Loading questions...
Updated
Actions packaged in Scoped applications are called:
When testing a flow, the action outcomes can be found where?
Flow Logic in the baseline includes: (Choose two.)
What contains a set of reusable operations that are designed to be used in multiple playbooks?
What automates processes and supports triggers with a sequence of reusable actions?
Once a Phishing Email record is created, which Flow creates a new Security Incident record?
When an inbound email is processed and identified as a phishing email what table is it stored in for URP v2?
In order to use User Reported Phishing v2, what must occur in Flow Designer?
When setting up a Playbook what field in the Flow Action for Creating a Response Task must contain the same value as the Runbook name?
Which Table would be commonly used for Security Incident Response?
Runbook records utilize a link to what type record for content?
In a Flow, if the Create Response Task set Incident state V1 action is selected, what field contains the yes_no value that drives a question being asked in the playbook?
Runbooks are used to create a relationship between what components? (Choose two.)
What is included in the real-time data model in the right pane of the Flow Designer UI that may be dragged and dropped into fields in the main flow workspace?
What kind of rules can be used to configure how email phishing incidents are processed? (Choose two.)
Which role must a user have to customize major security incident reports based on the incremental progress since last summary update?
Risk Score weighting uses which of the following components? (Choose two.)
Who is responsible for identifying security incidents?
Select all of the following which are key features of the Malware Information Sharing Platform (Choose three.)
Select all of the following which are the target personas for MITRE ATT&CK 2.0? (Choose three.)
There are several methods in which security incidents can be raised, which broadly fit into one of these categories: __________. (Choose two.)
How does a user modify Risk Scores to suit their organizational needs?
Create a free account to unlock all questions for this exam.
Log In / Sign UpWhat makes a playbook appear for a Security Incident if using Flow Designer?
Select the one capability that retrieves a list of running processes on a CI from a host or endpoint.