Which Table would be commonly used for Security Incident Response?
D
Reference: https://docs.servicenow.com/bundle/quebec-security-management/page/product/security-incident-response/reference/installed-with-sir.html
There are several methods in which security incidents can be raised, which broadly fit into one of
these categories:
. (Choose two.)
BC
Reference: https://docs.servicenow.com/bundle/paris-security-management/page/product/security-incident-response/concept/si-creation.html
What is the first step when creating a security Playbook?
B
To configure Security Incident Escalations, you need the following role(s):
.
A
Reference: https://docs.servicenow.com/bundle/paris-security-management/page/product/security-incident-response/task/escalate-security-incident.html
Which of the following are potential benefits for utilizing Security Incident assignment automation?
(Choose two.)
BD
What is the key to a successful implementation?
C
A flow consists of one or more actions and a what?
D
Reference: https://docs.servicenow.com/bundle/quebec-servicenow-platform/page/administer/flow-designer/concept/flows.html
Flow Triggers can be based on what? (Choose three.)
ABC
Which one of the following users is automatically added to the Request Assessments list?
C
For Customers who don't use 3rd-party systems, what ways can security incidents be created?
(Choose three.)
ABC