Free Certification Practice Questions

SPLUNK-SPLK-3001

Loading…
The Add-On Builder creates Splunk Apps that start with what?
#1
Which of the following are examples of sources for events in the endpoint security domain dashboards?
#2
When creating custom correlation searches, what format is used to embed field values in the title, description, and drill-down fields of a notable event?
#3
What feature of Enterprise Security downloads threat intelligence data from a web server?
#4
The Remote Access panel within the User Activity dashboard is not populating with the most recent hour of data.What data model should be checked for potential errors such as skipped searches?
#5
In order to include an eventtype in a data model node, what is the next step after extracting the correct fields?
#6
What role should be assigned to a security team member who will be taking ownership of notable events in the incident review dashboard?
#7
Which column in the Asset or Identity list is combined with event security to make a notable event's urgency?
#8
What does the risk framework add to an object (user, server or other type) to indicate increased risk?
#9
Which indexes are searched by default for CIM data models?
#10
Which setting is used in indexes.conf to specify alternate locations for accelerated storage?
#11
Which of the following is a way to test for a property normalized data model?
#12
Which argument to the | tstats command restricts the search to summarized data only?
#13
When investigating, what is the best way to store a newly-found IOC?
#14
How is it possible to navigate to the list of currently-enabled ES correlation searches?
#15
Which of the following is a risk of using the Auto Deployment feature of Distributed Configuration Management to distribute indexes.conf?
#16
Which of the following are data models used by ES?
#17
At what point in the ES installation process should Splunk_TA_ForIndexers.spl be deployed to the indexers?
#18
Which correlation search feature is used to throttle the creation of notable events?
#19
Both `Recommended Actions` and `Adaptive Response Actions` use adaptive response. How do they differ?
#20
What does the Security Posture dashboard display?
#21
`10.22.63.159`, `websvr4`, and `00:26:08:18: CF:1D` would be matched against what in ES?
#22
How should an administrator add a new lookup through the ES app?
#23
Glass tables can display static images and text, the results of ad-hoc searches, and which of the following objects?
#24
Which of the following is a key feature of a glass table?
#25
An administrator is asked to configure an `Nslookup` adaptive response action, so that it appears as a selectable option in the notable event's action menu when an analyst is working in the Incident Review dashboard.What steps would the administrator take to configure this option?
#26
What are the steps to add a new column to the Notable Event table in the Incident Review dashboard?
#27
To observe what network services are in use in a network's activity overall, which of the following dashboards in Enterprise Security will contain the most relevant data?
#28
Adaptive response action history is stored in which index?
#29
Which of the following actions would not reduce the number of false positives from a correlation search?
#30