Month End Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

SPLK-5001 Questions and Answers

Question # 6

A Cyber Threat Intelligence (CTI) team produces a report detailing a specific threat actor’s typical behaviors and intent. This would be an example of what type of intelligence?

A.

Operational

B.

Executive

C.

Tactical

D.

Strategic

Full Access
Question # 7

Which argument searches only accelerated data in the Network Traffic Data Model with tstats?

A.

accelerate=true

B.

dataset=accelerated

C.

summariesonly=true

D.

datamodel=accelerated

Full Access
Question # 8

While testing the dynamic removal of credit card numbers, an analyst lands on using therexcommand. What mode needs to be set to in order to replace the defined values with X?

| makeresults

| eval ccnumber="511388720478619733"

| rex field=ccnumber mode=???"s/(\d{4}-){3)/XXXX-XXXX-XXXX-/g"

Please assume that the aboverexcommand is correctly written.

A.

sed

B.

replace

C.

mask

D.

substitute

Full Access
Question # 9

An analyst learns that several types of data are being ingested into Splunk and Enterprise Security, and wants to use the metadata SPL command to list them in a search. Which of the following arguments should she use?

A.

metadata type=cdn

B.

metadata type=sourcetypes

C.

metadata type=assets

D.

metadata type=hosts

Full Access
Question # 10

Which of the following is a tactic used by attackers, rather than a technique?

A.

Gathering information about a target.

B.

Establishing persistence with a scheduled task.

C.

Using a phishing email to gain initial access.

D.

Escalating privileges via UAC bypass.

Full Access
Question # 11

As an analyst, tracking unique users is a common occurrence. The Security Operations Center (SOC) manager requested a search with results in a table format to track the cumulative downloads by distinct IP address. Which example calculates the running total of distinct users over time?

A.

eventtype="download" | bin_time span=1d | stats values(clientip) as ipa dc(clientip) by _time | streamstats dc(ipa) as "Cumulative total"

B.

eventtype="download" | bin_time span=1d | stats values(clientip) as ipa dc(clientip) by _time

C.

eventtype="download" | bin_time span=1d | table clientip _time user

D.

eventtype="download" | bin_time span=1d | stats values(clientip) as ipa dc(clientip) by user | table _time ipa

Full Access
Question # 12

Which of the following Splunk Enterprise Security features allows industry frameworks such as CIS Critical Security Controls, MITRE ATT&CK, and the Lockheed Martin Cyber Kill Chain® to be mapped to Correlation Search results?

A.

Annotations

B.

Playbooks

C.

Comments

D.

Enrichments

Full Access
Question # 13

What feature of Splunk Security Essentials (SSE) allows an analyst to see a listing of current on-boarded data sources in Splunk so they can view content based on available data?

A.

Security Data Journey

B.

Security Content

C.

Data Inventory

D.

Data Source Onboarding Guides

Full Access
Question # 14

An analysis of an organization’s security posture determined that a particular asset is at risk and a new process or solution should be implemented to protect it. Typically, who would be in charge of implementing the new process or solution that was selected?

A.

Security Architect

B.

SOC Manager

C.

Security Engineer

D.

Security Analyst

Full Access
Question # 15

Which dashboard in Enterprise Security would an analyst use to generate a report on users who are currently on a watchlist?

A.

Access Tracker

B.

Identity Tracker

C.

Access Center

D.

Identity Center

Full Access
Question # 16

What is the main difference between hypothesis-driven and data-driven Threat Hunting?

A.

Data-driven hunts always require more data to search through than hypothesis-driven hunts.

B.

Data-driven hunting tries to uncover activity within an existing data set, hypothesis-driven hunting begins with a potential activity that the hunter thinks may be happening.

C.

Hypothesis-driven hunts are typically executed on newly ingested data sources, while data-driven hunts are not.

D.

Hypothesis-driven hunting tries to uncover activity within an existing data set, data-driven hunting begins with an activity that the hunter thinks may be happening.

Full Access
Question # 17

Which metric would track improvements in analyst efficiency after dashboard customization?

A.

Mean Time to Detect

B.

Mean Time to Respond

C.

Recovery Time

D.

Dwell Time

Full Access
Question # 18

A network security tool that continuously monitors a network for malicious activity and takes action to block it is known as which of the following?

A.

Intrusion Prevention System

B.

Packet Sniffer

C.

SIEM

D.

Intrusion Detection System

Full Access
Question # 19

Which field is automatically added to search results when assets are properly defined and enabled in Splunk Enterprise Security?

A.

asset_category

B.

src_ip

C.

src_category

D.

user

Full Access
Question # 20

An analyst is looking at Web Server logs, and sees the following entry as the last web request that a server processed before unexpectedly shutting down:

[51.125.121.100 - [28/01/2006:10:27:10 -0300] "POST /cgi-bin/shurdown/ HTTP/1.0" 200 3304]

What kind of attack is most likely occurring?

A.

Distributed denial of service attack.

B.

Database injection attack.

C.

Denial of service attack.

D.

Cross-Site scripting attack.

Full Access
Question # 21

A threat hunter executed a hunt based on the following hypothesis:

As an actor, I want to plant rundll32 for proxy execution of malicious code and leverage Cobalt Strike for Command and Control.

Relevant logs and artifacts such as Sysmon, netflow, IDS alerts, and EDR logs were searched, and the hunter is confident in the conclusion that Cobalt Strike is not present in the company’s environment.

Which of the following best describes the outcome of this threat hunt?

A.

The threat hunt was successful because the hypothesis was not proven.

B.

The threat hunt failed because the hypothesis was not proven.

C.

The threat hunt failed because no malicious activity was identified.

D.

The threat hunt was successful in providing strong evidence that the tactic and tool is not present in the environment.

Full Access
Question # 22

During an investigation it is determined that an event is suspicious but expected in the environment. Out of the following, what is the best disposition to apply to this event?

A.

True positive

B.

Informational

C.

False positive

D.

Benign

Full Access
Question # 23

A threat hunter generates a report containing the list of users who have logged in to a particular database during the last 6 months, along with the number of times they have each authenticated. They sort this list and remove any user names who have logged in more than 6 times. The remaining names represent the users who rarely log in, as their activity is more suspicious. The hunter examines each of these rare logins in detail.

This is an example of what type of threat-hunting technique?

A.

Least Frequency of Occurrence Analysis

B.

Co-Occurrence Analysis

C.

Time Series Analysis

D.

Outlier Frequency Analysis

Full Access
Question # 24

What is the following step-by-step description an example of?

1. The attacker devises a non-default beacon profile with Cobalt Strike and embeds this within a document.

2. The attacker creates a unique email with the malicious document based on extensive research about their target.

3. When the victim opens this document, a C2 channel is established to the attacker’s temporary infrastructure on a compromised website.

A.

Tactic

B.

Policy

C.

Procedure

D.

Technique

Full Access
Question # 25

When threat hunting for outliers in Splunk, which of the following SPL pipelines would filter for users with over a thousand occurrences?

A.

| sort by user | where count > 1000

B.

| stats count by user | where count > 1000 | sort - count

C.

| top user

D.

| stats count(user) | sort - count | where count > 1000

Full Access
Question # 26

How are Notable Events configured in Splunk Enterprise Security?

A.

During an investigation.

B.

As part of an audit.

C.

Via an Adaptive Response Action in a regular search.

D.

Via an Adaptive Response Action in a correlation search.

Full Access
Question # 27

Which Enterprise Security framework provides a mechanism for running preconfigured actions within the Splunk platform or integrating with external applications?

A.

Asset and Identity

B.

Notable Event

C.

Threat Intelligence

D.

Adaptive Response

Full Access
Question # 28

There are different metrics that can be used to provide insights into SOC operations. If Mean Time to Respond is defined as the total time it takes for an Analyst to disposition an event, what is the typical starting point for calculating this metric for a particular event?

A.

When the malicious event occurs.

B.

When the SOC Manager is informed of the issue.

C.

When a Notable Event is triggered.

D.

When the end users are notified about the issue.

Full Access
Question # 29

Which of the following data sources can be used to discover unusual communication within an organization’s network?

A.

EDS

B.

Net Flow

C.

Email

D.

IAM

Full Access