Pre-Summer Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

You want a consistent view of events from various data sources.

Which ECS field type should you normalize?

A.

Base Fields

B.

Extended Fields

C.

Detection Fields

D.

Core Fields

Which CPS-compliant practice should be followed when a third-party field has no matching ECS field?

A.

Remove the field entirely

B.

Save it only in an external lookup table

C.

Prefix it with Vendor.

D.

Convert it to @timestamp

As a Next-Gen SIEM Engineer, you are responsible for managing and tuning correlation rules to improve the detection of potential security incidents. One of your correlation rules is designed to detect multiple failed login attempts that are followed by a successful login within a short time frame.

Which step would you take to tune this correlation rule to reduce false positives while maintaining its effectiveness?

A.

Increase the time window for detecting multiple failed login attempts to capture more data

B.

Add a condition to exclude known trusted IP addresses from triggering the rule

C.

Decrease the threshold for the number of failed login attempts required to trigger the rule

D.

Remove the condition for a successful login to simplify the rule

You need to provide a colleague the appropriate role to allow for configuration of connectors and creation of SOAR automations in Next-Gen SIEM.

Which role will provide these permissions while also maintaining least privilege?

A.

NG SIEM Security Lead

B.

NG SIEM Analyst

C.

Falcon Security Lead

D.

Custom role

Which field should be used in a correlation rule when detections must be based on the original event occurrence time?

A.

@ingesttimestamp

B.

@timestamp

C.

@rawstring

D.

@id

You notice that the format of incoming logs suddenly changes from JSON format to key-value pairs during log collection.

What action would you take to parse the data correctly?

A.

Use a multi-source configuration with different parsers per source

B.

Switch to fleet mode and monitor the logs

C.

Restart the log collector in debug mode

D.

Disable parsing entirely

You are creating a dashboard in Next-Gen SIEM and want to change the visualization used by a widget.

What must be selected to make this change?

A.

Interactions options

B.

Edit in Search view

C.

Styling options

Which combination of scope and permissions must be configured to create an API token that allows you to create and get the results of a query job in Next-Gen SIEM?

A.

NGSIEM with both write and execute permissions

B.

NGSIEM with read permissions only

C.

NGSIEM with both read and write permissions

D.

NGSIEM with write permissions only