Which Enterprise Security framework provides a mechanism for running preconfigured actions within the Splunk platform or integrating with external applications?
#1
Answer: D✅ Correct❌ Incorrect
Which of the following Splunk Enterprise Security features allows industry frameworks such as CIS Critical Security Controls, MITRE ATT&CK, and the Lockheed Martin Cyber Kill Chain® to be mapped to Correlation Search results?
#2
Answer: A✅ Correct❌ Incorrect
Which of the following is the primary benefit of using the CIM in Splunk?
#3
Answer: A✅ Correct❌ Incorrect
Tactics, Techniques, and Procedures (TTPs) are methods or behaviors utilized by attackers. In which framework are these categorized?
#4
Answer: D✅ Correct❌ Incorrect
A threat hunter executed a hunt based on the following hypothesis:As an actor, I want to plant rundll32 for proxy execution of malicious code and leverage Cobalt Strike for Command and Control.Relevant logs and artifacts such as Sysmon, netflow, IDS alerts, and EDR logs were searched, and the hunter is confident in the conclusion that Cobalt Strike is not present in the company’s environment.Which of the following best describes the outcome of this threat hunt?
#5
Answer: D✅ Correct❌ Incorrect
An analyst notices that one of their servers is sending an unusually large amount of traffic, gigabytes more than normal, to a single system on the Internet. There doesn’t seem to be any associated increase in incoming traffic.What type of threat actor activity might this represent?
#6
Answer: A✅ Correct❌ Incorrect
In which phase of the Continuous Monitoring cycle are suggestions and improvements typically made?
#7
Answer: C✅ Correct❌ Incorrect
An analyst is not sure that all of the potential data sources at her company are being correctly or completely utilized by Splunk and Enterprise Security. Which of the following might she suggest using, in order to perform an analysis of the data types available and some of their potential security uses?
#8
Answer: B✅ Correct❌ Incorrect
During their shift, an analyst receives an alert about an executable being run from C:\Windows\Temp. Why should this be investigated further?
#9
Answer: D✅ Correct❌ Incorrect
An analyst would like to visualize threat objects across their environment and chronological risk events for a Risk Object in Incident Review. Where would they find this?
#10
Answer: D✅ Correct❌ Incorrect
A Risk Rule generates events on Suspicious Cloud Share Activity and regularly contributes to confirmed incidents from Risk Notables. An analyst realizes the raw logs these events are generated from contain information which helps them determine what might be malicious.What should they ask their engineer for to make their analysis easier?
#11
Answer: A✅ Correct❌ Incorrect
What device typically sits at a network perimeter to detect command and control and other potentially suspicious traffic?
#12
Answer: D✅ Correct❌ Incorrect
Upon investigating a report of a web server becoming unavailable, the security analyst finds that the web server’s access log has the same log entry millions of times:147.186.119.200 - - [28/Jul/2023:12:04:13 -0300] "GET /login/ HTTP/1.0" 200 3733What kind of attack is occurring?
#13
Answer: A✅ Correct❌ Incorrect
According to David Bianco's Pyramid of Pain, which indicator type is least effective when used in continuous monitoring?
#14
Answer: D✅ Correct❌ Incorrect
An analysis of an organization’s security posture determined that a particular asset is at risk and a new process or solution should be implemented to protect it. Typically, who would be in charge of implementing the new process or solution that was selected?
#15
Answer: C✅ Correct❌ Incorrect
Which of the following is a correct Splunk search that will return results in the most performant way?
#16
Answer: A✅ Correct❌ Incorrect
There are many resources for assisting with SPL and configuration questions. Which of the following resources feature community-sourced answers?
#17
Answer: A✅ Correct❌ Incorrect
A successful Continuous Monitoring initiative involves the entire organization. When an analyst discovers the need for more context or additional information, perhaps from additional data sources or altered correlation rules, to what role would this request generally escalate?
#18
Answer: C✅ Correct❌ Incorrect
Splunk Enterprise Security has numerous frameworks to create correlations, integrate threat intelligence, and provide a workflow for investigations. Which framework raises the threat profile of individuals or assets to allow identification of people or devices that perform an unusual amount of suspicious activities?
#19
Answer: B✅ Correct❌ Incorrect
While the top command is utilized to find the most common values contained within a field, a Cyber Defense Analyst hunts for anomalies. Which of the following Splunk commands returns the least common values?
#20
Answer: C✅ Correct❌ Incorrect
The Lockheed Martin Cyber Kill Chain® breaks an attack lifecycle into several stages. A threat actor modified the registry on a compromised Windows system to ensure that their malware would automatically run at boot time. Into which phase of the Kill Chain would this fall?
#21
Answer: D✅ Correct❌ Incorrect
A Risk Notable Event has been triggered in Splunk Enterprise Security, an analyst investigates the alert, and determines it is a false positive. What metric would be used to define the time between alert creation and close of the event?
#22
Answer: A✅ Correct❌ Incorrect
An analyst needs to create a new field at search time. Which Splunk command will dynamically extract additional fields as part of a Search pipeline?
#23
Answer: A✅ Correct❌ Incorrect
Which of the following is considered Personal Data under GDPR?
#24
Answer: B✅ Correct❌ Incorrect
What goal of an Advanced Persistent Threat (APT) group aims to disrupt or damage on behalf of a cause?
#25
Answer: A✅ Correct❌ Incorrect
A Cyber Threat Intelligence (CTI) team produces a report detailing a specific threat actor’s typical behaviors and intent. This would be an example of what type of intelligence?
#26
Answer: D✅ Correct❌ Incorrect
An analyst is building a search to examine Windows XML Event Logs, but the initial search is not returning any extracted fields. Based on the above image, what is the most likely cause?
#27
Answer: C✅ Correct❌ Incorrect
An organization is using Risk-Based Alerting (RBA). During the past few days, a user account generated multiple risk observations. Splunk refers to this account as what type of entity?
#28
Answer: D✅ Correct❌ Incorrect
When searching in Splunk, which of the following SPL commands can be used to run a subsearch across every field in a wildcard field list?
#29
Answer: A✅ Correct❌ Incorrect
How are Notable Events configured in Splunk Enterprise Security?