Splunk SPLK-3001 Practice Test - Questions Answers
List of questions
Question 1
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
The Add-On Builder creates Splunk Apps that start with what?
Explanation:
Reference:
https://dev.splunk.com/enterprise/docs/developapps/enterprisesecurity/abouttheessolution/
Question 2
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
Which of the following are examples of sources for events in the endpoint security domain dashboards?
Explanation:
Reference:
https://docs.splunk.com/Documentation/ES/6.1.0/User/EndpointProtectionDomaindashboards
Question 3
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
When creating custom correlation searches, what format is used to embed field values in the title, description, and drill-down fields of a notable event?
Explanation:
Reference: https://docs.splunk.com/Documentation/ITSI/4.4.2/Configure/Createcorrelationsearch
Question 4
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
What feature of Enterprise Security downloads threat intelligence data from a web server?
Explanation:
"The Threat Intelligence Framework provides a modular input (Threat Intelligence Downloads) that handles the majority of configurations typically needed for downloading intelligence files & data. To access this modular input, you simply need to create a stanza in your Inputs.conf file called “threatlist”."
Question 5
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
The Remote Access panel within the User Activity dashboard is not populating with the most recent hour of dat a. What data model should be checked for potential errors such as skipped searches?
Explanation:
Reference: https://answers.splunk.com/answers/565482/how-to-resolve-skipped-scheduledsearches.html
Question 6
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
In order to include an eventtype in a data model node, what is the next step after extracting the correct fields?
Explanation:
Reference:
https://docs.splunk.com/Documentation/CIM/4.15.0/User/UsetheCIMtonormalizeOSSECdata
Question 7
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
What role should be assigned to a security team member who will be taking ownership of notable events in the incident review dashboard?
Explanation:
Reference: https://docs.splunk.com/Documentation/ES/6.1.0/User/Triagenotableevents
Question 8
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
Which column in the Asset or Identity list is combined with event security to make a notable event’s urgency?
Explanation:
Reference: https://docs.splunk.com/Documentation/ES/6.1.0/User/Howurgencyisassigned
Question 9
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
What does the risk framework add to an object (user, server or other type) to indicate increased risk?
Explanation:
Reference: https://docs.splunk.com/Documentation/ES/6.1.0/User/RiskScoring
Question 10
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
Which indexes are searched by default for CIM data models?
Explanation:
Reference: https://answers.splunk.com/answers/600354/indexes-searched-by-cim-datamodels.html
Question