Splunk SPLK-5001 Practice Test - Questions Answers, Page 7
List of questions
Related questions
Question 61

A threat hunter generates a report containing the list of users who have logged in to a particular database during the last 6 months, along with the number of times they have each authenticated. They sort this list and remove any user names who have logged in more than 6 times. The remaining names represent the users who rarely log in, as their activity is more suspicious. The hunter examines each of these rare logins in detail.
This is an example of what type of threat-hunting technique?
Question 62

What is the main difference between hypothesis-driven and data-driven Threat Hunting?
Question 63

The Security Operations Center (SOC) manager is interested in creating a new dashboard for typosquatting after a successful campaign against a group of senior executives. Which existing ES dashboard could be used as a starting point to create a custom dashboard?
Question 64

What is the main difference between a DDoS and a DoS attack?
Question 65

An analyst is looking at Web Server logs, and sees the following entry as the last web request that a server processed before unexpectedly shutting down:
147.186.119.107 - - [28/Jul/2006:10:27:10 -0300] 'POST /cgi-bin/shutdown/ HTTP/1.0' 200 3333
What kind of attack is most likely occurring?
Question 66

Which of the Enterprise Security frameworks provides additional automatic context and correlation to fields that exist within raw data?
Question