Pass the Splunk Cybersecurity Defense Analyst SPLK-5001 Questions and answers with CertsForce

Viewing page 3 out of 3 pages
Viewing questions 21-30 out of questions
Questions # 21:

An analyst learns that several types of data are being ingested into Splunk and Enterprise Security, and wants to use the metadata SPL command to list them in a search. Which of the following arguments should she use?

Options:

A.

metadata type=cdn


B.

metadata type=sourcetypes


C.

metadata type=assets


D.

metadata type=hosts


Expert Solution
Questions # 22:

According to David Bianco's Pyramid of Pain, which indicator type is least effective when used in continuous monitoring?

Options:

A.

Domain names


B.

TTPs


C.

NetworM-lost artifacts


D.

Hash values


Expert Solution
Questions # 23:

An analyst is investigating the number of failed login attempts by IP address. Which SPL command can be used to create a temporary table containing the number of failed login attempts by IP address over a specific time period?

Options:

A.

index=security_logs eventtype=failed_login | eval count as failed_attempts by src_ip | sort -failed_attempts


B.

index=security_logs eventtype=failed_login | transaction count as failed_attempts by src_ip | sort -failed_attempts


C.

index=security_logs eventtype=failed_login | stats count as failed_attempts by src_ip | sort -failed_attempts


D.

index=security_logs eventtype=failed_login | sum count as failed_attempts by src_ip | sort -failed_attempts


Expert Solution
Questions # 24:

An analyst investigates an IDS alert and confirms suspicious traffic to a known malicious IP. What Enterprise Security data model would they use to investigate which process initiated the network connection?

Options:

A.

Endpoint


B.

Authentication


C.

Network traffic


D.

Web


Expert Solution
Questions # 25:

Which of the following compliance frameworks was specifically created to measure the level of cybersecurity maturity within an organization?

Options:

A.

PCI-DSS


B.

GDPR


C.

CHMC


D.

FISMA


Expert Solution
Questions # 26:

An analyst is investigating how an attacker successfully performs a brute-force attack to gain a foothold into an organizations systems. In the course of the investigation the analyst determines that the reason no alerts were generated is because the detection searches were configured to run against Windows data only and excluding any Linux data.

This is an example of what?

Options:

A.

A True Positive.


B.

A True Negative.


C.

A False Negative.


D.

A False Positive.


Expert Solution
Questions # 27:

Which of the following is a tactic used by attackers, rather than a technique?

Options:

A.

Gathering information about a target.


B.

Establishing persistence with a scheduled task.


C.

Using a phishing email to gain initial access.


D.

Escalating privileges via UAC bypass.


Expert Solution
Questions # 28:

Which of the Enterprise Security frameworks provides additional automatic context and correlation to fields that exist within raw data?

Options:

A.

Adaptive Response


B.

Threat Intelligence


C.

Risk


D.

Asset and Identity


Expert Solution
Questions # 29:

Which of the following is a best practice for searching in Splunk?

Options:

A.

Streaming commands run before aggregating commands in the Search pipeline.


B.

Raw word searches should contain multiple wildcards to ensure all edge cases are covered.


C.

Limit fields returned from the search utilizing the cable command.


D.

Searching over All Time ensures that all relevant data is returned.


Expert Solution
Viewing page 3 out of 3 pages
Viewing questions 21-30 out of questions