Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free Splunk SPLK-5001 Practice Exam with Questions & Answers | Set: 3

Questions 21

What goal of an Advanced Persistent Threat (APT) group aims to disrupt or damage on behalf of a cause?

Options:
A.

Hacktivism

B.

Cyber espionage

C.

Financial gain

D.

Prestige

Splunk SPLK-5001 Premium Access
Questions 22

Which of the following is a correct Splunk search that will return results in the most performant way?

Options:
A.

index=foo host=i-478619733 | stats range(_time) as duration by src_ip | bin duration span=5min | stats count by duration, host

B.

| stats range(_time) as duration by src_ip | index=foo host=i-478619733 | bin duration span=5min | stats count by duration, host

C.

index=foo host=i-478619733 | transaction src_ip |stats count by host

D.

index=foo | transaction src_ip |stats count by host | search host=i-478619733

Questions 23

As an analyst, tracking unique users is a common occurrence. The Security Operations Center (SOC) manager requested a search with results in a table format to track the cumulative downloads by distinct IP address. Which example calculates the running total of distinct users over time?

Options:
A.

eventtype="download" | bin_time span=1d | stats values(clientip) as ipa dc(clientip) by _time | streamstats dc(ipa) as "Cumulative total"

B.

eventtype="download" | bin_time span=1d | stats values(clientip) as ipa dc(clientip) by _time

C.

eventtype="download" | bin_time span=1d | table clientip _time user

D.

eventtype="download" | bin_time span=1d | stats values(clientip) as ipa dc(clientip) by user | table _time ipa

Questions 24

In which phase of the Continuous Monitoring cycle are suggestions and improvements typically made?

Options:
A.

Define and Predict

B.

Establish and Architect

C.

Analyze and Report

D.

Implement and Collect

Questions 25

An analyst needs to create a new field at search time. Which Splunk command will dynamically extract additional fields as part of a Search pipeline?

Options:
A.

rex

B.

fields

C.

regex

D.

eval

Questions 26

When threat hunting for outliers in Splunk, which of the following SPL pipelines would filter for users with over a thousand occurrences?

Options:
A.

| sort by user | where count > 1000

B.

| stats count by user | where count > 1000 | sort - count

C.

| top user

D.

| stats count(user) | sort - count | where count > 1000

Questions 27

The Security Operations Center (SOC) manager is interested in creating a new dashboard for typosquatting after a successful campaign against a group of senior executives. Which existing ES dashboard could be used as a starting point to create a custom dashboard?

Options:
A.

IAM Activity

B.

Malware Center

C.

Access Anomalies

D.

New Domain Analysis

Questions 28

What is the first phase of the Continuous Monitoring cycle?

Options:
A.

Monitor and Protect

B.

Define and Predict

C.

Assess and Evaluate

D.

Respond and Recover

Questions 29

An analyst investigates an IDS alert and confirms suspicious traffic to a known malicious IP. What Enterprise Security data model would they use to investigate which process initiated the network connection?

Options:
A.

Endpoint

B.

Authentication

C.

Network traffic

D.

Web