ExamGecko
Home Home / Splunk / SPLK-2003

Splunk SPLK-2003 Practice Test - Questions Answers, Page 7

Question list
Search
Search

Why does SOAR use wildcards within artifact data paths?

A.

To make playbooks more specific.

A.

To make playbooks more specific.

Answers
B.

To make playbooks filter out nulls.

B.

To make playbooks filter out nulls.

Answers
C.

To make data access in playbooks easier.

C.

To make data access in playbooks easier.

Answers
D.

To make decision execution in playbooks run faster.

D.

To make decision execution in playbooks run faster.

Answers
Suggested answer: C

Explanation:

Wildcards are used within artifact data paths in Splunk SOAR playbooks to simplify the process of accessing data. They allow playbooks to reference dynamic or variable data structures without needing to specify exact paths, which can vary between artifacts. This flexibility makes it easier to write playbooks that work across different events and scenarios, without hard-coding data paths.

SOAR uses wildcards within artifact data paths to make data access in playbooks easier. A data path is a way of specifying the location of a piece of data within an artifact. For example, artifact.cef.sourceAddress is a data path that refers to the source address field of the artifact. A wildcard is a special character that can match any value or subfield within a data path. For example, artifact.*.cef.sourceAddress is a data path that uses a wildcard to match any field name before the cef subfield. This allows the playbook to access the source address data regardless of the field name, which can vary depending on the app or source that generated the artifact. Therefore, option C is the correct answer, as it explains why SOAR uses wildcards within artifact data paths. Option A is incorrect, because wildcards do not make playbooks more specific, but more flexible and adaptable. Option B is incorrect, because wildcards do not make playbooks filter out nulls, but match any value or subfield. Option D is incorrect, because wildcards do not make decision execution in playbooks run faster, but make data access in playbooks easier.

1: Understanding datapaths in Administer Splunk SOAR (Cloud)

Which of the following queries would return all artifacts that contain a SHA1 file hash?

A.

https://<PHANTOM_URL>/rest/artifact?_filter_cef_md5_insull=false

A.

https://<PHANTOM_URL>/rest/artifact?_filter_cef_md5_insull=false

Answers
B.

https://<PHANTOM_URL>/rest/artifact?_filter_cef_Shal_contains=''''

B.

https://<PHANTOM_URL>/rest/artifact?_filter_cef_Shal_contains=''''

Answers
C.

https://<PHANTOM_URL>/rest/artifact?_filter_cef_shal_insull=False

C.

https://<PHANTOM_URL>/rest/artifact?_filter_cef_shal_insull=False

Answers
D.

https://<PHANTOM_URL>/rest/artifact?_filter_shal__insull=False

D.

https://<PHANTOM_URL>/rest/artifact?_filter_shal__insull=False

Answers
Suggested answer: B

Explanation:

To return all artifacts that contain a SHA1 file hash using the Splunk SOAR REST API, the correct query would use the_filter_cef_Shal_containsparameter. This parameter filters the artifacts to only those that contain a value in the SHA1 field within the Common Event Format (CEF) data structure.Thecontainsoperator is used to match any artifacts that have a SHA1 hash present1.

Understanding artifacts - Splunk Documentation

What is the default embedded search engine used by SOAR?

A.

Embedded Splunk search engine.

A.

Embedded Splunk search engine.

Answers
B.

Embedded SOAR search engine.

B.

Embedded SOAR search engine.

Answers
C.

Embedded Django search engine.

C.

Embedded Django search engine.

Answers
D.

Embedded Elastic search engine.

D.

Embedded Elastic search engine.

Answers
Suggested answer: B

Explanation:

the default embedded search engine used by SOAR is the SOAR search engine, which is powered by the PostgreSQL database built-in to Splunk SOAR (Cloud). A Splunk SOAR (Cloud) Administrator can configure options for search from the Home menu, in Search Settings under Administration Settings. The SOAR search engine has been modified to accept the * wildcard and supports various operators and filters. For search syntax and examples, see Search within Splunk SOAR (Cloud)2.

Option A is incorrect, because the embedded Splunk search engine was used in earlier releases of Splunk SOAR (Cloud), but not in the current version. Option C is incorrect, because Django is a web framework, not a search engine. Option D is incorrect, because Elastic is a separate search engine that is not embedded in Splunk SOAR (Cloud).

1: Configure search in Splunk SOAR (Cloud) 2: Search within Splunk SOAR (Cloud)

Splunk SOAR utilizes its own embedded search engine by default, which is tailored to its security orchestration and automation framework. While Splunk SOAR can integrate with other search engines, like the Embedded Splunk search engine, for advanced capabilities and log analytics, its default setup comes with an embedded search engine optimized for the typical data and search patterns encountered within the SOAR platform.

How can the DECIDED process be restarted?

A.

By restarting the playbook daemon.

A.

By restarting the playbook daemon.

Answers
B.

On the System Health page.

B.

On the System Health page.

Answers
C.

In Administration > Server Settings.

C.

In Administration > Server Settings.

Answers
D.

By restarting the automation service.

D.

By restarting the automation service.

Answers
Suggested answer: D

Explanation:

DECIDED process is a core component of the SOAR automation engine that handles the execution of playbooks and actions. The DECIDED process can be restarted by restarting the automation service, which can be done from the command line using the service phantom restart command2. Restarting the automation service also restarts the playbook daemon, which is another core component of the SOAR automation engine that handles the loading and unloading of playbooks3. Therefore, option D is the correct answer, as it restarts both the DECIDED process and the playbook daemon. Option A is incorrect, because restarting the playbook daemon alone does not restart the DECIDED process. Option B is incorrect, because the System Health page does not provide an option to restart the DECIDED process or the automation service. Option C is incorrect, because the Administration > Server Settings page does not provide an option to restart the DECIDED process or the automation service.

In Splunk SOAR, if the DECIDED process, which is responsible for playbook execution, needs to be restarted, this can typically be done by restarting the automation (or phantom) service. This service manages the automation processes, including playbook execution. Restarting it can reset the DECIDED process, resolving issues related to playbook execution or process hangs.

Which of the following can be configured in the ROI Settings?

A.

Number of full time employees (FTEs).

A.

Number of full time employees (FTEs).

Answers
B.

Time lost.

B.

Time lost.

Answers
C.

Analyst hours per month.

C.

Analyst hours per month.

Answers
D.

Annual analyst salary.

D.

Annual analyst salary.

Answers
Suggested answer: C

Explanation:

ROI Settings dashboard allows you to configure the parameters used to estimate the data displayed in the Automation ROI Summary dashboard. One of the settings that can be configured is the FTE Gained, which is the number of full time employees (FTEs) that are freed up by automation. To calculate this value, Splunk SOAR divides the number of actions run by automation by the number of expected actions an analyst would take, based on minutes per action and analyst hours per day. Therefore, option A is the correct answer, as it is one of the settings that can be configured in the ROI Settings dashboard. Option B is incorrect, because time lost is not a setting that can be configured in the ROI Settings dashboard, but a metric that is calculated by Splunk SOAR based on the difference between the analyst minutes per action and the actual minutes per action. Option C is incorrect, because analyst hours per month is not a setting that can be configured in the ROI Settings dashboard, but a value that is derived from the analyst hours per day setting. Option D is incorrect, because annual analyst salary is a setting that can be configured in the ROI Settings dashboard, but not the one that is asked in the question.

1: Configure the ROI Settings dashboard in Administer Splunk SOAR (On-premises)

ROI (Return on Investment) Settings within Splunk SOAR are used to estimate the efficiency and financial impact of the SOAR platform. One of the configurable parameters in these settings is the 'Analyst hours per month'. This parameter helps in calculating the time saved through automation, which in turn can be translated into cost savings and efficiency gains. It reflects the direct contribution of the SOAR platform to operational productivity.

What are the components of the I2A2 design methodology?

A.

Inputs, Interactions, Actions, Apps

A.

Inputs, Interactions, Actions, Apps

Answers
B.

Inputs, Interactions, Actions, Artifacts

B.

Inputs, Interactions, Actions, Artifacts

Answers
C.

Inputs, Interactions, Apps, Artifacts

C.

Inputs, Interactions, Apps, Artifacts

Answers
D.

Inputs, Interactions, Actions, Assets

D.

Inputs, Interactions, Actions, Assets

Answers
Suggested answer: B

Explanation:

I2A2 design methodology is a framework for designing playbooks that consists of four components:

* Inputs: The data that is required for the playbook to run, such as artifacts, parameters, or custom fields.

* Interactions: The blocks that allow the playbook to communicate with users or other systems, such as prompts, comments, or emails.

* Actions: The blocks that execute the core logic of the playbook, such as app actions, filters, decisions, or utilities.

* Artifacts: The data that is generated or modified by the playbook, such as new artifacts, container fields, or notes.

The I2A2 design methodology helps you to plan, structure, and test your playbooks in a modular and efficient way. Therefore, option B is the correct answer, as it lists the correct components of the I2A2 design methodology. Option A is incorrect, because apps are not a component of the I2A2 design methodology, but a source of actions that can be used in the playbook. Option C is incorrect, for the same reason as option A. Option D is incorrect, because assets are not a component of the I2A2 design methodology, but a configuration of app credentials that can be used in the playbook.

1: Use a playbook design methodology in Administer Splunk SOAR (Cloud)

The I2A2 design methodology is an approach used in Splunk SOAR to structure and design playbooks. The acronym stands for Inputs, Interactions, Actions, and Artifacts. This methodology guides the creation of playbooks by focusing on these four key components, ensuring that all necessary aspects of an automated response are considered and effectively implemented within the platform.

Some of the playbooks on the SOAR server should only be executed by members of the admin role. How can this rule be applied?

A.

Make sure the Execute Playbook capability is removed from all roles except admin.

A.

Make sure the Execute Playbook capability is removed from all roles except admin.

Answers
B.

Place restricted playbooks in a second source repository that has restricted access.

B.

Place restricted playbooks in a second source repository that has restricted access.

Answers
C.

Add a filter block to all restricted playbooks that filters for runRole = 'Admin'.

C.

Add a filter block to all restricted playbooks that filters for runRole = 'Admin'.

Answers
D.

Add a tag with restricted access to the restricted playbooks.

D.

Add a tag with restricted access to the restricted playbooks.

Answers
Suggested answer: A

Explanation:

To restrict playbook execution to members of the admin role within Splunk SOAR, the 'Execute Playbook' capability must be managed appropriately. This is done by ensuring that this capability is removed from all other roles except the admin role. Role-based access control (RBAC) in Splunk SOAR allows for granular permissions, which means you can configure which roles have the ability to execute playbooks, and by restricting this capability, you can control which users are able to initiate playbook runs.

Which of the following can be edited or deleted in the Investigation page?

A.

Action results

A.

Action results

Answers
B.

Comments

B.

Comments

Answers
C.

Approval records

C.

Approval records

Answers
D.

Artifact values

D.

Artifact values

Answers
Suggested answer: B

Explanation:

On the Investigation page in Splunk SOAR, users have the ability to edit or delete comments associated with an event or a container. Comments are generally used for collaboration and to provide additional context to an investigation. While action results, approval records, and artifact values are typically not editable or deletable to maintain the integrity of the investigative data, comments are more flexible and can be managed by users to reflect the current state of the investigation.

Investigation page allows you to view and edit various information and data related to an event or a case. One of the things that you can edit or delete in the Investigation page is the comments that you or other users have added to the activity feed. Comments are a way of communicating and collaborating with other users during the investigation process. You can edit or delete your own comments by clicking on the three-dot menu icon next to the comment and selecting the appropriate option. You can also reply to other users' comments by clicking on the reply icon. Therefore, option B is the correct answer, as it is the only option that can be edited or deleted in the Investigation page. Option A is incorrect, because action results are the outputs of the actions or playbooks that have been run on the event or case, and they cannot be edited or deleted in the Investigation page. Option C is incorrect, because approval records are the logs of the approval requests and responses that have been made for certain actions or playbooks, and they cannot be edited or deleted in the Investigation page. Option D is incorrect, because artifact values are the data that has been collected or generated by the event or case, and they cannot be edited or deleted in the Investigation page.

1: Start with Investigation in Splunk SOAR (Cloud)

Which of the following roles is appropriate for a Splunk SOAR account that will only be used to execute automated tasks?

A.

Non-Human

A.

Non-Human

Answers
B.

Automation

B.

Automation

Answers
C.

Automation Engineer

C.

Automation Engineer

Answers
D.

Service Account

D.

Service Account

Answers
Suggested answer: B

Explanation:

In Splunk SOAR, the appropriate role for an account that will only be used to execute automated tasks is the ''Automation'' role. This service account role is specifically designed for automated tasks, including REST API operations, playbook execution, and ingestion.It is intended for use by systems rather than human users and provides the necessary permissions for automated interactions with the SOAR platform1.

Reference: Splunk SOAR documentation on managing roles and permissions1.

In Splunk SOAR, the ''Automation'' role is designed specifically for accounts that are intended for executing automated tasks. These tasks can include REST API operations, playbook actions, and data ingestion processes. The Automation role is a type of service account role intended for system-to-system interactions and is not meant to be used by human operators. It provides a tailored set of permissions that allows for the execution of automated processes without granting broader access that would be unnecessary or insecure for an automated account.

The designation of this role is critical in maintaining proper security and operational boundaries within the SOAR platform. By restricting the automated account to just the Automation role, Splunk SOAR ensures that automated processes run with the least privilege necessary, reducing the risk of unauthorized actions and maintaining a clear separation between human users and automated systems.

To limit the impact of custom code on the VPE, where should the custom code be placed?

A.

A custom container or a separate KV store.

A.

A custom container or a separate KV store.

Answers
B.

A separate code repository.

B.

A separate code repository.

Answers
C.

A custom function block.

C.

A custom function block.

Answers
D.

A separate container.

D.

A separate container.

Answers
Suggested answer: C

Explanation:

To limit the impact of custom code on the Visual Playbook Editor (VPE) in Splunk SOAR, custom code should be placed within a custom function block. Custom function blocks are designed to encapsulate code within a playbook, allowing users to input their own Python code and execute it as part of the playbook run. By confining custom code to these blocks, it maintains the VPE's performance and stability by isolating the custom code from the core functions of the playbook.

A custom function block is a way of adding custom Python code to your playbook, which can expand the functionality and processing of your playbook logic. Custom functions can also interact with the REST API in a customizable way. You can share custom functions across your team and across multiple playbooks to increase collaboration and efficiency. To create custom functions, you must have Edit Code permissions, which can be configured by an Administrator in Administration > User Management > Roles and Permissions. Therefore, option C is the correct answer, as it is the recommended way of placing custom code on the VPE, which limits the impact of custom code on the VPE performance and security. Option A is incorrect, because a custom container or a separate KV store are not valid ways of placing custom code on the VPE, but rather ways of storing data or artifacts. Option B is incorrect, because a separate code repository is not a way of placing custom code on the VPE, but rather a way of managing and versioning your code outside of Splunk SOAR. Option D is incorrect, because a separate container is not a way of placing custom code on the VPE, but rather a way of creating a new event or case.

1: Add custom code to your Splunk SOAR (Cloud) playbook with the custom function block using the classic playbook editor

Total 96 questions
Go to page: of 10