ExamGecko
Home Home / Splunk / SPLK-5001

Splunk SPLK-5001 Practice Test - Questions Answers, Page 7

Question list
Search
Search

Related questions











A threat hunter generates a report containing the list of users who have logged in to a particular database during the last 6 months, along with the number of times they have each authenticated. They sort this list and remove any user names who have logged in more than 6 times. The remaining names represent the users who rarely log in, as their activity is more suspicious. The hunter examines each of these rare logins in detail.

This is an example of what type of threat-hunting technique?

A.
Least Frequency of Occurrence Analysis
A.
Least Frequency of Occurrence Analysis
Answers
B.
Co-Occurrence Analysis
B.
Co-Occurrence Analysis
Answers
C.
Time Series Analysis
C.
Time Series Analysis
Answers
D.
Outlier Frequency Analysis
D.
Outlier Frequency Analysis
Answers
Suggested answer: A

What is the main difference between hypothesis-driven and data-driven Threat Hunting?

A.
Data-driven hunts always require more data to search through than hypothesis-driven hunts.
A.
Data-driven hunts always require more data to search through than hypothesis-driven hunts.
Answers
B.
Data-driven hunting tries to uncover activity within an existing data set, hypothesis-driven hunting begins with a potential activity that the hunter thinks may be happening.
B.
Data-driven hunting tries to uncover activity within an existing data set, hypothesis-driven hunting begins with a potential activity that the hunter thinks may be happening.
Answers
C.
Hypothesis-driven hunts are typically executed on newly ingested data sources, while data-driven hunts are not.
C.
Hypothesis-driven hunts are typically executed on newly ingested data sources, while data-driven hunts are not.
Answers
D.
Hypothesis-driven hunting tries to uncover activity within an existing data set, data-driven hunting begins with an activity that the hunter thinks may be happening.
D.
Hypothesis-driven hunting tries to uncover activity within an existing data set, data-driven hunting begins with an activity that the hunter thinks may be happening.
Answers
Suggested answer: B

The Security Operations Center (SOC) manager is interested in creating a new dashboard for typosquatting after a successful campaign against a group of senior executives. Which existing ES dashboard could be used as a starting point to create a custom dashboard?

A.
IAM Activity
A.
IAM Activity
Answers
B.
Malware Center
B.
Malware Center
Answers
C.
Access Anomalies
C.
Access Anomalies
Answers
D.
New Domain Analysis
D.
New Domain Analysis
Answers
Suggested answer: D

What is the main difference between a DDoS and a DoS attack?

A.
A DDoS attack is a type of physical attack, while a DoS attack is a type of cyberattack.
A.
A DDoS attack is a type of physical attack, while a DoS attack is a type of cyberattack.
Answers
B.
A DDoS attack uses a single source to target a single system, while a DoS attack uses multiple sources to target multiple systems.
B.
A DDoS attack uses a single source to target a single system, while a DoS attack uses multiple sources to target multiple systems.
Answers
C.
A DDoS attack uses multiple sources to target a single system, while a DoS attack uses a single source to target a single or multiple systems.
C.
A DDoS attack uses multiple sources to target a single system, while a DoS attack uses a single source to target a single or multiple systems.
Answers
D.
A DDoS attack uses a single source to target multiple systems, while a DoS attack uses multiple sources to target a single system.
D.
A DDoS attack uses a single source to target multiple systems, while a DoS attack uses multiple sources to target a single system.
Answers
Suggested answer: C

An analyst is looking at Web Server logs, and sees the following entry as the last web request that a server processed before unexpectedly shutting down:

147.186.119.107 - - [28/Jul/2006:10:27:10 -0300] 'POST /cgi-bin/shutdown/ HTTP/1.0' 200 3333

What kind of attack is most likely occurring?

A.
Distributed denial of service attack.
A.
Distributed denial of service attack.
Answers
B.
Denial of service attack.
B.
Denial of service attack.
Answers
C.
Database injection attack.
C.
Database injection attack.
Answers
D.
Cross-Site scripting attack.
D.
Cross-Site scripting attack.
Answers
Suggested answer: B

Which of the Enterprise Security frameworks provides additional automatic context and correlation to fields that exist within raw data?

A.
Asset and Identity
A.
Asset and Identity
Answers
B.
Threat Intelligence
B.
Threat Intelligence
Answers
C.
Adaptive Response
C.
Adaptive Response
Answers
D.
Risk
D.
Risk
Answers
Suggested answer: A
Total 66 questions
Go to page: of 7