Question 6 of 113

What are two of the audiences identified that will need reports and insight into Security Incident Response reports? (Choose two.)

    Correct Answer: A, C

    Reports and insights into Security Incident Response are typically required by Analysts, who are directly responsible for handling and understanding security incidents, and the Chief Information Security Officer (CISO), who oversees the organization's overall security posture and ensures compliance with regulatory requirements. Vulnerability Managers and Problem Managers, while important in their respective roles, are not the primary audiences for these specific reports.

Question 7 of 113

What three steps enable you to include a new playbook in the Selected Playbook choice list? (Choose three.)

    Correct Answer: B, C, D

    To include a new playbook in the Selected Playbook choice list, follow these steps: Navigate to the sys_hub_flow.list table, search for the new playbook you have created using Flow Designer, and add the sir_playbook tag to the playbooks that you want to include. These steps ensure that the new playbook is properly identified and included in the selection list.

Question 8 of 113

Which improvement opportunity can be found baseline which can contribute towards process maturity and strengthen costumer’s overall security posture?

    Correct Answer: A

    Post-Incident Review is a critical improvement opportunity that can contribute towards process maturity and strengthen the overall security posture of the customer. During the Post-Incident Review, the events that occurred are analyzed to identify weaknesses and areas for improvement within the process. This enables the organization to learn from past incidents, implement changes to prevent future occurrences, and overall enhance their security infrastructure.

Question 9 of 113

What is the fastest way for security incident administrators to remove unwanted widgets from the Security Incident Catalog?

    Correct Answer: D

    The fastest way for security incident administrators to remove unwanted widgets from the Security Incident Catalog is through the Catalog Definition record. This allows administrators to directly manage and configure the items in the catalog, including the removal of any unwanted widgets.

Question 10 of 113

Select the one capability that retrieves a list of running processes on a CI from a host or endpoint.

    Correct Answer: C

    The capability that retrieves a list of running processes on a CI from a host or endpoint is 'Get Running Processes'. This capability is directly aligned with the requirement of obtaining information about running processes, which is essential for monitoring and managing system health and security.