Which of the following is a best practice when creating performant searches within Splunk?
C
Which of the following data sources can be used to discover unusual communication within an
organization’s network?
B
A Cyber Threat Intelligence (CTI) team delivers a briefing to the CISO detailing their view of the
threat landscape the organization faces. This is an example of what type of Threat Intelligence?
B
Which of the Enterprise Security frameworks provides additional automatic context and correlation
to fields that exist within raw data?
D
An analyst needs to create a new field at search time. Which Splunk command will dynamically
extract additional fields as part of a Search pipeline?
A
After discovering some events that were missed in an initial investigation, an analyst determines this
is because some events have an empty src field. Instead, the required data is often captured in
another field called machine_name.
What SPL could they use to find all relevant events across either field until the field extraction is
fixed?
A
Which argument searches only accelerated data in the Network Traffic Data Model with tstats?
C
Which of the following is not considered an Indicator of Compromise (IOC)?
D
Which field is automatically added to search results when assets are properly defined and enabled in
Splunk Enterprise Security?
C
Outlier detection is an analysis method that groups together data points into high density clusters.
Data points that fall outside of these high density clusters are considered to be what?
C