Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

SPLK-5001 Exam Dumps - Splunk Certified Cybersecurity Defense Analyst

Go to page:
Question # 4

An organization is using Risk-Based Alerting (RBA). During the past few days, a user account generated multiple risk observations. Splunk refers to this account as what type of entity?

A.

Risk Factor

B.

Risk Index

C.

Risk Analysis

D.

Risk Object

Full Access
Question # 5

What is the term for a model of normal network activity used to detect deviations?

A.

A baseline.

B.

A cluster.

C.

A time series.

D.

A data model.

Full Access
Question # 6

What is the first phase of the Continuous Monitoring cycle?

A.

Monitor and Protect

B.

Define and Predict

C.

Assess and Evaluate

D.

Respond and Recover

Full Access
Question # 7

Which field is automatically added to search results when assets are properly defined and enabled in Splunk Enterprise Security?

A.

asset_category

B.

src_ip

C.

src_category

D.

user

Full Access
Question # 8

A threat hunter is analyzing incoming emails during the past 30 days, looking for spam or phishing campaigns targeting many users. This involves finding large numbers of similar, but not necessarily identical, emails. The hunter extracts key datapoints from each email record, including the sender's address, recipient's address, subject, embedded URLs, and names of any attachments. Using the Splunk App for Data Science and Deep Learning, they then visualize each of these messages as points on a graph, looking for large numbers of points that occur close together. This is an example of what type of threat-hunting technique?

A.

Clustering

B.

Least Frequency of Occurrence Analysis

C.

Time Series Analysis

D.

Most Frequency of Occurrence Analysis

Full Access
Go to page: