Pass the Splunk Cybersecurity Defense Analyst SPLK-5001 Questions and answers with CertsForce

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

A Cyber Threat Intelligence (CTI) team produces a report detailing a specific threat actor’s typical behaviors and intent. This would be an example of what type of intelligence?

Options:

A.

Operational


B.

Executive


C.

Tactical


D.

Strategic


Expert Solution
Questions # 2:

What is the main difference between hypothesis-driven and data-driven Threat Hunting?

Options:

A.

Data-driven hunts always require more data to search through than hypothesis-driven hunts.


B.

Data-driven hunting tries to uncover activity within an existing data set, hypothesis-driven hunting begins with a potential activity that the hunter thinks may be happening.


C.

Hypothesis-driven hunts are typically executed on newly ingested data sources, while data-driven hunts are not.


D.

Hypothesis-driven hunting tries to uncover activity within an existing data set, data-driven hunting begins with an activity that the hunter thinks may be happening.


Expert Solution
Questions # 3:

While testing the dynamic removal of credit card numbers, an analyst lands on using therexcommand. What mode needs to be set to in order to replace the defined values with X?

| makeresults

| eval ccnumber="511388720478619733"

| rex field=ccnumber mode=???"s/(\d{4}-){3)/XXXX-XXXX-XXXX-/g"

Please assume that the aboverexcommand is correctly written.

Options:

A.

sed


B.

replace


C.

mask


D.

substitute


Expert Solution
Questions # 4:

Tactics, Techniques, and Procedures (TTPs) are methods or behaviors utilized by attackers. In which framework are these categorized?

Options:

A.

NIST 800-53


B.

ISO 27000


C.

CIS18


D.

MITRE ATT&CK


Expert Solution
Questions # 5:

An IDS signature is designed to detect and alert on logins to a certain server, but only if they occur from 6:00 PM - 6:00 AM. If no IDS alerts occur in this window, but the signature is known to be correct, this would be an example of what?

Options:

A.

A True Negative.


B.

A True Positive.


C.

A False Negative.


D.

A False Positive.


Expert Solution
Questions # 6:

An analyst is examining the logs for a web application’s login form. They see thousands of failed logon attempts using various usernames and passwords. Internet research indicates that these credentials may have been compiled by combining account information from several recent data breaches.

Which type of attack would this be an example of?

Options:

A.

Credential sniffing


B.

Password cracking


C.

Password spraying


D.

Credential stuffing


Expert Solution
Questions # 7:

The eval SPL expression supports many types of functions. Which of these function categories is not valid with eval?

Options:

A.

JSON functions


B.

Text functions


C.

Comparison and Conditional functions


D.

Threat functions


Expert Solution
Questions # 8:

An analyst is attempting to investigate a Notable Event within Enterprise Security. Through the course of their investigation they determined that the logs and artifacts needed to investigate the alert are not available.

What event disposition should the analyst assign to the Notable Event?

Options:

A.

Benign Positive, since there was no evidence that the event actually occurred.


B.

False Negative, since there are no logs to prove the activity actually occurred.


C.

True Positive, since there are no logs to prove that the event did not occur.


D.

Other, since a security engineer needs to ingest the required logs.


Expert Solution
Questions # 9:

An analyst investigates an IDS alert and confirms suspicious traffic to a known malicious IP. What Enterprise Security data model would they use to investigate which process initiated the network connection?

Options:

A.

Endpoint


B.

Authentication


C.

Network traffic


D.

Web


Expert Solution
Questions # 10:

An analyst is investigating the number of failed login attempts by IP address. Which SPL command can be used to create a temporary table containing the number of failed login attempts by IP address over a specific time period?

Options:

A.

index=security_logs eventtype=failed_login | eval count as failed_attempts by src_ip | sort -failed_attempts


B.

index=security_logs eventtype=failed_login | transaction count as failed_attempts by src_ip | sort -failed_attempts


C.

index=security_logs eventtype=failed_login | stats count as failed_attempts by src_ip | sort -failed_attempts


D.

index=security_logs eventtype=failed_login | sum count as failed_attempts by src_ip | sort -failed_attempts


Expert Solution
Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions