ExamGecko
Home Home / Splunk / SPLK-3001

Splunk SPLK-3001 Practice Test - Questions Answers

Question list
Search
Search

Question 1

Report
Export
Collapse

The Add-On Builder creates Splunk Apps that start with what?

A.
DA
A.
DA
Answers
B.
SA
B.
SA
Answers
C.
TA
C.
TA
Answers
D.
App-
D.
App-
Answers
Suggested answer: C

Explanation:

Reference:

https://dev.splunk.com/enterprise/docs/developapps/enterprisesecurity/abouttheessolution/

asked 23/09/2024
Babak Sadeghpour
28 questions

Question 2

Report
Export
Collapse

Which of the following are examples of sources for events in the endpoint security domain dashboards?

A.
REST API invocations.
A.
REST API invocations.
Answers
B.
Investigation final results status.
B.
Investigation final results status.
Answers
C.
Workstations, notebooks, and point-of-sale systems.
C.
Workstations, notebooks, and point-of-sale systems.
Answers
D.
Lifecycle auditing of incidents, from assignment to resolution.
D.
Lifecycle auditing of incidents, from assignment to resolution.
Answers
Suggested answer: C

Explanation:

Reference:

https://docs.splunk.com/Documentation/ES/6.1.0/User/EndpointProtectionDomaindashboards

asked 23/09/2024
Rodrigo Serrano dos Santos
38 questions

Question 3

Report
Export
Collapse

When creating custom correlation searches, what format is used to embed field values in the title, description, and drill-down fields of a notable event?

A.
$fieldname$
A.
$fieldname$
Answers
B.
“fieldname”
B.
“fieldname”
Answers
C.
%fieldname%
C.
%fieldname%
Answers
D.
_fieldname_
D.
_fieldname_
Answers
Suggested answer: A

Explanation:

Reference: https://docs.splunk.com/Documentation/ITSI/4.4.2/Configure/Createcorrelationsearch

asked 23/09/2024
Mitesh Patel
44 questions

Question 4

Report
Export
Collapse

What feature of Enterprise Security downloads threat intelligence data from a web server?

A.
Threat Service Manager
A.
Threat Service Manager
Answers
B.
Threat Download Manager
B.
Threat Download Manager
Answers
C.
Threat Intelligence Parser
C.
Threat Intelligence Parser
Answers
D.
Therat Intelligence Enforcement
D.
Therat Intelligence Enforcement
Answers
Suggested answer: B

Explanation:

"The Threat Intelligence Framework provides a modular input (Threat Intelligence Downloads) that handles the majority of configurations typically needed for downloading intelligence files & data. To access this modular input, you simply need to create a stanza in your Inputs.conf file called “threatlist”."

asked 23/09/2024
Peter Unterasinger
42 questions

Question 5

Report
Export
Collapse

The Remote Access panel within the User Activity dashboard is not populating with the most recent hour of dat a. What data model should be checked for potential errors such as skipped searches?

A.
Web
A.
Web
Answers
B.
Risk
B.
Risk
Answers
C.
Performance
C.
Performance
Answers
D.
Authentication
D.
Authentication
Answers
Suggested answer: D

Explanation:

Reference: https://answers.splunk.com/answers/565482/how-to-resolve-skipped-scheduledsearches.html

asked 23/09/2024
Duane Joyce
33 questions

Question 6

Report
Export
Collapse

In order to include an eventtype in a data model node, what is the next step after extracting the correct fields?

A.
Save the settings.
A.
Save the settings.
Answers
B.
Apply the correct tags.
B.
Apply the correct tags.
Answers
C.
Run the correct search.
C.
Run the correct search.
Answers
D.
Visit the CIM dashboard.
D.
Visit the CIM dashboard.
Answers
Suggested answer: C

Explanation:

Reference:

https://docs.splunk.com/Documentation/CIM/4.15.0/User/UsetheCIMtonormalizeOSSECdata

asked 23/09/2024
Marcin Piotrowski
40 questions

Question 7

Report
Export
Collapse

What role should be assigned to a security team member who will be taking ownership of notable events in the incident review dashboard?

A.
ess_user
A.
ess_user
Answers
B.
ess_admin
B.
ess_admin
Answers
C.
ess_analyst
C.
ess_analyst
Answers
D.
ess_reviewer
D.
ess_reviewer
Answers
Suggested answer: B

Explanation:

Reference: https://docs.splunk.com/Documentation/ES/6.1.0/User/Triagenotableevents

asked 23/09/2024
Justin Kim
38 questions

Question 8

Report
Export
Collapse

Which column in the Asset or Identity list is combined with event security to make a notable event’s urgency?

A.
VIP
A.
VIP
Answers
B.
Priority
B.
Priority
Answers
C.
Importance
C.
Importance
Answers
D.
Criticality
D.
Criticality
Answers
Suggested answer: B

Explanation:

Reference: https://docs.splunk.com/Documentation/ES/6.1.0/User/Howurgencyisassigned

asked 23/09/2024
marco damone
41 questions

Question 9

Report
Export
Collapse

What does the risk framework add to an object (user, server or other type) to indicate increased risk?

A.
An urgency.
A.
An urgency.
Answers
B.
A risk profile.
B.
A risk profile.
Answers
C.
An aggregation.
C.
An aggregation.
Answers
D.
A numeric score.
D.
A numeric score.
Answers
Suggested answer: D

Explanation:

Reference: https://docs.splunk.com/Documentation/ES/6.1.0/User/RiskScoring

asked 23/09/2024
rayan rayanalbanna
44 questions

Question 10

Report
Export
Collapse

Which indexes are searched by default for CIM data models?

A.
notable and default
A.
notable and default
Answers
B.
summary and notable
B.
summary and notable
Answers
C.
_internal and summary
C.
_internal and summary
Answers
D.
All indexes
D.
All indexes
Answers
Suggested answer: D

Explanation:

Reference: https://answers.splunk.com/answers/600354/indexes-searched-by-cim-datamodels.html

asked 23/09/2024
Lionel Fitzgerald Gweth
44 questions
Total 99 questions
Go to page: of 10