Visit Official SkillCertPro Website :-
For a full set of 174 questions. Go to
https://skillcertpro.com/product/servicenow-cis-sir-exam-questions/
SkillCertPro offers detailed explanations to each question which helps to understand the concepts better.
It is recommended to score above 85% in SkillCertPro exams before attempting a real exam.
SkillCertPro updates exam questions every 2 weeks.
You will get life time access and life time free updates
SkillCertPro assures 100% pass guarantee in first attempt.
Question 1:
Which one of the following users is automatically added to the Request Assessments list?
A. Any user that adds a worknote to the ticket
B. The analyst assigned to the ticket
C. Any user who has Response Tasks on the incident
D. The Affected User on the incident
Answer: C
Explanation:
The correct answer is C. Any user who has Response Tasks on the incident.
A. Any user that adds a worknote to the ticket: While adding a worknote can indicate involvement, it doesn ‘t automatically adds the user to the Request Assessments list.
B. The analyst assigned to the ticket: The assigned analyst would likely be involved in assessing the request, but not automatically added to the list.
C. Any user who has Response Tasks on the incident: This is the most likely scenario. Users who are assigned tasks related to the incident are directly involved in assessing and addressing the request, making them suitable candidates for inclusion in the Request Assessments list.
D. The Affected User on the incident: The affected user might be involved in the incident but is not necessarily required to assess the request or be included in the Request Assessments list.
Question 2:
What is calculated as an arithmetic mean taking into consideration different values in the CI, Security Incident, and User records?
A. Priority
B. Business Impact
C. Severity
D. Risk Score
Answer: D
Explanation:
The correct answer is D. Risk Score.
Priority: While priority is an important factor in assessing security incidents, it‘s not calculated as an arithmetic mean based on different values in the CI, Security Incident, and User records.
Business Impact: Business impact is another important factor, but it‘s not calculated as an arithmetic mean. It‘s typically assessed based on various criteria, such as the potential financial loss or disruption.
Severity: Severity is another factor that can be considered when assessing security incidents, but it‘s not calculated as an arithmetic mean.
Risk Score: The Risk Score is often calculated as an arithmetic mean by combining different factors from the CI, Security Incident, and User records. This provides a comprehensive assessment of the overall risk associated with the incident.
Question 3:
Which one of the following reasons best describes why roles for Security Incident Response (SIR) begin with sn_si?
A. Because SIR is a scoped application, roles and script includes will begin with the sn_si prefix
B. Because the Security Incident Response application uses a Secure Identity token
C. Because ServiceNow checks the instance for a Secure Identity when logging on to this scoped application
D. Because ServiceNow tracks license use against the Security Incident Response Application
Answer: A
Explanation:
The correct answer is A. Because SIR is a scoped application, roles and script includes will begin with the sn_si prefix.
A. Because SIR is a scoped application, roles and script includes will begin with the sn_si prefix: This is the correct reason. Scoped applications are isolated environments within ServiceNow that have their own unique namespace. This allows for better organization and management of custom applications and their associated components, such as roles and script includes. By using the “sn_si“ prefix, ServiceNow clearly identifies components that belong to the Security Incident Response application, preventing conflicts and ensuring proper isolation.
B. Because the Security Incident Response application uses a Secure Identity token: While security tokens might be used for authentication and authorization within ServiceNow, they don‘t directly determine the naming convention for roles and script includes.
C. Because ServiceNow checks the instance for a Secure Identity when logging on to this scoped application: This statement is partially correct, but it doesn‘t explain why roles and script includes begin with the “sn_si“ prefix. The prefix is primarily due to the scoped nature of the Security Incident Response application.
D. Because ServiceNow tracks license use against the Security Incident Response Application: This might be relevant for license management, but it doesn‘t explain the naming convention for roles and script includes.
Question 4:
Which role must a user have to customize major security incident reports based on the incremental progress since last summary update?
A. sn_msi.workspace_admin
B. sn_msi.workspace_manager
C. sn_msi.workspace_user
D. sn_msim.workspace_manager
Answer: B
Explanation:
The correct answer is B. sn_msi.workspace_manager.
sn_msi.workspace_admin: While this role has administrative privileges over major security incident workspaces, it might not specifically include the ability to customize reports in detail.
sn_msi.workspace_manager: This role provides the necessary permissions to customize major security incident reports, including the ability to configure the display of incremental progress since the last summary update.
sn_msi.workspace_user: This role is primarily for users who need to interact with major security incident workspaces but might not have customization permissions.
sn_msim.workspace_manager: This is an incorrect role, as it doesn‘t exist within the ServiceNow CIS-SIR application.
Question 5:
Select the one capability that retrieves a list of active network connections from a host or endpoint.
A. Sightings Search
B. Block Action
C. Get Running Processes
D. Publish Watchlist
E. Isolate Host
F. Get Network Statistics
Answer: F
Explanation:
The correct answer is F. Get Network Statistics.
A. Sightings Search: This capability is used to search for sightings of specific threats or indicators of compromise, not to retrieve network connection information.
B. Block Action: This capability is used to block specific actions or connections, not to retrieve a list of active connections.
C. Get Running Processes: This capability retrieves information about processes running on a host or endpoint, not network connections.
D. Publish Watchlist: This capability is used to publish a list of known malicious IP addresses or domains, not to retrieve network connection information.
E. Isolate Host: This capability is used to isolate a host from the network, not to retrieve network connection information.
F. Get Network Statistics: This capability retrieves information about network traffic and connections, including a list of active connections.
For a full set of 174 questions. Go to
https://skillcertpro.com/product/servicenow-cis-sir-exam-questions/
SkillCertPro offers detailed explanations to each question which helps to understand the concepts better.
It is recommended to score above 85% in SkillCertPro exams before attempting a real exam.
SkillCertPro updates exam questions every 2 weeks.
You will get life time access and life time free updates
SkillCertPro assures 100% pass guarantee in first attempt.
Question 6:
Security tags can be applied to which of the following record types? (Choose three.)
A. Incidents
B. Problems
C. Indicators and observables
D. Response Tasks
E. Security Incidents
F. Change Orders
Answer: C, D and E
Explanation:
The correct answers are C. Indicators and observables, D. Response Tasks, and E. Security Incidents.
A. Incidents: While incidents can be tagged, they are not specifically mentioned in the context of Security Incident Response (SIR).
B. Problems: Similar to incidents, problems can be tagged, but they are not directly related to SIR.
C. Indicators and observables: These are key elements in security incident response and can be effectively tagged to categorize and organize information.
D. Response Tasks: Tagging response tasks can help categorize and prioritize tasks within a security incident, improving efficiency and organization.
E. Security Incidents: Security incidents are the primary focus of SIR and can be tagged to categorize and track different types of incidents.
F. Change Orders: Change orders are not typically related to security incidents and are not tagged in the same context.
Question 7:
When an inbound email is processed and identified as a phishing email what table is it stored in for URP v2?
A. Security Incident Alert
B. Security Incident Phishing Email
C. Security Incident
D. Incident
Answer: A
Explanation:
The correct answer is A. Security Incident Phishing Email.
Security Incident Alert: This table might be used for alerts related to security incidents, but it‘s not the primary location for storing phishing email data.
Security Incident Phishing Email: This table is specifically designed to store information related to phishing emails that are processed by the User Reported Phishing (URP) v2 functionality. It provides a dedicated space for storing details about the phishing email, such as the sender, recipient, subject, and content.
Security Incident: While security incidents related to phishing might eventually be created, the initial processing of the phishing email would store the information in the dedicated Security Incident Phishing Email table.
Incident: The Incident table is a general-purpose table for tracking various types of incidents, but it‘s not specifically designed for storing phishing email information.
Question 8:
When setting up a Playbook what field in the Flow Action for Creating a Response Task must contain the same value as the Runbook name?
A. Short Description
B. Action
C. Runbook
D. Knowledge article
Answer: A
Explanation:
The correct answer is B. Short Description.
Runbook: This field is typically used to reference a specific runbook or playbook, but it doesn‘t directly determine the value of the Short Description field in the Flow Action for Creating a Response Task.
Short Description: This field is where you would enter the same value as the Runbook name. The Short Description provides a brief overview of the action, and using the Runbook name in this field helps to clearly identify the action‘s purpose and association with the specific playbook.
Action: This field is used to select the specific action to be performed, such as creating a task or sending an email. It doesn‘t directly correlate with the Runbook name.
Knowledge article: This field is used to reference a knowledge article associated with the action, but it doesn‘t need to match the Runbook name.
Question 9:
Runbook records utilize a link to what type record for content?
A. Knowledge article
B. Response Tasks
C. Managed Document
D. Instruction Details
Answer: A
Explanation:
The correct answer is A. Knowledge article.
Knowledge article: Runbook records typically link to knowledge articles to provide detailed instructions, procedures, or information related to the runbook‘s purpose. This ensures that the content is easily accessible and can be updated as needed.
Response Tasks: Response tasks are used to define specific actions to be taken within a runbook, but they don‘t contain the actual content or instructions.
Managed Document: While managed documents can be used for storing content, they are not specifically designed for providing instructions or procedures within runbooks.
Instruction Details: This term is not directly related to runbooks or knowledge articles in the context of ServiceNow.
Question 10:
For Customers who don‘t use 3rd-party systems, what ways can security incidents be created? (Choose three.)
A. Security Service Catalog
B. Security Incident Form
C. Inbound Email Parsing Rules
D. Leveraging an Integration
E. Alert Management
Answer: A, B and C
Explanation:
The correct answers are A. Security Service Catalog, B. Security Incident Form, and C. Inbound Email Parsing Rules.
A. Security Service Catalog: Customers can use the Security Service Catalog to submit requests for security incidents, which can then be converted into actual security incident records.
B. Security Incident Form: This is a direct and straightforward way for users to create new security incident records by filling out a form with relevant information.
C. Inbound Email Parsing Rules: Organizations can configure rules to automatically parse incoming emails and create security incident records based on specific criteria, such as keywords or patterns.
D. Leveraging an Integration: While integrations can be used to create security incidents from external systems, this option is specifically asking about methods for customers who don‘t use third-party systems.
E. Alert Management: Alert management is typically used to monitor for potential security threats and raise alerts, but it doesn ‘t directly creates security incident records.
For a full set of 174 questions. Go to
https://skillcertpro.com/product/servicenow-cis-sir-exam-questions/
SkillCertPro offers detailed explanations to each question which helps to understand the concepts better.
It is recommended to score above 85% in SkillCertPro exams before attempting a real exam.
SkillCertPro updates exam questions every 2 weeks.
You will get life time access and life time free updates
SkillCertPro assures 100% pass guarantee in first attempt.