An analyst learns that several types of data are being ingested into Splunk and Enterprise Security, and wants to use the metadata SPL command to list them in a search. Which of the following arguments should she use?
According to David Bianco's Pyramid of Pain, which indicator type is least effective when used in continuous monitoring?
An analyst is investigating the number of failed login attempts by IP address. Which SPL command can be used to create a temporary table containing the number of failed login attempts by IP address over a specific time period?
An analyst investigates an IDS alert and confirms suspicious traffic to a known malicious IP. What Enterprise Security data model would they use to investigate which process initiated the network connection?
Which of the following compliance frameworks was specifically created to measure the level of cybersecurity maturity within an organization?
An analyst is investigating how an attacker successfully performs a brute-force attack to gain a foothold into an organizations systems. In the course of the investigation the analyst determines that the reason no alerts were generated is because the detection searches were configured to run against Windows data only and excluding any Linux data.
This is an example of what?
Which of the following is a tactic used by attackers, rather than a technique?
Which of the Enterprise Security frameworks provides additional automatic context and correlation to fields that exist within raw data?
Which of the following is a best practice for searching in Splunk?