صحيحة: C
السؤال #28
What role(s) are required to add new items to the Security Incident Catalog?
A. equires the sn_si
B. equires the sn_si
C. equires both sn_si
D. equires the admin role
عرض الإجابة
اجابة صحيحة: D
السؤال #29
What specific role is required in order to use the REST API Explorer?
A. admincorrect
B. sn_si
C. rest_api_explorer
D. security_admin
عرض الإجابة
اجابة صحيحة: A
السؤال #30
What is the name of the Inbound Action that validates whether an inbound email should be processed as a phishing email for URP v2?
A. AUser Reporting Phishing (for Forwarded emails)
B. BScan email for threats
C. CUser Reporting Phishing (for New emails)
D. DCreate Phishing Email
عرض الإجابة
اجابة صحيحة: A

View The Updated ServiceNow Exam Questions

SPOTO Provides 100% Real ServiceNow Exam Questions for You to Pass Your ServiceNow Exam!

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: