Cyber Monday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

An analyst is investigating how an attacker successfully performs a brute-force attack to gain a foothold into an organizations systems. In the course of the investigation the analyst determines that the reason no alerts were generated is because the detection searches were configured to run against Windows data only and excluding any Linux data.

This is an example of what?

A.

A True Positive.

B.

A True Negative.

C.

A False Negative.

D.

A False Positive.

Which Splunk Enterprise Security framework provides a way to identify incidents from events and then manage the ownership, triage process, and state of those incidents?

A.

Asset and Identity

B.

Investigation Management

C.

Notable Event

D.

Adaptive Response

The eval SPL expression supports many types of functions. Which of these function categories is not valid with eval?

A.

JSON functions

B.

Text functions

C.

Comparison and Conditional functions

D.

Threat functions

Which of the following is not considered a type of default metadata in Splunk?

A.

Source of data

B.

Timestamps

C.

Host name

D.

Event description

Which pre-packaged app delivers security content and detections on a regular, ongoing basis for Enterprise Security and SOAR?

A.

SSE

B.

ESCU

C.

Threat Hunting

D.

InfoSec

An analysis of an organization’s security posture determined that a particular asset is at risk and a new process or solution should be implemented to protect it. Typically, who would be in charge of designing the new process and selecting the required tools to implement it?

A.

SOC Manager

B.

Security Engineer

C.

Security Architect

D.

Security Analyst

What is the first phase of the Continuous Monitoring cycle?

A.

Monitor and Protect

B.

Define and Predict

C.

Assess and Evaluate

D.

Respond and Recover

When threat hunting for outliers in Splunk, which of the following SPL pipelines would filter for users with over a thousand occurrences?

A.

| sort by user | where count > 1000

B.

| stats count by user | where count > 1000 | sort - count

C.

| top user

D.

| stats count(user) | sort - count | where count > 1000

Which of the following is the primary benefit of using the CIM in Splunk?

A.

It allows for easier correlation of data from different sources.

B.

It improves the performance of search queries on raw data.

C.

It enables the use of advanced machine learning algorithms.

D.

It automatically detects and blocks cyber threats.

What Splunk feature would enable enriching public IP addresses with ASN and owner information?

A.

Using rex to extract this information at search time.

B.

Using lookup to include relevant information.

C.

Using oval commands to calculate the ASM.

D.

Using makersanita to add the ASMs to the search.