Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

When investigating, what is the best way to store a newly-found IOC?

A.

Paste it into Notepad.

B.

Click the “Add IOC” button.

C.

Click the “Add Artifact” button.

D.

Add it in a text note to the investigation.

Which of the following features can the Add-on Builder configure in a new add-on?

A.

Expire data.

B.

Normalize data.

C.

Summarize data.

D.

Translate data.

How should an administrator add a new look up through the ES app?

A.

Upload the lookup file in Settings -> Lookups -> Lookup Definitions

B.

Upload the lookup file in Settings -> Lookups -> Lookup table files

C.

Add the lookup file to /etc/apps/SplunkEnterpriseSecuritySuite/lookups

D.

Upload the lookup file using Configure -> Content Management -> Create New Content -> Managed Lookup

Which of the following steps will make the Threat Activity dashboard the default landing page in ES?

A.

From the Edit Navigation page, drag and drop the Threat Activity view to the top of the page.

B.

From the Preferences menu for the user, select Enterprise Security as the default application.

C.

From the Edit Navigation page, click the 'Set this as the default view" checkmark for Threat Activity.

D.

Edit the Threat Activity view settings and checkmark the Default View option.

Which of the following are the default ports that must be configured for Splunk Enterprise Security to function?

A.

SplunkWeb (8068), Splunk Management (8089), KV Store (8000)

B.

SplunkWeb (8390), Splunk Management (8323), KV Store (8672)

C.

SplunkWeb (8000), Splunk Management (8089), KV Store (8191)

D.

SplunkWeb (8043), Splunk Management (8088), KV Store (8191)

Where is it possible to export content, such as correlation searches, from ES?

A.

Content exporter

B.

Configure -> Content Management

C.

Export content dashboard

D.

Settings Menu -> ES -> Export

An administrator is asked to configure an “Nslookup” adaptive response action, so that it appears as a selectable option in the notable event’s action menu when an analyst is working in the Incident Review dashboard. What steps would the administrator take to configure this option?

A.

Configure -> Content Management -> Type: Correlation Search -> Notable -> Nslookup

B.

Configure -> Type: Correlation Search -> Notable -> Recommended Actions -> Nslookup

C.

Configure -> Content Management -> Type: Correlation Search -> Notable -> Next Steps -> Nslookup

D.

Configure -> Content Management -> Type: Correlation Search -> Notable -> Recommended Actions -> Nslookup

Which of the following are data models used by ES? (Choose all that apply)

A.

Web

B.

Anomalies

C.

Authentication

D.

Network Traffic

A security manager has been working with the executive team en long-range security goals. A primary goal for the team Is to Improve managing user risk in the organization. Which of the following ES features can help identify users accessing inappropriate web sites?

A.

Configuring the identities lookup with user details to enrich notable event Information for forensic analysis.

B.

Make sure the Authentication data model contains up-to-date events and is properly accelerated.

C.

Configuring user and website watchlists so the User Activity dashboard will highlight unwanted user actions.

D.

Use the Access Anomalies dashboard to identify unusual protocols being used to access corporate sites.

Which of the following actions can improve overall search performance?

A.

Disable indexed real-time search.

B.

Increase priority of all correlation searches.

C.

Reduce the frequency (schedule) of lower-priority correlation searches.

D.

Add notable event suppressions for correlation searches with high numbers of false positives.