3 Months Free Update
3 Months Free Update
3 Months Free Update
The eval SPL expression supports many types of functions. Which of these function categories is not valid with eval?
Which of the Enterprise Security frameworks provides additional automatic context and correlation to fields that exist within raw data?
A network security tool that continuously monitors a network for malicious activity and takes action to block it is known as which of the following?
Which of the following is not considered a type of default metadata in Splunk?
An analyst is investigating a network alert for suspected lateral movement from one Windows host to another Windows host. According to Splunk CIM documentation, the IP address of the host from which the attacker is moving would be in which field?
Which dashboard in Enterprise Security would an analyst use to generate a report on users who are currently on a watchlist?
What is the term for a model of normal network activity used to detect deviations?
When searching in Splunk, which of the following SPL commands can be used to run a subsearch across every field in a wildcard field list?
An adversary uses "LoudWiner" to hijack resources for crypto mining. What does this represent in a TTP framework?
An analyst is investigating how an attacker successfully performs a brute-force attack to gain a foothold into an organizations systems. In the course of the investigation the analyst determines that the reason no alerts were generated is because the detection searches were configured to run against Windows data only and excluding any Linux data.
This is an example of what?
Which Enterprise Security framework provides a mechanism for running preconfigured actions within the Splunk platform or integrating with external applications?
Which Splunk Enterprise Security dashboard displays authentication and access-related data?
The field file_acl contains access controls associated with files affected by an event. In which data model would an analyst find this field?
A Cyber Threat Intelligence (CTI) team delivers a briefing to the CISO detailing their view of the threat landscape the organization faces. This is an example of what type of Threat Intelligence?
Outlier detection is an analysis method that groups together data points into high density clusters. Data points that fall outside of these high density clusters are considered to be what?
Which of the following is not considered an Indicator of Compromise (IOC)?
Which search command allows an analyst to match whatever is inside the parentheses as a single term in the index, even if it contains characters that are usually recognized as minor breakers such as periods or underscores?
A Cyber Threat Intelligence (CTI) team produces a report detailing a specific threat actor’s typical behaviors and intent. This would be an example of what type of intelligence?
What device typically sits at a network perimeter to detect command and control and other potentially suspicious traffic?
Which of the following use cases is best suited to be a Splunk SOAR Playbook?
According to David Bianco's Pyramid of Pain, which indicator type is least effective when used in continuous monitoring?
An analyst is investigating the number of failed login attempts by IP address. Which SPL command can be used to create a temporary table containing the number of failed login attempts by IP address over a specific time period?
What Splunk feature would enable enriching public IP addresses with ASN and owner information?