ExamGecko
Home Home / Splunk / SPLK-5001

Splunk SPLK-5001 Practice Test - Questions Answers, Page 6

Question list
Search
Search

List of questions

Search

Related questions











An analyst would like to test how certain Splunk SPL commands work against a small set of data. What command should start the search pipeline if they wanted to create their own data instead of utilizing data contained within Splunk?

A.
makeresults
A.
makeresults
Answers
B.
rename
B.
rename
Answers
C.
eval
C.
eval
Answers
D.
stats
D.
stats
Answers
Suggested answer: A

An analysis of an organization's security posture determined that a particular asset is at risk and a new process or solution should be implemented to protect it. Typically, who would be in charge of implementing the new process or solution that was selected?

A.
Security Architect
A.
Security Architect
Answers
B.
SOC Manager
B.
SOC Manager
Answers
C.
Security Engineer
C.
Security Engineer
Answers
D.
Security Analyst
D.
Security Analyst
Answers
Suggested answer: C

Which of the following is a correct Splunk search that will return results in the most performant way?

A.
index=foo host=i-478619733 | stats range(_time) as duration by src_ip | bin duration span=5min | stats count by duration, host
A.
index=foo host=i-478619733 | stats range(_time) as duration by src_ip | bin duration span=5min | stats count by duration, host
Answers
B.
| stats range(_time) as duration by src_ip | index=foo host=i-478619733 | bin duration span=5min | stats count by duration, host
B.
| stats range(_time) as duration by src_ip | index=foo host=i-478619733 | bin duration span=5min | stats count by duration, host
Answers
C.
index=foo host=i-478619733 | transaction src_ip |stats count by host
C.
index=foo host=i-478619733 | transaction src_ip |stats count by host
Answers
D.
index=foo | transaction src_ip |stats count by host | search host=i-478619733
D.
index=foo | transaction src_ip |stats count by host | search host=i-478619733
Answers
Suggested answer: A

There are many resources for assisting with SPL and configuration questions. Which of the following resources feature community-sourced answers?

A.
Splunk Answers
A.
Splunk Answers
Answers
B.
Splunk Lantern
B.
Splunk Lantern
Answers
C.
Splunk Guidebook
C.
Splunk Guidebook
Answers
D.
Splunk Documentation
D.
Splunk Documentation
Answers
Suggested answer: A

A successful Continuous Monitoring initiative involves the entire organization. When an analyst discovers the need for more context or additional information, perhaps from additional data sources or altered correlation rules, to what role would this request generally escalate?

A.
SOC Manager
A.
SOC Manager
Answers
B.
Security Analyst
B.
Security Analyst
Answers
C.
Security Engineer
C.
Security Engineer
Answers
D.
Security Architect
D.
Security Architect
Answers
Suggested answer: C

What is the following step-by-step description an example of?

1. The attacker devises a non-default beacon profile with Cobalt Strike and embeds this within a document.

2. The attacker creates a unique email with the malicious document based on extensive research about their target.

3. When the victim opens this document, a C2 channel is established to the attacker's temporary infrastructure on a compromised website.

A.
Tactic
A.
Tactic
Answers
B.
Policy
B.
Policy
Answers
C.
Procedure
C.
Procedure
Answers
D.
Technique
D.
Technique
Answers
Suggested answer: D

Which of the following is a tactic used by attackers, rather than a technique?

A.
Gathering information about a target.
A.
Gathering information about a target.
Answers
B.
Establishing persistence with a scheduled task.
B.
Establishing persistence with a scheduled task.
Answers
C.
Using a phishing email to gain initial access.
C.
Using a phishing email to gain initial access.
Answers
D.
Escalating privileges via UAC bypass.
D.
Escalating privileges via UAC bypass.
Answers
Suggested answer: A

Which stage of continuous monitoring involves adding data, creating detections, and building drilldowns?

A.
Implement and Collect
A.
Implement and Collect
Answers
B.
Establish and Architect
B.
Establish and Architect
Answers
C.
Respond and Review
C.
Respond and Review
Answers
D.
Analyze and Report
D.
Analyze and Report
Answers
Suggested answer: A

An analyst is investigating how an attacker successfully performs a brute-force attack to gain a foothold into an organizations systems. In the course of the investigation the analyst determines that the reason no alerts were generated is because the detection searches were configured to run against Windows data only and excluding any Linux data.

This is an example of what?

A.
A True Positive.
A.
A True Positive.
Answers
B.
A True Negative.
B.
A True Negative.
Answers
C.
A False Negative.
C.
A False Negative.
Answers
D.
A False Positive.
D.
A False Positive.
Answers
Suggested answer: C

The field file_acl contains access controls associated with files affected by an event. In which data model would an analyst find this field?

A.
Malware
A.
Malware
Answers
B.
Alerts
B.
Alerts
Answers
C.
Vulnerabilities
C.
Vulnerabilities
Answers
D.
Endpoint
D.
Endpoint
Answers
Suggested answer: D
Total 66 questions
Go to page: of 7