Q1. Knowledge articles that describe steps an analyst needs to follow to complete Security incident tasks might be associated to those tasks through which of the following?
A.Work Instruction Playbook
B. Flow
C. Workflow
D. Runbook
E. Flow Designer
Correct Answer: D
Q2. What is the name of the Inbound Action that validates whether an inbound email should be processed as a phishing email for URP v2?
A.User Reporting Phishing (for Forwarded emails)
B. Scan email for threats
C. User Reporting Phishing (for New emails)
D. Create Phishing Email
Correct Answer: A
Q3. What is the key to a successful implementation?
A.Sell customer the most expensive package
B. Implementing everything that we offer
C. Understanding the customer's goals and objectives
D. Building custom integrations
Correct Answer: C
Q4. A pre-planned response process contains which sequence of events?
A.Organize, Analyze, Prioritize, Contain
B. Organize, Detect, Prioritize, Contain
C. Organize, Prepare, Prioritize, Contain
D. Organize, Verify, Prioritize, Contain
Correct Answer: A
Q5. What specific role is required in order to use the REST API Explorer?
A.admin
B. sn_si.admin
C. rest_api_explorer
D. security_admin
Correct Answer: A, C
$ 39
Reviews
There are no reviews yet.