Splunk splk-2003 practice test

Exam Title: Splunk SOAR Certified Automation Developer

Last update: Nov 27 ,2025
Question 1

Splunk user account(s) with which roles must be created to configure Phantom with an external
Splunk Enterprise instance?

  • A. superuser, administrator
  • B. phantomcreate. phantomedit
  • C. phantomsearch, phantomdelete
  • D. admin,user
Answer:

A


Explanation:
When configuring Splunk Phantom to integrate with an external Splunk Enterprise instance, it is
typically required to have user accounts with sufficient privileges to access data and perform
necessary actions. The roles of "superuser" and "administrator" in Splunk provide the broad set of
permissions needed for such integration, enabling comprehensive access to data, management
capabilities, and the execution of searches or actions that Phantom may require as part of its
automated playbooks or investigations.

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 2

Phantom supports multiple user authentication methods such as LDAP and SAML2. What other user
authentication method is supported?

  • A. SAML3
  • B. PIV/CAC
  • C. Biometrics
  • D. OpenID
Answer:

B


Explanation:
Splunk SOAR supports multiple user authentication methods to ensure secure access to the platform.
Apart from LDAP (Lightweight Directory Access Protocol) and SAML2 (Security Assertion Markup
Language 2.0), SOAR also supports PIV (Personal Identity Verification) and CAC (Common Access
Card) as authentication methods. These are particularly used in government and military
organizations for secure and authenticated access to systems, providing a high level of security
through physical tokens or cards that contain encrypted user credentials.

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 3

During a second test of a playbook, a user receives an error that states: 'an empty parameters list was
passed to phantom.act()." What does this indicate?

  • A. The container has artifacts not parameters.
  • B. The playbook is using an incorrect container.
  • C. The playbook debugger's scope is set to new.
  • D. The playbook debugger's scope is set to all.
Answer:

A


Explanation:
The error message "an empty parameters list was passed to phantom.act()" typically indicates that
the action being called by the playbook does not have the required parameters to execute. This can
happen if the playbook expects certain data to be present in the container's artifacts but finds none.
Artifacts in Splunk SOAR (Phantom) are data elements associated with a container (such as an event
or alert) that playbooks can act upon. If a playbook action is designed to use data from artifacts as
parameters and those artifacts are missing or do not contain the expected data, the playbook cannot
execute the action properly, leading to this error.

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 4

What does a user need to do to have a container with an event from Splunk use context-aware
actions designed for notable events?

  • A. Include the notable event's event_id field and set the artifacts label to aplunk notable event id.
  • B. Rename the event_id field from the notable event to splunkNotableEventld.
  • C. Include the event_id field in the search results and add a CEF definition to Phantom for event_id, datatype splunk notable event id.
  • D. Add a custom field to the container named event_id and set the custom field's data type to splunk notable event id.
Answer:

C


Explanation:
For a container in Splunk SOAR to utilize context-aware actions designed for notable events from
Splunk, it is crucial to ensure that the notable event's unique identifier (event_id) is included in the
search results pulled into SOAR. Moreover, by adding a Common Event Format (CEF) definition for
the event_id field within Phantom, and setting its data type to something that denotes it as a Splunk
notable event ID, SOAR can recognize and appropriately handle these identifiers. This setup
facilitates the correct mapping and processing of notable event data within SOAR, enabling the
execution of context-aware actions that are specifically tailored to the characteristics of Splunk
notable events.

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 5

After enabling multi-tenancy, which of the Mowing is the first configuration step?

  • A. Select the associated tenant artifacts.
  • B. Change the tenant permissions.
  • C. Set default tenant base address.
  • D. Configure the default tenant.
Answer:

D


Explanation:
Upon enabling multi-tenancy in Splunk SOAR, the first step in configuration typically involves setting
up the default tenant. This foundational step is critical as it establishes the primary operating
environment under which subsequent tenants can be created and managed. The default tenant
serves as the template for permissions, settings, and configurations that might be inherited or
customized by additional tenants. Proper configuration of the default tenant ensures a stable and
consistent framework for multi-tenancy operations, allowing for segregated environments within the
same SOAR instance, each tailored to specific operational needs or organizational units.

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 6

When configuring a Splunk asset for Phantom to connect to a SplunkC loud instance, the user
discovers that they need to be able to run two different on_poll searches. How is this possible

  • A. Enter the two queries in the asset as comma separated values.
  • B. Configure the second query in the Phantom app for Splunk.
  • C. Install a second Splunk app and configure the query in the second app.
  • D. Configure a second Splunk asset with the second query.
Answer:

D


Explanation:
In scenarios where there's a need to run different on_poll searches for a Splunk Cloud instance from
Splunk SOAR, configuring a second Splunk asset for the additional query is a practical solution.
Splunk SOAR's architecture allows for multiple assets of the same type to be configured with distinct
settings. By setting up a second Splunk asset specifically for the second on_poll search query, users
can maintain separate configurations and ensure that each query is executed in its intended context
without interference. This approach provides flexibility in managing different data collection or
monitoring needs within the same SOAR environment.

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 7

On a multi-tenant Phantom server, what is the default tenant's ID?

  • A. 0
  • B. Default
  • C. 1
  • D. *
Answer:

C


Explanation:
The correct answer is C because the default tenant’s ID is 1. The tenant ID is a unique identifier for
each tenant on a multi-tenant Phantom server. The default tenant is the tenant that is created when
Phantom is installed and contains all the existing data and assets. The default tenant’s ID is always 1
and cannot be changed. Other tenants have IDs that are assigned sequentially starting from 2.
See
Splunk SOAR Documentation
for more details. In a multi-tenant Splunk SOAR environment, the
default tenant is typically assigned an ID of 1. This ID is system-generated and is used to uniquely
identify the default tenant within the SOAR database and system configurations. The default tenant
serves as the primary operational environment before any additional tenants are configured, and its
ID is crucial for database operations, API calls, and internal reference within the SOAR platform.
Understanding and correctly using tenant IDs is essential for managing resources, permissions, and
data access in a multi-tenant SOAR setup.

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 8

What are indicators?

  • A. Action result items that determine the flow of execution in a playbook.
  • B. Action results that may appear in multiple containers.
  • C. Artifact values that can appear in multiple containers.
  • D. Artifact values with special security significance.
Answer:

C


Explanation:
Indicators in Splunk SOAR (formerly Phantom) are crucial elements used to detect and respond to
security incidents. Let’s break down what indicators are and their significance:
Definition of Indicators:
Indicators are data points or patterns that suggest the presence of malicious activity or potential
security threats.
They can be anything from IP addresses, domain names, file hashes, URLs, email addresses, or other
observable artifacts.
Indicators help security teams identify and correlate events across different sources to understand
the scope and impact of an incident.
Types of Indicators:
Observable Indicators: These are directly observable artifacts, such as IP addresses, domain names,
or file hashes.
Behavioral Indicators: These describe patterns of behavior, such as failed login attempts, lateral
movement, or suspicious network traffic.
Contextual Indicators: These provide additional context around an event, such as the user account
associated with an action or the time of occurrence.
Use Cases for Indicators:
Threat Detection: Security analysts create rules or playbooks that trigger based on specific indicators.
For example, an indicator like a known malicious IP address can trigger an alert.
Incident Response: During an incident, indicators help identify affected systems, track lateral
movement, and prioritize response efforts.
Threat Intelligence Sharing: Organizations share indicators with each other to improve collective
security posture.
Multiple Containers:
Indicators can appear in multiple containers (playbooks, actions, etc.) within Splunk SOAR.
For example, an IP address associated with a suspicious domain might appear in both a threat
intelligence playbook and an incident response playbook.
Artifact Values vs. Indicators:
While artifact values are related, they are not the same as indicators.
Artifact values represent specific data extracted from an artifact (e.g., extracting an IP address from
an email header).
Indicators encompass a broader range of data points and are used for detection and correlation.
Reference:
Splunk SOAR Documentation: Indicators
Splunk SOAR Community: Understanding Indicators

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 9

Which app allows a user to send Splunk Enterprise Security notable events to Phantom?

  • A. Any of the integrated Splunk/Phantom Apps
  • B. Splunk App for Phantom Reporting.
  • C. Splunk App for Phantom.
  • D. Phantom App for Splunk.
Answer:

C


Explanation:
The Splunk App for Phantom is designed to facilitate the integration between Splunk Enterprise
Security and Splunk SOAR (Phantom), enabling the seamless forwarding of notable events from
Splunk to Phantom. This app allows users to leverage the analytical and data processing capabilities
of Splunk ES and utilize Phantom for automated orchestration and response. The app typically
includes mechanisms for specifying which notable events to send to Phantom, formatting the data
appropriately, and ensuring secure communication between the two platforms. This integration is
crucial for organizations looking to combine the strengths of Splunk's SIEM capabilities with
Phantom's automation and orchestration features to enhance their security operations.

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 10

Some of the playbooks on the Phantom server should only be executed by members of the admin
role. How can this rule be applied?

  • A. Add a filter block to al restricted playbooks that Titters for runRole - "Admin''.
  • B. Add a tag with restricted access to the restricted playbooks.
  • C. Make sure the Execute Playbook capability is removed from al roles except admin.
  • D. Place restricted playbooks in a second source repository that has restricted access.
Answer:

C


Explanation:
The correct answer is C because the best way to restrict the execution of playbooks to members of
the admin role is to make sure the Execute Playbook capability is removed from all roles except
admin. The Execute Playbook capability is a permission that allows a user to run any playbook on any
container. By default, all roles have this capability, but it can be removed or added in the Phantom UI
by going to Administration > User Management > Roles. Removing this capability from all roles
except admin will ensure that only admin users can execute playbooks. See
Splunk SOAR
Documentation
for more details. To ensure that only members of the admin role can execute specific
playbooks on the Phantom server, the most effective approach is to manage role-based access
controls (RBAC) directly. By configuring the system to remove the "Execute Playbook" capability from
all roles except for the admin role, you can enforce this rule. This method leverages Phantom's built-
in RBAC mechanisms to restrict playbook execution privileges. It is a straightforward and secure way
to ensure that only users with the necessary administrative privileges can initiate the execution of
sensitive or critical playbooks, thus maintaining operational security and control.

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Page 1 out of 10
Viewing questions 1-10 out of 110
Go To
page 2