Halloween Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which data model populated the panels on the Risk Analysis dashboard?

A.

Risk

B.

Audit

C.

Domain analysis

D.

Threat intelligence

Which of the following is part of tuning correlation searches for a new ES installation?

A.

Configuring correlation notable event index.

B.

Configuring correlation permissions.

C.

Configuring correlation adaptive responses.

D.

Configuring correlation result storage.

What is the first step when preparing to install ES?

A.

Install ES.

B.

Determine the data sources used.

C.

Determine the hardware required.

D.

Determine the size and scope of installation.

Both “Recommended Actions” and “Adaptive Response Actions” use adaptive response. How do they differ?

A.

Recommended Actions show a textual description to an analyst, Adaptive Response Actions show them encoded.

B.

Recommended Actions show a list of Adaptive Responses to an analyst, Adaptive Response Actions run them automatically.

C.

Recommended Actions show a list of Adaptive Responses that have already been run, Adaptive Response Actions run them automatically.

D.

Recommended Actions show a list of Adaptive Responses to an analyst, Adaptive Response Actions run manually with analyst intervention.

Which columns in the Assets lookup are used to identify an asset in an event?

A.

src, dvc, dest

B.

cidr, port, netbios, saml

C.

ip, mac, dns, nt_host

D.

host, hostname, url, address

How does ES know local customer domain names so it can detect internal vs. external emails?

A.

Web and email domain names are set in General -> General Configuration.

B.

ES uses the User Activity index and applies machine learning to determine internal and external domains.

C.

The Corporate Web and Email Domain Lookups are edited during initial configuration.

D.

ES extracts local email and web domains automatically from SMTP and HTTP logs.

Which tool Is used to update indexers In E5?

A.

Index Updater

B.

Distributed Configuration Management

C.

indexes.conf

D.

Splunk_TA_ForIndexeres. spl

What is the main purpose of the Dashboard Requirements Matrix document?

A.

Identifies on which data model(s) each dashboard depends.

B.

Provides instructions for customizing each dashboard for local data models.

C.

Identifies the searches used by the dashboards.

D.

Identifies which data model(s) depend on each dashboard.

Following the installation of ES, an admin configured users with the ess_user role the ability to close notable events.

How would the admin restrict these users from being able to change the status of Resolved notable events to Closed?

A.

In Enterprise Security, give the ess_user role the Own Notable Events permission.

B.

From the Status Configuration window select the Closed status. Remove ess_user from the status

transitions for the Resolved status.

C.

From the Status Configuration window select the Resolved status. Remove ess_user from the status transitions for the Closed status.

D.

From Splunk Access Controls, select the ess_user role and remove the edit_notable_events capability.