ExamGecko
Home Home / Splunk / SPLK-5001

Splunk SPLK-5001 Practice Test - Questions Answers

Question list
Search
Search

List of questions

Search

Related questions











When searching in Splunk, which of the following SPL commands can be used to run a subsearch across every field in a wildcard field list?

A.
foreach
A.
foreach
Answers
B.
rex
B.
rex
Answers
C.
makeresults
C.
makeresults
Answers
D.
transaction
D.
transaction
Answers
Suggested answer: A

How are Notable Events configured in Splunk Enterprise Security?

A.
During an investigation.
A.
During an investigation.
Answers
B.
As part of an audit.
B.
As part of an audit.
Answers
C.
Via an Adaptive Response Action in a regular search.
C.
Via an Adaptive Response Action in a regular search.
Answers
D.
Via an Adaptive Response Action in a correlation search.
D.
Via an Adaptive Response Action in a correlation search.
Answers
Suggested answer: D

An analyst is investigating a network alert for suspected lateral movement from one Windows host to another Windows host. According to Splunk CIM documentation, the IP address of the host from which the attacker is moving would be in which field?

A.
host
A.
host
Answers
B.
dest
B.
dest
Answers
C.
src_nt_host
C.
src_nt_host
Answers
D.
src_ip
D.
src_ip
Answers
Suggested answer: D

Which of the following is a best practice when creating performant searches within Splunk?

A.
Utilize the transaction command to aggregate data for faster analysis.
A.
Utilize the transaction command to aggregate data for faster analysis.
Answers
B.
Utilize Aggregating commands to ensure all data is available prior to Streaming commands.
B.
Utilize Aggregating commands to ensure all data is available prior to Streaming commands.
Answers
C.
Utilize specific fields to return only the data that is required.
C.
Utilize specific fields to return only the data that is required.
Answers
D.
Utilize multiple wildcards across fields to ensure returned data is complete and available.
D.
Utilize multiple wildcards across fields to ensure returned data is complete and available.
Answers
Suggested answer: C

Which pre-packaged app delivers security content and detections on a regular, ongoing basis for Enterprise Security and SOAR?

A.
SSE
A.
SSE
Answers
B.
ESCU
B.
ESCU
Answers
C.
Threat Hunting
C.
Threat Hunting
Answers
D.
InfoSec
D.
InfoSec
Answers
Suggested answer: B

Which search command allows an analyst to match whatever is inside the parentheses as a single term in the index, even if it contains characters that are usually recognized as minor breakers such as periods or underscores?

A.
CASE()
A.
CASE()
Answers
B.
LIKE()
B.
LIKE()
Answers
C.
FORMAT ()
C.
FORMAT ()
Answers
D.
TERM ()
D.
TERM ()
Answers
Suggested answer: D

Which field is automatically added to search results when assets are properly defined and enabled in Splunk Enterprise Security?

A.
asset_category
A.
asset_category
Answers
B.
src_ip
B.
src_ip
Answers
C.
src_category
C.
src_category
Answers
D.
user
D.
user
Answers
Suggested answer: C

An IDS signature is designed to detect and alert on logins to a certain server, but only if they occur from 6:00 PM - 6:00 AM. If no IDS alerts occur in this window, but the signature is known to be correct, this would be an example of what?

A.
A True Negative.
A.
A True Negative.
Answers
B.
A True Positive.
B.
A True Positive.
Answers
C.
A False Negative.
C.
A False Negative.
Answers
D.
A False Positive.
D.
A False Positive.
Answers
Suggested answer: A

Which of the following is not a component of the Splunk Security Content library (ESCU, SSE)?

A.
Dashboards
A.
Dashboards
Answers
B.
Reports
B.
Reports
Answers
C.
Correlation searches
C.
Correlation searches
Answers
D.
Validated architectures
D.
Validated architectures
Answers
Suggested answer: D

The eval SPL expression supports many types of functions. Which of these function categories is not valid with eval?

A.
JSON functions
A.
JSON functions
Answers
B.
Text functions
B.
Text functions
Answers
C.
Comparison and Conditional functions
C.
Comparison and Conditional functions
Answers
D.
Threat functions
D.
Threat functions
Answers
Suggested answer: D
Total 66 questions
Go to page: of 7