Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Splunk SPLK-5001 Passing Score

Page: 5 / 7
Total 99 questions

Splunk Certified Cybersecurity Defense Analyst Questions and Answers

Question 17

The following list contains examples of Tactics, Techniques, and Procedures (TTPs):

• Exploiting a remote service

• Extend movement

• Use EternalBlue to exploit a remote SMB server

In which order are they listed below?

Options:

A.

Tactic, Procedure, Technique

B.

Technique, Tactic, Procedure

C.

Tactic, Technique, Procedure

D.

Procedure, Technique, Tactic

Question 18

Which of the following is the primary benefit of using the CIM in Splunk?

Options:

A.

It allows for easier correlation of data from different sources.

B.

It improves the performance of search queries on raw data.

C.

It enables the use of advanced machine learning algorithms.

D.

It automatically detects and blocks cyber threats.

Question 19

Which Splunk Enterprise Security dashboard displays authentication and access-related data?

Options:

A.

Audit dashboards

B.

Asset and Identity dashboards

C.

Access dashboards

D.

Endpoint dashboards

Question 20

While investigating findings in Enterprise Security, an analyst has identified a compromised device. Without leaving ES, what action could they take to run a sequence of containment activities on the compromised device that also updates the original finding?

Options:

A.

Run an event-level workflow action that initiates a SOAR playbook.

B.

Run a field-level workflow action that initiates a SOAR playbook.

C.

Run an adaptive response action that initiates a SOAR playbook.

D.

Run an alert action that initiates a SOAR playbook.

Page: 5 / 7
Total 99 questions