Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

SPLK-5001 Exam Dumps - Splunk Certified Cybersecurity Defense Analyst

Go to page:
Question # 25

Tactics, Techniques, and Procedures (TTPs) are methods or behaviors utilized by attackers. In which framework are these categorized?

A.

NIST 800-53

B.

ISO 27000

C.

CIS18

D.

MITRE ATT&CK

Full Access
Question # 26

Why is tstats more efficient than stats for large datasets?

A.

tstats is faster since it operates at the beginning of the search pipeline.

B.

tstats is faster since it only looks at indexed metadata, not raw data.

C.

tstats is faster due to its SQL-like syntax.

D.

tstats is faster since it searches raw logs for extracted fields.

Full Access
Question # 27

An analyst investigates an IDS alert and confirms suspicious traffic to a known malicious IP. What Enterprise Security data model would they use to investigate which process initiated the network connection?

A.

Endpoint

B.

Authentication

C.

Network traffic

D.

Web

Full Access
Question # 28

Which of the following is not a component of the Splunk Security Content library (ESCU, SSE)?

A.

Dashboards

B.

Reports

C.

Correlation searches

D.

Validated architectures

Full Access
Question # 29

As an analyst, tracking unique users is a common occurrence. The Security Operations Center (SOC) manager requested a search with results in a table format to track the cumulative downloads by distinct IP address. Which example calculates the running total of distinct users over time?

A.

eventtype="download" | bin_time span=1d | stats values(clientip) as ipa dc(clientip) by _time | streamstats dc(ipa) as "Cumulative total"

B.

eventtype="download" | bin_time span=1d | stats values(clientip) as ipa dc(clientip) by _time

C.

eventtype="download" | bin_time span=1d | table clientip _time user

D.

eventtype="download" | bin_time span=1d | stats values(clientip) as ipa dc(clientip) by user | table _time ipa

Full Access
Go to page: