Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Splunk Certified Cybersecurity Defense Analyst

Last Update 1 day ago Total Questions : 99

The Splunk Certified Cybersecurity Defense Analyst content is now fully updated, with all current exam questions added 1 day ago. Deciding to include SPLK-5001 practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our SPLK-5001 exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these SPLK-5001 sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any Splunk Certified Cybersecurity Defense Analyst practice test comfortably within the allotted time.

Question # 11

While investigating findings in Enterprise Security, an analyst has identified a compromised device. Without leaving ES, what action could they take to run a sequence of containment activities on the compromised device that also updates the original finding?

A.

Run an event-level workflow action that initiates a SOAR playbook.

B.

Run a field-level workflow action that initiates a SOAR playbook.

C.

Run an adaptive response action that initiates a SOAR playbook.

D.

Run an alert action that initiates a SOAR playbook.

Question # 12

The United States Department of Defense (DoD) requires all government contractors to provide adequate security safeguards referenced in National Institute of Standards and Technology (NIST) 800-171. All DoD contractors must continually reassess, monitor, and track compliance to be able to do business with the US government.

Which feature of Splunk Enterprise Security provides an analyst context for the correlation search mapping to the specific NIST guidelines?

A.

Comments

B.

Moles

C.

Annotations

D.

Framework mapping

Question # 13

An analyst is examining the logs for a web application’s login form. They see thousands of failed logon attempts using various usernames and passwords. Internet research indicates that these credentials may have been compiled by combining account information from several recent data breaches.

Which type of attack would this be an example of?

A.

Credential sniffing

B.

Password cracking

C.

Password spraying

D.

Credential stuffing

Question # 14

The Security Operations Center (SOC) manager is interested in creating a new dashboard for typosquatting after a successful campaign against a group of senior executives. Which existing ES dashboard could be used as a starting point to create a custom dashboard?

A.

IAM Activity

B.

Malware Center

C.

Access Anomalies

D.

New Domain Analysis

Question # 15

A Risk Notable Event has been triggered in Splunk Enterprise Security, an analyst investigates the alert, and determines it is a false positive. What metric would be used to define the time between alert creation and close of the event?

A.

MTTR (Mean Time to Respond)

B.

MTBF (Mean Time Between Failures)

C.

MTTA (Mean Time to Acknowledge)

D.

MTTD (Mean Time to Detect)

Question # 16

What Splunk feature would enable enriching public IP addresses with ASN and owner information?

A.

Using rex to extract this information at search time.

B.

Using lookup to include relevant information.

C.

Using oval commands to calculate the ASM.

D.

Using makersanita to add the ASMs to the search.

Question # 17

During their shift, an analyst receives an alert about an executable being run from C:\Windows\Temp. Why should this be investigated further?

A.

Temp directories aren ' t owned by any particular user, making it difficult to track the process owner when files are executed.

B.

Temp directories are flagged as non-executable, meaning that no files stored within can be executed, and this executable was run from that directory.

C.

Temp directories contain the system page file and the virtual memory file, meaning the attacker can use their malware to read the in memory values of running programs.

D.

Temp directories are world writable thus allowing attackers a place to drop, stage, and execute malware on a system without needing to worry about file permissions.

Question # 18

Which of the following use cases is best suited to be a Splunk SOAR Playbook?

A.

Forming hypothesis for Threat Hunting.

B.

Taking containment action on a compromised host.

C.

Creating persistent field extractions.

D.

Visualizing complex datasets.

Question # 19

An analyst discovers malicious software present within the network. When tracing the origin of the software, the analyst discovers it is actually a part of a third-party vendor application that is used regularly by the organization. This is an example of what kind of threat?

A.

Third-Party Malware

B.

Supply Chain Attack

C.

Account Takeover

D.

Ransomware

Question # 20

Which of the following is a reason to use Data Model Acceleration in Splunk?

A.

To rapidly compare the use of various algorithms to detect anomalies.

B.

To quickly model various responses to a particular vulnerability.

C.

To normalize the data associated with threats.

D.

To retrieve data faster than from a raw index.

Go to page: