ExamGecko
Home Home / Splunk / SPLK-2003

Splunk SPLK-2003 Practice Test - Questions Answers, Page 2

Question list
Search
Search

Splunk user account(s) with which roles must be created to configure Phantom with an external Splunk Enterprise instance?

A.
superuser, administrator
A.
superuser, administrator
Answers
B.
phantomcreate. phantomedit
B.
phantomcreate. phantomedit
Answers
C.
phantomsearch, phantomdelete
C.
phantomsearch, phantomdelete
Answers
D.
admin,user
D.
admin,user
Answers
Suggested answer: A

Phantom supports multiple user authentication methods such as LDAP and SAML2. What other user authentication method is supported?

A.
SAML3
A.
SAML3
Answers
B.
PIV/CAC
B.
PIV/CAC
Answers
C.
Biometrics
C.
Biometrics
Answers
D.
OpenID
D.
OpenID
Answers
Suggested answer: B

Explanation:

When configuring Splunk Phantom to integrate with an external Splunk Enterprise instance, it istypically required to have user accounts with sufficient privileges to access data and performnecessary actions. The roles of 'superuser' and 'administrator' in Splunk provide the broad setof permissions needed for such integration, enabling comprehensive access to data,management capabilities, and the execution of searches or actions that Phantom may requireas part of its automated playbooks or investigations.

During a second test of a playbook, a user receives an error that states: 'an empty parameters list was passed to phantom.act()." What does this indicate?

A.
The container has artifacts not parameters.
A.
The container has artifacts not parameters.
Answers
B.
The playbook is using an incorrect container.
B.
The playbook is using an incorrect container.
Answers
C.
The playbook debugger's scope is set to new.
C.
The playbook debugger's scope is set to new.
Answers
D.
The playbook debugger's scope is set to all.
D.
The playbook debugger's scope is set to all.
Answers
Suggested answer: A

What does a user need to do to have a container with an event from Splunk use context-aware actions designed for notable events?

A.
Include the notable event's event_id field and set the artifacts label to aplunk notable event id.
A.
Include the notable event's event_id field and set the artifacts label to aplunk notable event id.
Answers
B.
Rename the event_id field from the notable event to splunkNotableEventld.
B.
Rename the event_id field from the notable event to splunkNotableEventld.
Answers
C.
Include the event_id field in the search results and add a CEF definition to Phantom for event_id, datatype splunk notable event id.
C.
Include the event_id field in the search results and add a CEF definition to Phantom for event_id, datatype splunk notable event id.
Answers
D.
Add a custom field to the container named event_id and set the custom field's data type to splunk notable event id.
D.
Add a custom field to the container named event_id and set the custom field's data type to splunk notable event id.
Answers
Suggested answer: C

Explanation:

For a container in Splunk SOAR to utilize context-aware actions designed for notable eventsfrom Splunk, it is crucial to ensure that the notable event's unique identifier (event_id) isincluded in the search results pulled into SOAR. Moreover, by adding a Common Event Format(CEF) definition for the event_id field within Phantom, and setting its data type to somethingthat denotes it as a Splunk notable event ID, SOAR can recognize and appropriately handlethese identifiers. This setup facilitates the correct mapping and processing of notable eventdata within SOAR, enabling the execution of context-aware actions that are specifically tailoredto the characteristics of Splunk notable events.

After enabling multi-tenancy, which of the Mowing is the first configuration step?

A.
Select the associated tenant artifacts.
A.
Select the associated tenant artifacts.
Answers
B.
Change the tenant permissions.
B.
Change the tenant permissions.
Answers
C.
Set default tenant base address.
C.
Set default tenant base address.
Answers
D.
Configure the default tenant.
D.
Configure the default tenant.
Answers
Suggested answer: D

Explanation:

Upon enabling multi-tenancy in Splunk SOAR, the first step in configuration typically involvessetting up the default tenant. This foundational step is critical as it establishes the primaryoperating environment under which subsequent tenants can be created and managed. Thedefault tenant serves as the template for permissions, settings, and configurations that mightbe inherited or customized by additional tenants. Proper configuration of the default tenant
ensures a stable and consistent framework for multi-tenancy operations, allowing forsegregated environments within the same SOAR instance, each tailored to specific operationalneeds or organizational units.

When configuring a Splunk asset for Phantom to connect to a SplunkC loud instance, the user discovers that they need to be able to run two different on_poll searches. How is this possible

A.
Enter the two queries in the asset as comma separated values.
A.
Enter the two queries in the asset as comma separated values.
Answers
B.
Configure the second query in the Phantom app for Splunk.
B.
Configure the second query in the Phantom app for Splunk.
Answers
C.
Install a second Splunk app and configure the query in the second app.
C.
Install a second Splunk app and configure the query in the second app.
Answers
D.
Configure a second Splunk asset with the second query.
D.
Configure a second Splunk asset with the second query.
Answers
Suggested answer: D

Explanation:

In scenarios where there's a need to run different on_poll searches for a Splunk Cloud instancefrom Splunk SOAR, configuring a second Splunk asset for the additional query is a practicalsolution. Splunk SOAR's architecture allows for multiple assets of the same type to beconfigured with distinct settings. By setting up a second Splunk asset specifically for the secondon_poll search query, users can maintain separate configurations and ensure that each query isexecuted in its intended context without interference. This approach provides flexibility inmanaging different data collection or monitoring needs within the same SOAR environment.

On a multi-tenant Phantom server, what is the default tenant's ID?

A.
0
A.
0
Answers
B.
Default
B.
Default
Answers
C.
1
C.
1
Answers
D.
*
D.
*
Answers
Suggested answer: C

Explanation:

The correct answer is C because the default tenant's ID is 1. The tenant ID is a unique identifierfor each tenant on a multi-tenant Phantom server. The default tenant is the tenant that iscreated when Phantom is installed and contains all the existing data and assets. The defaulttenant's ID is always 1 and cannot be changed. Other tenants have IDs that are assignedsequentially starting from 2. SeeSplunk SOAR Documentationfor more details. In a multi-tenantSplunk SOAR environment, the default tenant is typically assigned an ID of 1. This ID is system-generated and is used to uniquely identify the default tenant within the SOAR database andsystem configurations. The default tenant serves as the primary operational environmentbefore any additional tenants are configured, and its ID is crucial for database operations, APIcalls, and internal reference within the SOAR platform. Understanding and correctly usingtenant IDs is essential for managing resources, permissions, and data access in a multi-tenantSOAR setup.

What are indicators?

A.
Action result items that determine the flow of execution in a playbook.
A.
Action result items that determine the flow of execution in a playbook.
Answers
B.
Action results that may appear in multiple containers.
B.
Action results that may appear in multiple containers.
Answers
C.
Artifact values that can appear in multiple containers.
C.
Artifact values that can appear in multiple containers.
Answers
D.
Artifact values with special security significance.
D.
Artifact values with special security significance.
Answers
Suggested answer: C

Which app allows a user to send Splunk Enterprise Security notable events to Phantom?

A.
Any of the integrated Splunk/Phantom Apps
A.
Any of the integrated Splunk/Phantom Apps
Answers
B.
Splunk App for Phantom Reporting.
B.
Splunk App for Phantom Reporting.
Answers
C.
Splunk App for Phantom.
C.
Splunk App for Phantom.
Answers
D.
Phantom App for Splunk.
D.
Phantom App for Splunk.
Answers
Suggested answer: A

Some of the playbooks on the Phantom server should only be executed by members of the admin role. How can this rule be applied?

A.
Add a filter block to al restricted playbooks that Titters for runRole - "Admin''.
A.
Add a filter block to al restricted playbooks that Titters for runRole - "Admin''.
Answers
B.
Add a tag with restricted access to the restricted playbooks.
B.
Add a tag with restricted access to the restricted playbooks.
Answers
C.
Make sure the Execute Playbook capability is removed from al roles except admin.
C.
Make sure the Execute Playbook capability is removed from al roles except admin.
Answers
D.
Place restricted playbooks in a second source repository that has restricted access.
D.
Place restricted playbooks in a second source repository that has restricted access.
Answers
Suggested answer: C

Explanation:

The correct answer is C because the best way to restrict the execution of playbooks tomembers of the admin role is to make sure the Execute Playbook capability is removed from allroles except admin. The Execute Playbook capability is a permission that allows a user to runany playbook on any container. By default, all roles have this capability, but it can be removedor added in the Phantom UI by going to Administration > User Management > Roles. Removingthis capability from all roles except admin will ensure that only admin users can executeplaybooks. SeeSplunk SOAR Documentationfor more details. To ensure that only members of
the admin role can execute specific playbooks on the Phantom server, the most effectiveapproach is to manage role-based access controls (RBAC) directly. By configuring the system toremove the 'Execute Playbook' capability from all roles except for the admin role, you canenforce this rule. This method leverages Phantom's built-in RBAC mechanisms to restrictplaybook execution privileges. It is a straightforward and secure way to ensure that only userswith the necessary administrative privileges can initiate the execution of sensitive or criticalplaybooks, thus maintaining operational security and control.

Total 96 questions
Go to page: of 10