10/259 questions · Unlock full access
Q1Multiple answers

A junior analyst is reviewing the Asset and Identity framework in Splunk ES. They ask why it is critical to keep the asset and identity lookups populated and up-to-date. What are the primary benefits of maintaining this data? (Select TWO)

Q2

A new data source from a custom application is being onboarded. The logs are not CIM compliant. To use this data effectively in Splunk Enterprise Security, a security engineer must normalize the fields to the CIM. The custom log contains a field named `source_ip`. What is the corresponding destination field in the CIM 'Network Traffic' data model?

Q3

True or False: The primary purpose of Splunk Security Essentials (SSE) is to replace Splunk Enterprise Security as a full-featured SIEM.

Q4

Which of the following describes the difference between a bot and a botnet?

Q5Multiple answers

What are the primary goals of implementing a zero trust security model? (Select ALL that apply)

Q6

A new data source is being ingested into Splunk, but the timestamps are in an unconventional format (e.g., `2024-JAN-25 14.30.15`). As a result, Splunk is not parsing the time correctly, and events are showing up with the index time. Where would a Splunk administrator configure the correct timestamp extraction properties for this sourcetype?

Q7

What is the primary difference between a Denial of Service (DoS) attack and a Distributed Denial of Service (DDoS) attack?

Q8

An analyst is investigating a notable event and finds that the `src` field contains a hostname, but another related event contains the IP address for the same host. To properly correlate these events, the analyst needs to resolve both identifiers to a single, consistent asset. Which Splunk ES framework is responsible for performing this correlation?

Q9

What is the primary value of using Splunk Security Essentials (SSE) for a SOC team that is new to Splunk?

Q10

What is the most common reason for an attacker to use social engineering techniques?