New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Splunk Splunk Enterprise Security Certified Admin SPLK-3001 Questions and answers with CertsForce

Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
Questions # 1:

Which of the following is a risk of using the Auto Deployment feature of Distributed Configuration Management to distribute indexes.conf?

Options:

A.

Indexes might crash.


B.

Indexes might be processing.


C.

Indexes might not be reachable.


D.

Indexes have different settings.


Expert Solution
Questions # 2:

Where are attachments to investigations stored?

Options:

A.

KV Store


B.

notable index


C.

attachments.csv lookup


D.

/etc/apps/SA-Investigations/default/ui/views/attachments


Expert Solution
Questions # 3:

To which of the following should the ES application be uploaded?

Options:

A.

The indexer.


B.

The KV Store.


C.

The search head.


D.

The dedicated forwarder.


Expert Solution
Questions # 4:

What role should be assigned to a security team member who will be taking ownership of notable events in the incident review dashboard?

Options:

A.

ess_user


B.

ess_admin


C.

ess_analyst


D.

ess_reviewer


Expert Solution
Questions # 5:

Which indexes are searched by default for CIM data models?

Options:

A.

notable and default


B.

summary and notable


C.

_internal and summary


D.

All indexes


Expert Solution
Questions # 6:

What are the steps to add a new column to the Notable Event table in the Incident Review dashboard?

Options:

A.

Configure -> Incident Management -> Notable Event Statuses


B.

Configure -> Content Management -> Type: Correlation Search


C.

Configure -> Incident Management -> Incident Review Settings -> Event Management


D.

Configure -> Incident Management -> Incident Review Settings -> Table Attributes


Expert Solution
Questions # 7:

Which of the following are examples of sources for events in the endpoint security domain dashboards?

Options:

A.

REST API invocations.


B.

Investigation final results status.


C.

Workstations, notebooks, and point-of-sale systems.


D.

Lifecycle auditing of incidents, from assignment to resolution.


Expert Solution
Questions # 8:

Which of the following ES features would a security analyst use while investigating a network anomaly notable?

Options:

A.

Correlation editor.


B.

Key indicator search.


C.

Threat download dashboard.


D.

Protocol intelligence dashboard.


Expert Solution
Questions # 9:

What are adaptive responses triggered by?

Options:

A.

By correlation searches and users on the incident review dashboard.


B.

By correlation searches and custom tech add-ons.


C.

By correlation searches and users on the threat analysis dashboard.


D.

By custom tech add-ons and users on the risk analysis dashboard.


Expert Solution
Questions # 10:

Who can delete an investigation?

Options:

A.

ess_admin users only.


B.

The investigation owner only.


C.

The investigation owner and ess-admin.


D.

The investigation owner and collaborators.


Expert Solution
Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions