Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Exam SPLK-5001 All Questions
Exam SPLK-5001 All Questions

View all questions & answers for the SPLK-5001 exam

Splunk Cybersecurity Defense Analyst SPLK-5001 Question # 26 Topic 3 Discussion

SPLK-5001 Exam Topic 3 Question 26 Discussion:
Question #: 26
Topic #: 3

A threat hunter is analyzing incoming emails during the past 30 days, looking for spam or phishing campaigns targeting many users. This involves finding large numbers of similar, but not necessarily identical, emails. The hunter extracts key datapoints from each email record, including the sender's address, recipient's address, subject, embedded URLs, and names of any attachments. Using the Splunk App for Data Science and Deep Learning, they then visualize each of these messages as points on a graph, looking for large numbers of points that occur close together. This is an example of what type of threat-hunting technique?


A.

Clustering


B.

Least Frequency of Occurrence Analysis


C.

Time Series Analysis


D.

Most Frequency of Occurrence Analysis


Get Premium SPLK-5001 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.