Month End Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Splunk > Splunk > SPLK-5001

SPLK-5001 Splunk Certified Cybersecurity Defense Analyst Question and Answers

Question # 4

Which metric would track improvements in analyst efficiency after dashboard customization?

A.

Mean Time to Detect

B.

Mean Time to Respond

C.

Recovery Time

D.

Dwell Time

Full Access
Question # 5

The Lockheed Martin Cyber Kill Chain® breaks an attack lifecycle into several stages. A threat actor modified the registry on a compromised Windows system to ensure that their malware would automatically run at boot time. Into which phase of the Kill Chain would this fall?

A.

Act on Objectives

B.

Exploitation

C.

Delivery

D.

Installation

Full Access
Question # 6

An analyst investigates an IDS alert and confirms suspicious traffic to a known malicious IP. What Enterprise Security data model would they use to investigate which process initiated the network connection?

A.

Endpoint

B.

Authentication

C.

Network traffic

D.

Web

Full Access
Question # 7

A threat hunter executed a hunt based on the following hypothesis:

As an actor, I want to plant rundll32 for proxy execution of malicious code and leverage Cobalt Strike for Command and Control.

Relevant logs and artifacts such as Sysmon, netflow, IDS alerts, and EDR logs were searched, and the hunter is confident in the conclusion that Cobalt Strike is not present in the company’s environment.

Which of the following best describes the outcome of this threat hunt?

A.

The threat hunt was successful because the hypothesis was not proven.

B.

The threat hunt failed because the hypothesis was not proven.

C.

The threat hunt failed because no malicious activity was identified.

D.

The threat hunt was successful in providing strong evidence that the tactic and tool is not present in the environment.

Full Access
Question # 8

When searching in Splunk, which of the following SPL commands can be used to run a subsearch across every field in a wildcard field list?

A.

foreach

B.

rex

C.

makeresults

D.

transaction

Full Access
Question # 9

Which search command allows an analyst to match whatever is inside the parentheses as a single term in the index, even if it contains characters that are usually recognized as minor breakers such as periods or underscores?

A.

CASE()

B.

LIKE()

C.

FORMAT ()

D.

TERM ()

Full Access
Question # 10

Which of the Enterprise Security frameworks provides additional automatic context and correlation to fields that exist within raw data?

A.

Adaptive Response

B.

Threat Intelligence

C.

Risk

D.

Asset and Identity

Full Access
Question # 11

What is the main difference between a DDoS and a DoS attack?

A.

A DDoS attack is a type of physical attack, while a DoS attack is a type of cyberattack.

B.

A DDoS attack uses a single source to target a single system, while a DoS attack uses multiple sources to target multiple systems.

C.

A DDoS attack uses multiple sources to target a single system, while a DoS attack uses a single source to target a single or multiple systems.

D.

A DDoS attack uses a single source to target multiple systems, while a DoS attack uses multiple sources to target a single system.

Full Access
Question # 12

According to David Bianco's Pyramid of Pain, which indicator type is least effective when used in continuous monitoring?

A.

Domain names

B.

TTPs

C.

NetworM-lost artifacts

D.

Hash values

Full Access
Question # 13

While the top command is utilized to find the most common values contained within a field, a Cyber Defense Analyst hunts for anomalies. Which of the following Splunk commands returns the least common values?

A.

least

B.

uncommon

C.

rare

D.

base

Full Access
Question # 14

Why is tstats more efficient than stats for large datasets?

A.

tstats is faster since it operates at the beginning of the search pipeline.

B.

tstats is faster since it only looks at indexed metadata, not raw data.

C.

tstats is faster due to its SQL-like syntax.

D.

tstats is faster since it searches raw logs for extracted fields.

Full Access
Question # 15

An analyst is investigating a network alert for suspected lateral movement from one Windows host to another Windows host. According to Splunk CIM documentation, the IP address of the host from which the attacker is moving would be in which field?

A.

host

B.

dest

C.

src_nt_host

D.

src_ip

Full Access
Question # 16

Which Splunk Enterprise Security dashboard displays authentication and access-related data?

A.

Audit dashboards

B.

Asset and Identity dashboards

C.

Access dashboards

D.

Endpoint dashboards

Full Access
Question # 17

Enterprise Security has been configured to generate a Notable Event when a user has quickly authenticated from multiple locations between which travel would be impossible. This would be considered what kind of an anomaly?

A.

Access Anomaly

B.

Identity Anomaly

C.

Endpoint Anomaly

D.

Threat Anomaly

Full Access
Question # 18

A threat hunter generates a report containing the list of users who have logged in to a particular database during the last 6 months, along with the number of times they have each authenticated. They sort this list and remove any user names who have logged in more than 6 times. The remaining names represent the users who rarely log in, as their activity is more suspicious. The hunter examines each of these rare logins in detail.

This is an example of what type of threat-hunting technique?

A.

Least Frequency of Occurrence Analysis

B.

Co-Occurrence Analysis

C.

Time Series Analysis

D.

Outlier Frequency Analysis

Full Access
Question # 19

An analyst is investigating how an attacker successfully performs a brute-force attack to gain a foothold into an organizations systems. In the course of the investigation the analyst determines that the reason no alerts were generated is because the detection searches were configured to run against Windows data only and excluding any Linux data.

This is an example of what?

A.

A True Positive.

B.

A True Negative.

C.

A False Negative.

D.

A False Positive.

Full Access
Question # 20

While testing the dynamic removal of credit card numbers, an analyst lands on using therexcommand. What mode needs to be set to in order to replace the defined values with X?

| makeresults

| eval ccnumber="511388720478619733"

| rex field=ccnumber mode=???"s/(\d{4}-){3)/XXXX-XXXX-XXXX-/g"

Please assume that the aboverexcommand is correctly written.

A.

sed

B.

replace

C.

mask

D.

substitute

Full Access
Question # 21

Which of the following is not a component of the Splunk Security Content library (ESCU, SSE)?

A.

Dashboards

B.

Reports

C.

Correlation searches

D.

Validated architectures

Full Access
Question # 22

A Cyber Threat Intelligence (CTI) team produces a report detailing a specific threat actor’s typical behaviors and intent. This would be an example of what type of intelligence?

A.

Operational

B.

Executive

C.

Tactical

D.

Strategic

Full Access
Question # 23

According to Splunk CIM documentation, which field in the Authentication Data Model represents the user who initiated a privilege escalation?

A.

dest_user

B.

src_user_id

C.

src_user

D.

username

Full Access
Question # 24

Which pre-packaged app delivers security content and detections on a regular, ongoing basis for Enterprise Security and SOAR?

A.

SSE

B.

ESCU

C.

Threat Hunting

D.

InfoSec

Full Access
Question # 25

Which of the following is considered Personal Data under GDPR?

A.

The birth date of an unidentified user.

B.

An individual's address including their first and last name.

C.

The name of a deceased individual.

D.

A company's registration number.

Full Access
Question # 26

Which of the following data sources can be used to discover unusual communication within an organization’s network?

A.

EDS

B.

Net Flow

C.

Email

D.

IAM

Full Access
Question # 27

Which of the following Splunk Enterprise Security features allows industry frameworks such as CIS Critical Security Controls, MITRE ATT&CK, and the Lockheed Martin Cyber Kill Chain® to be mapped to Correlation Search results?

A.

Annotations

B.

Playbooks

C.

Comments

D.

Enrichments

Full Access
Question # 28

During an investigation it is determined that an event is suspicious but expected in the environment. Out of the following, what is the best disposition to apply to this event?

A.

True positive

B.

Informational

C.

False positive

D.

Benign

Full Access
Question # 29

An analyst would like to test how certain Splunk SPL commands work against a small set of data. What command should start the search pipeline if they wanted to create their own data instead of utilizing data contained within Splunk?

A.

makeresults

B.

rename

C.

eval

D.

stats

Full Access