Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free Splunk SPLK-5001 Practice Exam with Questions & Answers | Set: 2

Questions 11

What is the main difference between a DDoS and a DoS attack?

Options:
A.

A DDoS attack is a type of physical attack, while a DoS attack is a type of cyberattack.

B.

A DDoS attack uses a single source to target a single system, while a DoS attack uses multiple sources to target multiple systems.

C.

A DDoS attack uses multiple sources to target a single system, while a DoS attack uses a single source to target a single or multiple systems.

D.

A DDoS attack uses a single source to target multiple systems, while a DoS attack uses multiple sources to target a single system.

Splunk SPLK-5001 Premium Access
Questions 12

Which of the following is a tactic used by attackers, rather than a technique?

Options:
A.

Gathering information about a target.

B.

Establishing persistence with a scheduled task.

C.

Using a phishing email to gain initial access.

D.

Escalatingprivileges via UAC bypass.

Questions 13

An analyst investigates an IDS alert and confirms suspicious traffic to a known malicious IP. What Enterprise Security data model would they use to investigate which process initiated the network connection?

Options:
A.

Endpoint

B.

Authentication

C.

Network traffic

D.

Web

Questions 14

A threat hunter generates a report containing the list of users who have logged in to a particular database during the last 6 months, along with the number of times they have each authenticated. They sort this list and remove any user names who have logged in more than 6 times. The remaining names represent the users who rarely log in, as their activity is more suspicious. The hunter examines each of these rare logins in detail.

This is an example of what type of threat-hunting technique?

Options:
A.

Least Frequency of Occurrence Analysis

B.

Co-Occurrence Analysis

C.

Time Series Analysis

D.

Outlier Frequency Analysis

Questions 15

An analyst notices that one of their servers is sending an unusually large amount of traffic, gigabytes more than normal, to a single system on the Internet. There doesn’t seem to be any associated increase in incoming traffic.

What type of threat actor activity might this represent?

Options:
A.

Data exfiltration

B.

Network reconnaissance

C.

Data infiltration

D.

Lateral movement

Questions 16

While testing the dynamic removal of credit card numbers, an analyst lands on using therexcommand. What mode needs to be set to in order to replace the defined values with X?

| makeresults

| eval ccnumber="511388720478619733"

| rex field=ccnumber mode=???"s/(\d{4}-){3)/XXXX-XXXX-XXXX-/g"

Please assume that the aboverexcommand is correctly written.

Options:
A.

sed

B.

replace

C.

mask

D.

substitute

Questions 17

An analyst is investigating the number of failed login attempts by IP address. Which SPL command can be used to create a temporary table containing the number of failed login attempts by IP address over a specific time period?

Options:
A.

index=security_logs eventtype=failed_login | eval count as failed_attempts by src_ip | sort -failed_attempts

B.

index=security_logs eventtype=failed_login | transaction count as failed_attempts by src_ip | sort -failed_attempts

C.

index=security_logs eventtype=failed_login | stats count as failed_attempts by src_ip | sort -failed_attempts

D.

index=security_logs eventtype=failed_login | sum count as failed_attempts by src_ip | sort -failed_attempts

Questions 18

What device typically sits at a network perimeter to detect command and control and other potentially suspicious traffic?

Options:
A.

Host-based firewall

B.

Web proxy

C.

Endpoint Detection and Response

D.

Intrusion Detection System

Questions 19

An analyst is attempting to investigate a Notable Event within Enterprise Security. Through the course of their investigation they determined that the logs and artifacts needed to investigate the alert are not available.

What event disposition should the analyst assign to the Notable Event?

Options:
A.

Benign Positive, since there was no evidence that the event actually occurred.

B.

False Negative, since there are no logs to prove the activity actually occurred.

C.

True Positive, since there are no logs to prove that the event did not occur.

D.

Other, since a security engineer needs to ingest the required logs.