ExamGecko
Home Home / Splunk / SPLK-5001

Splunk SPLK-5001 Practice Test - Questions Answers, Page 5

Question list
Search
Search

List of questions

Search

Related questions











A Cyber Threat Intelligence (CTI) team produces a report detailing a specific threat actor's typical behaviors and intent. This would be an example of what type of intelligence?

A.
Operational
A.
Operational
Answers
B.
Executive
B.
Executive
Answers
C.
Tactical
C.
Tactical
Answers
D.
Strategic
D.
Strategic
Answers
Suggested answer: D

An analyst is building a search to examine Windows XML Event Logs, but the initial search is not returning any extracted fields. Based on the above image, what is the most likely cause?

A.
The analyst does not have the proper role to search this data.
A.
The analyst does not have the proper role to search this data.
Answers
B.
The analyst is searching newly indexed data that was improperly parsed.
B.
The analyst is searching newly indexed data that was improperly parsed.
Answers
C.
The analyst did not add the excract command to their search pipeline.
C.
The analyst did not add the excract command to their search pipeline.
Answers
D.
The analyst is not in the Drooer Search Mode and should switch to Smart or Verbose.
D.
The analyst is not in the Drooer Search Mode and should switch to Smart or Verbose.
Answers
Suggested answer: C

An organization is using Risk-Based Alerting (RBA). During the past few days, a user account generated multiple risk observations. Splunk refers to this account as what type of entity?

A.
Risk Factor
A.
Risk Factor
Answers
B.
Risk Index
B.
Risk Index
Answers
C.
Risk Analysis
C.
Risk Analysis
Answers
D.
Risk Object
D.
Risk Object
Answers
Suggested answer: B

A Cyber Threat Intelligence (CTI) team delivers a briefing to the CISO detailing their view of the threat landscape the organization faces. This is an example of what type of Threat Intelligence?

A.
Tactical
A.
Tactical
Answers
B.
Strategic
B.
Strategic
Answers
C.
Operational
C.
Operational
Answers
D.
Executive
D.
Executive
Answers
Suggested answer: B

An analyst investigates an IDS alert and confirms suspicious traffic to a known malicious IP. What Enterprise Security data model would they use to investigate which process initiated the network connection?

A.
Endpoint
A.
Endpoint
Answers
B.
Authentication
B.
Authentication
Answers
C.
Network traffic
C.
Network traffic
Answers
D.
Web
D.
Web
Answers
Suggested answer: A

Which of the following is a best practice for searching in Splunk?

A.
Streaming commands run before aggregating commands in the Search pipeline.
A.
Streaming commands run before aggregating commands in the Search pipeline.
Answers
B.
Raw word searches should contain multiple wildcards to ensure all edge cases are covered.
B.
Raw word searches should contain multiple wildcards to ensure all edge cases are covered.
Answers
C.
Limit fields returned from the search utilizing the cable command.
C.
Limit fields returned from the search utilizing the cable command.
Answers
D.
Searching over All Time ensures that all relevant data is returned.
D.
Searching over All Time ensures that all relevant data is returned.
Answers
Suggested answer: C

While testing the dynamic removal of credit card numbers, an analyst lands on using the rex command. What mode needs to be set to in order to replace the defined values with X?

| makeresults

| eval ccnumber='511388720478619733'

| rex field=ccnumber mode=??? 's/(\d{4}-){3)/XXXX-XXXX-XXXX-/g'

Please assume that the above rex command is correctly written.

A.
sed
A.
sed
Answers
B.
replace
B.
replace
Answers
C.
mask
C.
mask
Answers
D.
substitute
D.
substitute
Answers
Suggested answer: A

An analyst is examining the logs for a web application's login form. They see thousands of failed logon attempts using various usernames and passwords. Internet research indicates that these credentials may have been compiled by combining account information from several recent data breaches.

Which type of attack would this be an example of?

A.
Credential sniffing
A.
Credential sniffing
Answers
B.
Password cracking
B.
Password cracking
Answers
C.
Password spraying
C.
Password spraying
Answers
D.
Credential stuffing
D.
Credential stuffing
Answers
Suggested answer: D

An analysis of an organization's security posture determined that a particular asset is at risk and a new process or solution should be implemented to protect it. Typically, who would be in charge of designing the new process and selecting the required tools to implement it?

A.
SOC Manager
A.
SOC Manager
Answers
B.
Security Engineer
B.
Security Engineer
Answers
C.
Security Architect
C.
Security Architect
Answers
D.
Security Analyst
D.
Security Analyst
Answers
Suggested answer: C

After discovering some events that were missed in an initial investigation, an analyst determines this is because some events have an empty src field. Instead, the required data is often captured in another field called machine_name.

What SPL could they use to find all relevant events across either field until the field extraction is fixed?

A.
| eval src = coalesce(src,machine_name)
A.
| eval src = coalesce(src,machine_name)
Answers
B.
| eval src = src + machine_name
B.
| eval src = src + machine_name
Answers
C.
| eval src = src . machine_name
C.
| eval src = src . machine_name
Answers
D.
| eval src = tostring(machine_name)
D.
| eval src = tostring(machine_name)
Answers
Suggested answer: A
Total 66 questions
Go to page: of 7