ExamGecko
Question list
Search
Search

Question 29 - SPLK-2003 discussion

Report
Export

Which of the following is a step when configuring event forwarding from Splunk to Phantom?

A.
Map CIM to CEF fields.
Answers
A.
Map CIM to CEF fields.
B.
Create a Splunk alert that uses the event_forward.py script to send events to Phantom.
Answers
B.
Create a Splunk alert that uses the event_forward.py script to send events to Phantom.
C.
Map CEF to CIM fields.
Answers
C.
Map CEF to CIM fields.
D.
Create a saved search that generates the JSON for the new container on Phantom.
Answers
D.
Create a saved search that generates the JSON for the new container on Phantom.
Suggested answer: B

Explanation:

A step when configuring event forwarding from Splunk to Phantom is to create a Splunk alertthat uses the event_forward.py script to send events to Phantom. This script will convert theSplunk events to CEF format and send them to Phantom as containers. The other options arenot valid steps for event forwarding. SeeForwarding events from Splunk to Phantomfor moredetails.Configuring event forwarding from Splunk to Phantom typically involves creating a Splunk alertthat leverages a script (like event_forward.py) to automatically send triggered event data toPhantom. This setup enables Splunk to act as a detection mechanism that, upon identifyingnotable events based on predefined criteria, forwards these events to Phantom for furtherorchestration, automation, and response actions. This integration streamlines the process ofincident management by connecting Splunk's powerful data analysis capabilities withPhantom's orchestration and automation framework.

asked 23/09/2024
Sathiyaraj Arulprakasam
47 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first