Splunk SPLK-5001 Splunk Certified Cybersecurity Defense Analyst Exam Practice Test

Page: 1 / 14
Total 66 questions
Question 1

What is the main difference between a DDoS and a DoS attack?



Answer : C


Question 2

What is the main difference between hypothesis-driven and data-driven Threat Hunting?



Answer : B


Question 3

A threat hunter generates a report containing the list of users who have logged in to a particular database during the last 6 months, along with the number of times they have each authenticated. They sort this list and remove any user names who have logged in more than 6 times. The remaining names represent the users who rarely log in, as their activity is more suspicious. The hunter examines each of these rare logins in detail.

This is an example of what type of threat-hunting technique?



Answer : A


Question 4

The field file_acl contains access controls associated with files affected by an event. In which data model would an analyst find this field?



Answer : D


Question 5

An analyst is investigating the number of failed login attempts by IP address. Which SPL command can be used to create a temporary table containing the number of failed login attempts by IP address over a specific time period?



Answer : C


Question 6

A successful Continuous Monitoring initiative involves the entire organization. When an analyst discovers the need for more context or additional information, perhaps from additional data sources or altered correlation rules, to what role would this request generally escalate?



Answer : C


Question 7

There are many resources for assisting with SPL and configuration questions. Which of the following resources feature community-sourced answers?



Answer : A


Page:    1 / 14   
Total 66 questions