What field is used to distinguish Security events from other IT events?
Answer : C
Knowledge articles that describe steps an analyst needs to follow to complete Security incident tasks might be associated to those tasks through which of the following?
Answer : D
What does a flow require?
Answer : D
For Customers who don't use 3rd-party systems, what ways can security incidents be created? (Choose three.)
Answer : A, B, C
Which one of the following users is automatically added to the Request Assessments list?
Answer : C
Which Table would be commonly used for Security Incident Response?
Answer : D
Select the one capability that retrieves a list of running processes on a CI from a host or endpoint.
Answer : C