Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Pass the Splunk Cybersecurity Defense Analyst SPLK-5001 Questions and answers with ValidTests

Exam SPLK-5001 All Questions
Exam SPLK-5001 Premium Access

View all detail and faqs for the SPLK-5001 exam

Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions
Questions # 11:

An analyst notices that one of their servers is sending an unusually large amount of traffic, gigabytes more than normal, to a single system on the Internet. There doesn’t seem to be any associated increase in incoming traffic.

What type of threat actor activity might this represent?

Options:

A.

Data exfiltration

B.

Network reconnaissance

C.

Data infiltration

D.

Lateral movement

Expert Solution
Questions # 12:

In which phase of the Continuous Monitoring cycle are suggestions and improvements typically made?

Options:

A.

Define and Predict

B.

Establish and Architect

C.

Analyze and Report

D.

Implement and Collect

Expert Solution
Questions # 13:

An analyst is attempting to investigate a Notable Event within Enterprise Security. Through the course of their investigation they determined that the logs and artifacts needed to investigate the alert are not available.

What event disposition should the analyst assign to the Notable Event?

Options:

A.

Benign Positive, since there was no evidence that the event actually occurred.

B.

False Negative, since there are no logs to prove the activity actually occurred.

C.

True Positive, since there are no logs to prove that the event did not occur.

D.

Other, since a security engineer needs to ingest the required logs.

Expert Solution
Questions # 14:

According to David Bianco's Pyramid of Pain, which indicator type is least effective when used in continuous monitoring?

Options:

A.

Domain names

B.

TTPs

C.

NetworM-lost artifacts

D.

Hash values

Expert Solution
Questions # 15:

An analyst is investigating a network alert for suspected lateral movement from one Windows host to another Windows host. According to Splunk CIM documentation, the IP address of the host from which the attacker is moving would be in which field?

Options:

A.

host

B.

dest

C.

src_nt_host

D.

src_ip

Expert Solution
Questions # 16:

An analyst needs to create a new field at search time. Which Splunk command will dynamically extract additional fields as part of a Search pipeline?

Options:

A.

rex

B.

fields

C.

regex

D.

eval

Expert Solution
Questions # 17:

While the top command is utilized to find the most common values contained within a field, a Cyber Defense Analyst hunts for anomalies. Which of the following Splunk commands returns the least common values?

Options:

A.

least

B.

uncommon

C.

rare

D.

base

Expert Solution
Questions # 18:

An analysis of an organization’s security posture determined that a particular asset is at risk and a new process or solution should be implemented to protect it. Typically, who would be in charge of designing the new process and selecting the required tools to implement it?

Options:

A.

SOC Manager

B.

Security Engineer

C.

Security Architect

D.

Security Analyst

Expert Solution
Questions # 19:

The eval SPL expression supports many types of functions. Which of these function categories is not valid with eval?

Options:

A.

JSON functions

B.

Text functions

C.

Comparison and Conditional functions

D.

Threat functions

Expert Solution
Questions # 20:

What device typically sits at a network perimeter to detect command and control and other potentially suspicious traffic?

Options:

A.

Host-based firewall

B.

Web proxy

C.

Endpoint Detection and Response

D.

Intrusion Detection System

Expert Solution
Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions