ExamGecko
Home Home / Splunk / SPLK-2003

Splunk SPLK-2003 Practice Test - Questions Answers, Page 10

Question list
Search
Search

What users are included in a new installation of SOAR?

A.

The admin and automation users are included by default.

A.

The admin and automation users are included by default.

Answers
B.

The admin, power, and user users are included by default.

B.

The admin, power, and user users are included by default.

Answers
C.

Only the admin user is included by default.

C.

Only the admin user is included by default.

Answers
D.

No users are included by default.

D.

No users are included by default.

Answers
Suggested answer: A

Explanation:

The admin and automation users are included by default. Comprehensive Explanation and Reference of Correct Answer: According to the Splunk SOAR (On-premises) default credentials, script

Web Interface Username: soar_local_admin password: password

On Splunk SOAR (On-premises) deployments which have been upgraded from earlier releases the user account admin becomes a normal user account with the Administrator role.

The automation user is a special user account that is used by Splunk SOAR (On-premises) to run actions and playbooks. It has the Automation role, which grants it full access to all objects and data in Splunk SOAR (On-premises).

The other options are incorrect because they either omit the automation user or include users that are not created by default. For example, option B includes the power and user users, which are not part of the default installation. Option C only includes the admin user, which ignores the automation user. Option D claims that no users are included by default, which is false.

In a new installation of Splunk SOAR, two default user accounts are typically created: admin and automation. The admin account is intended for system administration tasks, providing full access to all features and settings within the SOAR platform. The automation user is a special account used for automated processes and scripts that interact with the SOAR platform, often without requiring direct human intervention. This user has specific permissions that can be tailored for automated tasks. Options B, C, and D do not accurately represent the default user accounts included in a new SOAR installation, making option A the correct answer.

A user selects the New option under Sources on the menu. What will be displayed?

A.

A list of new assets.

A.

A list of new assets.

Answers
B.

The New Data Ingestion wizard.

B.

The New Data Ingestion wizard.

Answers
C.

A list of new data sources.

C.

A list of new data sources.

Answers
D.

A list of new events.

D.

A list of new events.

Answers
Suggested answer: B

Explanation:

Selecting the New option under Sources in the Splunk SOAR menu typically initiates the New Data Ingestion wizard. This wizard guides users through the process of configuring new data sources for ingestion into the SOAR platform. It is designed to streamline the setup of various data inputs, such as event logs, threat intelligence feeds, or notifications from other security tools, ensuring that SOAR can receive and process relevant security data efficiently. This feature is crucial for expanding SOAR's monitoring and response capabilities by integrating diverse data sources. Options A, C, and D do not accurately describe what is displayed when the New option under Sources is selected, making option B the correct choice.

New Data Ingestion wizard allows you to create a new data source for Splunk SOAR (On-premises) by selecting the type of data, the ingestion method, and the configuration options. The other options are incorrect because they do not match the description of the New option under Sources on the menu. For example, option A refers to a list of new assets, which is not related to data ingestion. Option C refers to a list of new data sources, which is not what the New option does. Option D refers to a list of new events, which is not the same as creating a new data source.


Under Asset Ingestion Settings, how many labels must be applied when configuring an asset?

A.

Labels are not configured under Asset Ingestion Settings.

A.

Labels are not configured under Asset Ingestion Settings.

Answers
B.

One.

B.

One.

Answers
C.

One or more.

C.

One or more.

Answers
D.

Zero or more.

D.

Zero or more.

Answers
Suggested answer: D

Explanation:

Under Asset Ingestion Settings in Splunk SOAR, when configuring an asset, the number of labels that must be applied can be zero or more. Labels are optional and are used to categorize data and control access. They are not a requirement under Asset Ingestion Settings, but they can be used to enhance organization and filtering if chosen.

Which of the following can be done with the System Health Display?

A.

Create a temporary, edited version of a process and test the results.

A.

Create a temporary, edited version of a process and test the results.

Answers
B.

Partially rewind processes, which is useful for debugging.

B.

Partially rewind processes, which is useful for debugging.

Answers
C.

View a single column of status for SOAR processes. For metrics, click Details.

C.

View a single column of status for SOAR processes. For metrics, click Details.

Answers
D.

Reset DECIDED to reset playbook environments back to at-start conditions.

D.

Reset DECIDED to reset playbook environments back to at-start conditions.

Answers
Suggested answer: C

Explanation:

System Health Display is a dashboard that shows the status and performance of the SOAR processes and components, such as the automation service, the playbook daemon, the DECIDED process, and the REST API. One of the things that can be done with the System Health Display is to reset DECIDED, which is a core component of the SOAR automation engine that handles the execution of playbooks and actions. Resetting DECIDED can be useful for troubleshooting or debugging purposes, as it resets the playbook environments back to at-start conditions, meaning that any changes made by the playbooks are discarded and the playbooks are reloaded. To reset DECIDED, you need to click on the Reset DECIDED button on the System Health Display dashboard. Therefore, option D is the correct answer, as it is the only option that can be done with the System Health Display. Option A is incorrect, because creating a temporary, edited version of a process and testing the results is not something that can be done with the System Health Display, but rather with the Debugging dashboard, which allows you to modify and run a process in a sandbox environment. Option B is incorrect, because partially rewinding processes, which is useful for debugging, is not something that can be done with the System Health Display, but rather with the Rewind feature, which allows you to go back to a previous state of a process and resume the execution from there. Option C is incorrect, because viewing a single column of status for SOAR processes is not something that can be done with the System Health Display, but rather with the Status Display dashboard, which shows a simplified view of the SOAR processes and their status.

What metrics can be seen from the System Health Display? (select all that apply)

A.

Playbook Usage

A.

Playbook Usage

Answers
B.

Memory Usage

B.

Memory Usage

Answers
C.

Disk Usage

C.

Disk Usage

Answers
D.

Load Average

D.

Load Average

Answers
Suggested answer: B, C, D

Explanation:

System Health Display is a dashboard that shows the status and performance of the SOAR processes and components, such as the automation service, the playbook daemon, the DECIDED process, and the REST API. Some of the metrics that can be seen from the System Health Display are:

* Memory Usage: The percentage of memory used by the system and the processes.

* Disk Usage: The percentage of disk space used by the system and the processes.

* Load Average: The average number of processes in the run queue or waiting for disk I/O over a period of time.

Therefore, options B, C, and D are the correct answers, as they are the metrics that can be seen from the System Health Display. Option A is incorrect, because Playbook Usage is not a metric that can be seen from the System Health Display, but rather a metric that can be seen from the Playbook Usage dashboard, which shows the number of playbooks and actions run over a period of time.

1: Web search results from search_web(query='Splunk SOAR Automation Developer System Health Display')

The System Health Display in Splunk SOAR provides several metrics to help monitor and manage the health of the system. These typically include:

* B: Memory Usage - This metric shows the amount of memory being used by the SOAR platform, which is important for ensuring that the system does not exceed available resources.

* C: Disk Usage - This metric indicates the amount of storage space being utilized, which is crucial for maintaining adequate storage resources and for planning capacity.

* D: Load Average - This metric provides an indication of the overall load on the system over a period of time, which helps in understanding the system's performance and in identifying potential bottlenecks or issues.

Playbook Usage is generally not a metric displayed on the System Health page; instead, it's more related to the usage analytics of playbooks rather than system health metrics.

When the Splunk App for SOAR Export executes a Splunk search, which activities are completed?

A.

CEF fields are mapped to CIM flelds and a container is created on the SOAR server.

A.

CEF fields are mapped to CIM flelds and a container is created on the SOAR server.

Answers
B.

CIM fields are mapped to CEF fields and a container is created on the SOAR server.

B.

CIM fields are mapped to CEF fields and a container is created on the SOAR server.

Answers
C.

CEF fields are mapped to CIM and a container is created on the Splunk server.

C.

CEF fields are mapped to CIM and a container is created on the Splunk server.

Answers
D.

CIM fields are mapped to CEF and a container is created on the Splunk server.

D.

CIM fields are mapped to CEF and a container is created on the Splunk server.

Answers
Suggested answer: B

Explanation:

When the Splunk App for SOAR Export executes a Splunk search, it typically involves mapping Common Information Model (CIM) fields from Splunk to the Common Event Format (CEF) used by SOAR, after which a container is created on the SOAR server to house the related artifacts and information. This process allows for the integration of data between Splunk, which uses CIM for data normalization, and Splunk SOAR, which uses CEF as its data format for incidents and events.

Splunk App for SOAR Export is responsible for sending data from your Splunk Enterprise or Splunk Cloud instances to Splunk SOAR. The Splunk App for SOAR Export acts as a translation service between the Splunk platform and Splunk SOAR by performing the following tasks:

* Mapping fields from Splunk platform alerts, such as saved searches and data models, to CEF fields.

* Translating CIM fields from Splunk Enterprise Security (ES) notable events to CEF fields.

* Forwarding events in CEF format to Splunk SOAR, which are stored as artifacts.

Therefore, option B is the correct answer, as it states the activities that are completed when the Splunk App for SOAR Export executes a Splunk search. Option A is incorrect, because CEF fields are not mapped to CIM fields, but the other way around. Option C is incorrect, because a container is not created on the Splunk server, but on the SOAR server. Option D is incorrect, because a container is not created on the Splunk server, but on the SOAR server.

Total 96 questions
Go to page: of 10