Splunk Related Exams
SPLK-5001 Exam

An adversary uses "LoudWiner" to hijack resources for crypto mining. What does this represent in a TTP framework?
What is the first phase of the Continuous Monitoring cycle?
An analyst is investigating a network alert for suspected lateral movement from one Windows host to another Windows host. According to Splunk CIM documentation, the IP address of the host from which the attacker is moving would be in which field?