Weekend Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free Splunk SPLK-3001 Practice Exam with Questions & Answers | Set: 2

Questions 11

To which of the following should the ES application be uploaded?

Options:
A.

The indexer.

B.

The KV Store.

C.

The search head.

D.

The dedicated forwarder.

Splunk SPLK-3001 Premium Access
Questions 12

What feature of Enterprise Security downloads threat intelligence data from a web server?

Options:
A.

Threat Service Manager

B.

Threat Download Manager

C.

Threat Intelligence Parser

D.

Therat Intelligence Enforcement

Questions 13

Where is the Add-On Builder available from?

Options:
A.

GitHub

B.

SplunkBase

C.

<a href="www.splunk.com">www.splunk.com</a>

D.

The ES installation package

Questions 14

Which of the following is a risk of using the Auto Deployment feature of Distributed Configuration Management to distribute indexes.conf?

Options:
A.

Indexes might crash.

B.

Indexes might be processing.

C.

Indexes might not be reachable.

D.

Indexes have different settings.

Questions 15

What can be exported from ES using the Content Management page?

Options:
A.

Only correlation searches, managed lookups, and glass tables.

B.

Only correlation searches.

C.

Any content type listed in the Content Management page.

D.

Only correlation searches, glass tables, and workbench panels.

Questions 16

ES apps and add-ons from $SPLUNK_HOME/etc/apps should be copied from the staging instance to what location on the cluster deployer instance?

Options:
A.

$SPLUNK_HOME/etc/master-apps/

B.

$SPLUNK_HOME/etc/system/local/

C.

$SPLUNK_HOME/etc/shcluster/apps

D.

$SPLUNK_HOME/var/run/searchpeers/

Questions 17

What do threat gen searches produce?

Options:
A.

Threat Intel in KV Store collections.

B.

Threat correlation searches.

C.

Threat notables in the notable index.

D.

Events in the threat activity index.

Questions 18

Glass tables can display static images and text, the results of ad-hoc searches, and which of the following objects?

Options:
A.

Lookup searches.

B.

Summarized data.

C.

Security metrics.

D.

Metrics store searches.

Questions 19

Where is detailed information about identities stored?

Options:
A.

The Identity Investigator index.

B.

The Access Anomalies collection.

C.

The User Activity index.

D.

The Identity Lookup CSV file.

Questions 20

An administrator wants to ensure that none of the ES indexed data could be compromised through tampering. What feature would satisfy this requirement?

Options:
A.

Index consistency.

B.

Data integrity control.

C.

Indexer acknowledgement.

D.

Index access permissions.