Free CIS-SIR Sample Questions — Certified Implementation Specialist - Security Incident Response

Free CIS-SIR sample questions for the Certified Implementation Specialist - Security Incident Response exam. No account required: study at your own pace.

Want an interactive quiz? Take the full CIS-SIR practice test

Looking for more? Click here to get the full PDF with 117+ practice questions for $10 for offline study and deeper preparation.

Question 1

What specific role is required in order to use the REST API Explorer?

  • A. admin
  • B. sn_si.admin
  • C. rest_api_explorer
  • D. security_admin
Show Answer
Correct Answer:
C. rest_api_explorer
Question 2

Which of the following tag classifications are provided baseline? (Choose three.)

  • A. Traffic Light Protocol
  • B. Block from Sharing
  • C. IoC Type
  • D. Severity
  • E. Cyber Kill Chain Step
  • F. Escalation Level
  • G. Enrichment whitelist/blacklist
Show Answer
Correct Answer:
  • A. Traffic Light Protocol
  • B. Block from Sharing
  • G. Enrichment whitelist/blacklist
Question 3

Which of the following process definitions allow only single-step progress through the process defined without allowing step skipping?

  • A. SANS Stateful
  • B. NIST Stateful
  • C. SANS Open
  • D. NIST Open
Show Answer
Correct Answer:
B. NIST Stateful
Question 4

When a Post-Incident Review report is created, it can be found...

  • A. as a published article in a knowledge base
  • B. as an unpublished article in a knowledge base
  • C. as an attachment to the original security incident
  • D. as an article pending approval in a knowledge base
Show Answer
Correct Answer:
C. as an attachment to the original security incident
Question 5

Security Incidents can be created using a manual UI Action on which one of the following record types?

  • A. Event
  • B. Email Notification
  • C. Workflow
  • D. Alert
Show Answer
Correct Answer:
D. Alert
Question 6

How does a user modify Risk Scores to suit their organizational needs?

  • A. alter values in the Risk Score Configuration module
  • B. amend constants in the RiskScoreUtil script include
  • C. change the business impact for affected Business Services and Configuration Items
  • D. recode logic in the Risk Score Calculator
Show Answer
Correct Answer:
A. alter values in the Risk Score Configuration module
Question 7

Events within the platform that are utilized for the creation of Alerts and/or Security Incidents are held in which table?

  • A. sir_event
  • B. sysevent
  • C. em_event
  • D. sys_event
Show Answer
Correct Answer:
C. em_event
Question 8

Select all of the following which are key features of Microsoft Defender for Endpoint. (Choose three.)

  • A. Perform host enrichment actions to gather more information about the endpoint, which includes host details, logged-in users, and observable related machines details
  • B. Find indicators of compromise (IoC) and enrich security incidents with threat intelligence data
  • C. Perform Enterprise Security Search to sight potential malicious observables across endpoints, and take remediation actions
  • D. Perform response actions such as Isolate host, Remove isolation, Restrict app execution, Run antivirus scan, Remove app restriction, and Stop and quarantine file
Show Answer
Correct Answer:
  • A. Perform host enrichment actions to gather more information about the endpoint, which includes host details, logged-in users, and observable related machines details
  • B. Find indicators of compromise (IoC) and enrich security incidents with threat intelligence data
  • D. Perform response actions such as Isolate host, Remove isolation, Restrict app execution, Run antivirus scan, Remove app restriction, and Stop and quarantine file
Question 9

What is included in the real-time data model in the right pane of the Flow Designer UI that may be dragged and dropped into fields in the main flow workspace?

  • A. Record Objects
  • B. Table References
  • C. Data Pills
  • D. Code Snippets
Show Answer
Correct Answer:
C. Data Pills
Question 10

Which role must a user have to customize major security incident reports based on the incremental progress since last summary update?

  • A. sn_msi.workspace_admin
  • B. sn_msi.workspace_manager
  • C. sn_msi.workspace_user
  • D. sn_msim.workspace_manager
Show Answer
Correct Answer:
B. sn_msi.workspace_manager
Question 11

Which statement about Security Incident Calculators is correct?

  • A. All Calculator Groups run in order but only the calculator with the highest order in that group runs
  • B. All Calculator Groups run in order but only the first matching calculator from each group will apply
  • C. All Calculator Groups run in order but only the first matching group will apply
  • D. All Calculator Groups run in order and all calculators in the first matching group apply
Show Answer
Correct Answer:
B. All Calculator Groups run in order but only the first matching calculator from each group will apply
Question 12

A Post Incident Review can contain which of the following? (Choose three.)

  • A. Post incident questionnaires
  • B. An audit trail
  • C. Attachments associated with the security incident
  • D. Key incident fields
  • E. Performance Analytics reports
Show Answer
Correct Answer:
  • A. Post incident questionnaires
  • B. An audit trail
  • E. Performance Analytics reports
Question 13

LDAP, Direct Web Service, and SOAP are types of what?

  • A. Integration methods
  • B. Data mapping
  • C. ServiceNow access protocol
  • D. Reporting methods
Show Answer
Correct Answer:
A. Integration methods
Question 14

Why is it important that the Platform (System) Administrator and the Security Incident administrator role be separated? (Choose three.)

  • A. Access to security incident data may need to be restricted
  • B. Allow SIR Teams to control assignment of security roles
  • C. Clear separation of duty
  • D. Reduce the number of incidents assigned to the Platform Admin
  • E. Preserve the security image in the company
Show Answer
Correct Answer:
  • A. Access to security incident data may need to be restricted
  • B. Allow SIR Teams to control assignment of security roles
  • C. Clear separation of duty
Question 15

What is calculated as an arithmetic mean taking into consideration different values in the CI, Security Incident, and User records?

  • A. Priority
  • B. Business Impact
  • C. Severity
  • D. Risk Score
Show Answer
Correct Answer:
D. Risk Score
Question 16

If a desired pre-built integration cannot be found in the platform, what should be your next step to find a certified integration?

  • A. Build your own through the REST API Explorer
  • B. Ask for assistance in the community page
  • C. Download one from ServiceNow Share
  • D. Look for one in the ServiceNow Store
Show Answer
Correct Answer:
D. Look for one in the ServiceNow Store
Question 17

Runbook records utilize a link to what type record for content?

  • A. Knowledge article
  • B. Response Tasks
  • C. Managed Document
  • D. Instruction Details
Show Answer
Correct Answer:
A. Knowledge article
Question 18

Select the one capability that restricts connections from one CI to other devices.

  • A. Isolate Host
  • B. Sightings Search
  • C. Block Action
  • D. Get Running Processes
  • E. Get Network Statistics
  • F. Publish Watchlist
Show Answer
Correct Answer:
A. Isolate Host
Question 19

What is the main goal of the Security Incident Response process?

  • A. Automate set processes
  • B. Reduce time to contain
  • C. Save the company money
  • D. Minimize impact
Show Answer
Correct Answer:
B. Reduce time to contain
Question 20

Flow Logic in the baseline includes: (Choose two.)

  • A. For Each Loops
  • B. Interrupts
  • C. If Then conditions
  • D. Function Calls
  • E. Wait until
Show Answer
Correct Answer:
  • A. For Each Loops
  • C. If Then conditions

Aced these? Get the Full Exam

Download the complete CIS-SIR study bundle with 117+ questions in a single printable PDF.