Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Pass the Splunk Cybersecurity Defense Analyst SPLK-5001 Questions and answers with ValidTests

Exam SPLK-5001 All Questions
Exam SPLK-5001 Premium Access

View all detail and faqs for the SPLK-5001 exam

Viewing page 3 out of 3 pages
Viewing questions 21-30 out of questions
Questions # 21:

Which Splunk Enterprise Security framework provides a way to identify incidents from events and then manage the ownership, triage process, and state of those incidents?

Options:

A.

Asset and Identity

B.

Investigation Management

C.

Notable Event

D.

Adaptive Response

Expert Solution
Questions # 22:

Which Splunk Enterprise Security dashboard displays authentication and access-related data?

Options:

A.

Audit dashboards

B.

Asset and Identity dashboards

C.

Access dashboards

D.

Endpoint dashboards

Expert Solution
Questions # 23:

An analysis of an organization’s security posture determined that a particular asset is at risk and a new process or solution should be implemented to protect it. Typically, who would be in charge of implementing the new process or solution that was selected?

Options:

A.

Security Architect

B.

SOC Manager

C.

Security Engineer

D.

Security Analyst

Expert Solution
Questions # 24:

A network security tool that continuously monitors a network for malicious activity and takes action to block it is known as which of the following?

Options:

A.

Intrusion Prevention System

B.

Packet Sniffer

C.

SIEM

D.

Intrusion Detection System

Expert Solution
Questions # 25:

Which of the following use cases is best suited to be a Splunk SOAR Playbook?

Options:

A.

Forming hypothesis for Threat Hunting.

B.

Taking containment action on a compromised host.

C.

Creating persistent field extractions.

D.

Visualizing complex datasets.

Expert Solution
Questions # 26:

A threat hunter is analyzing incoming emails during the past 30 days, looking for spam or phishing campaigns targeting many users. This involves finding large numbers of similar, but not necessarily identical, emails. The hunter extracts key datapoints from each email record, including the sender's address, recipient's address, subject, embedded URLs, and names of any attachments. Using the Splunk App for Data Science and Deep Learning, they then visualize each of these messages as points on a graph, looking for large numbers of points that occur close together. This is an example of what type of threat-hunting technique?

Options:

A.

Clustering

B.

Least Frequency of Occurrence Analysis

C.

Time Series Analysis

D.

Most Frequency of Occurrence Analysis

Expert Solution
Questions # 27:

Which of the following Splunk Enterprise Security features allows industry frameworks such as CIS Critical Security Controls, MITRE ATT&CK, and the Lockheed Martin Cyber Kill Chain® to be mapped to Correlation Search results?

Options:

A.

Annotations

B.

Playbooks

C.

Comments

D.

Enrichments

Expert Solution
Questions # 28:

Which of the Enterprise Security frameworks provides additional automatic context and correlation to fields that exist within raw data?

Options:

A.

Adaptive Response

B.

Threat Intelligence

C.

Risk

D.

Asset and Identity

Expert Solution
Questions # 29:

Which of the following use cases is best suited to be a Splunk SOAR Playbook?

Options:

A.

Forming hypothesis for Threat Hunting

B.

Visualizing complex datasets.

C.

Creating persistent field extractions.

D.

Taking containment action on a compromised host

Expert Solution
Questions # 30:

While investigating findings in Enterprise Security, an analyst has identified a compromised device. Without leaving ES, what action could they take to run a sequence of containment activities on the compromised device that also updates the original finding?

Options:

A.

Run an event-level workflow action that initiates a SOAR playbook.

B.

Run a field-level workflow action that initiates a SOAR playbook.

C.

Run an adaptive response action that initiates a SOAR playbook.

D.

Run an alert action that initiates a SOAR playbook.

Expert Solution
Viewing page 3 out of 3 pages
Viewing questions 21-30 out of questions