Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

SPLK-5001 Exam Dumps - Splunk Certified Cybersecurity Defense Analyst

Go to page:
Question # 17

A threat hunter generates a report containing the list of users who have logged in to a particular database during the last 6 months, along with the number of times they have each authenticated. They sort this list and remove any user names who have logged in more than 6 times. The remaining names represent the users who rarely log in, as their activity is more suspicious. The hunter examines each of these rare logins in detail.

This is an example of what type of threat-hunting technique?

A.

Least Frequency of Occurrence Analysis

B.

Co-Occurrence Analysis

C.

Time Series Analysis

D.

Outlier Frequency Analysis

Full Access
Question # 18

Which of the following roles is commonly responsible for selecting and designing the infrastructure and tools that a security analyst utilizes to effectively complete their job duties?

A.

Threat Intelligence Analyst

B.

SOC Manager

C.

Security Engineer

D.

Security Architect

Full Access
Question # 19

Which pre-packaged app delivers security content and detections on a regular, ongoing basis for Enterprise Security and SOAR?

A.

SSE

B.

ESCU

C.

Threat Hunting

D.

InfoSec

Full Access
Question # 20

Which dashboard in Enterprise Security would an analyst use to generate a report on users who are currently on a watchlist?

A.

Access Tracker

B.

Identity Tracker

C.

Access Center

D.

Identity Center

Full Access
Question # 21

A Cyber Threat Intelligence (CTI) team delivers a briefing to the CISO detailing their view of the threat landscape the organization faces. This is an example of what type of Threat Intelligence?

A.

Tactical

B.

Strategic

C.

Operational

D.

Executive

Full Access
Question # 22

In which phase of the Continuous Monitoring cycle are suggestions and improvements typically made?

A.

Define and Predict

B.

Establish and Architect

C.

Analyze and Report

D.

Implement and Collect

Full Access
Question # 23

An IDS signature is designed to detect and alert on logins to a certain server, but only if they occur from 6:00 PM - 6:00 AM. If no IDS alerts occur in this window, but the signature is known to be correct, this would be an example of what?

A.

A True Negative.

B.

A True Positive.

C.

A False Negative.

D.

A False Positive.

Full Access
Question # 24

After discovering some events that were missed in an initial investigation, an analyst determines this is because some events have an empty src field. Instead, the required data is often captured in another field called machine_name.

What SPL could they use to find all relevant events across either field until the field extraction is fixed?

A.

| eval src = coalesce(src,machine_name)

B.

| eval src = src + machine_name

C.

| eval src = src . machine_name

D.

| eval src = tostring(machine_name)

Full Access
Go to page: