Pass the Splunk Splunk Enterprise Security Certified Admin SPLK-3001 Questions and answers with CertsForce

Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions
Questions # 11:

The Add-On Builder creates Splunk Apps that start with what?

Options:

A.

DA-


B.

SA-


C.

TA-


D.

App-


Expert Solution
Questions # 12:

Which setting is used in indexes.conf to specify alternate locations for accelerated storage?

Options:

A.

thawedPath


B.

tstatsHomePath


C.

summaryHomePath


D.

warmToColdScript


Expert Solution
Questions # 13:

Both “Recommended Actions” and “Adaptive Response Actions” use adaptive response. How do they differ?

Options:

A.

Recommended Actions show a textual description to an analyst, Adaptive Response Actions show them encoded.


B.

Recommended Actions show a list of Adaptive Responses to an analyst, Adaptive Response Actions run them automatically.


C.

Recommended Actions show a list of Adaptive Responses that have already been run, Adaptive Response Actions run them automatically.


D.

Recommended Actions show a list of Adaptive Responses to an analyst, Adaptive Response Actions run manually with analyst intervention.


Expert Solution
Questions # 14:

A site has a single existing search head which hosts a mix of both CIM and non-CIM compliant applications. All of the applications are mission-critical. The customer wants to carefully control cost, but wants good ES performance. What is the best practice for installing ES?

Options:

A.

Install ES on the existing search head.


B.

Add a new search head and install ES on it.


C.

Increase the number of CPUs and amount of memory on the search head, then install ES.


D.

Delete the non-CIM-compliant apps from the search head, then install ES.


Expert Solution
Questions # 15:

Which of the following features can the Add-on Builder configure in a new add-on?

Options:

A.

Expire data.


B.

Normalize data.


C.

Summarize data.


D.

Translate data.


Expert Solution
Questions # 16:

What do threat gen searches produce?

Options:

A.

Threat Intel in KV Store collections.


B.

Threat correlation searches.


C.

Threat notables in the notable index.


D.

Events in the threat activity index.


Expert Solution
Questions # 17:

Which of the following is a recommended pre-installation step?

Options:

A.

Disable the default search app.


B.

Configure search head forwarding.


C.

Download the latest version of KV Store from MongoDBxom.


D.

Install the latest Python distribution on the search head.


Expert Solution
Questions # 18:

To observe what network services are in use in a network’s activity overall, which of the following dashboards in Enterprise Security will contain the most relevant data?

Options:

A.

Intrusion Center


B.

Protocol Analysis


C.

User Intelligence


D.

Threat Intelligence


Expert Solution
Questions # 19:

What tools does the Risk Analysis dashboard provide?

Options:

A.

High risk threats.


B.

Notable event domains displayed by risk score.


C.

A display of the highest risk assets and identities.


D.

Key indicators showing the highest probability correlation searches in the environment.


Expert Solution
Questions # 20:

Analysts have requested the ability to capture and analyze network traffic data. The administrator has researched the documentation and, based on this research, has decided to integrate the Splunk App for Stream with ES.

Which dashboards will now be supported so analysts can view and analyze network Stream data?

Options:

A.

Endpoint dashboards.


B.

User Intelligence dashboards.


C.

Protocol Intelligence dashboards.


D.

Web Intelligence dashboards.


Expert Solution
Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions