Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

SPLK-5001 Exam Dumps - Splunk Certified Cybersecurity Defense Analyst

Go to page:
Question # 9

Which of the following use cases is best suited to be a Splunk SOAR Playbook?

A.

Forming hypothesis for Threat Hunting.

B.

Taking containment action on a compromised host.

C.

Creating persistent field extractions.

D.

Visualizing complex datasets.

Full Access
Question # 10

Which of the following is not considered a type of default metadata in Splunk?

A.

Source of data

B.

Timestamps

C.

Host name

D.

Event description

Full Access
Question # 11

Which Splunk Enterprise Security framework provides a way to identify incidents from events and then manage the ownership, triage process, and state of those incidents?

A.

Asset and Identity

B.

Investigation Management

C.

Notable Event

D.

Adaptive Response

Full Access
Question # 12

The United States Department of Defense (DoD) requires all government contractors to provide adequate security safeguards referenced in National Institute of Standards and Technology (NIST) 800-171. All DoD contractors must continually reassess, monitor, and track compliance to be able to do business with the US government.

Which feature of Splunk Enterprise Security provides an analyst context for the correlation search mapping to the specific NIST guidelines?

A.

Comments

B.

Moles

C.

Annotations

D.

Framework mapping

Full Access
Question # 13

The following list contains examples of Tactics, Techniques, and Procedures (TTPs):

1. Exploiting a remote service

2. Lateral movement

3. Use EternalBlue to exploit a remote SMB server

In which order are they listed below?

A.

Tactic, Technique, Procedure

B.

Procedure, Technique, Tactic

C.

Technique, Tactic, Procedure

D.

Tactic, Procedure, Technique

Full Access
Question # 14

What feature of Splunk Security Essentials (SSE) allows an analyst to see a listing of current on-boarded data sources in Splunk so they can view content based on available data?

A.

Security Data Journey

B.

Security Content

C.

Data Inventory

D.

Data Source Onboarding Guides

Full Access
Question # 15

An analyst is investigating how an attacker successfully performs a brute-force attack to gain a foothold into an organizations systems. In the course of the investigation the analyst determines that the reason no alerts were generated is because the detection searches were configured to run against Windows data only and excluding any Linux data.

This is an example of what?

A.

A True Positive.

B.

A True Negative.

C.

A False Negative.

D.

A False Positive.

Full Access
Question # 16

Which of the following is not considered an Indicator of Compromise (IOC)?

A.

A specific domain that is utilized for phishing.

B.

A specific IP address used in a cyberattack.

C.

A specific file hash of a malicious executable.

D.

A specific password for a compromised account.

Full Access
Go to page: