When threat hunting for outliers in Splunk, which of the following SPL pipelines would filter for users with over a thousand occurrences?
A. | top user
B. | stats count(user) | sort - count | where count > 1000
C. | sort by user | where count > 1000
D. | stats count by user | where count > 1000 | sort - count
正解:D
質問 2:
An analyst is not sure that all of the potential data sources at her company are being correctly or completely utilized by Splunk and Enterprise Security. Which of the following might she suggest using, in order to perform an analysis of the data types available and some of their potential security uses?
A. Splunk Intelligence Management
B. SOAR
C. Security Essentials
D. Splunk ITSI
正解:C
質問 3:
The field file_acl contains access controls associated with files affected by an event. In which data model would an analyst find this field?
A. Vulnerabilities
B. Alerts
C. Malware
D. Endpoint
正解:D
質問 4:
How are Notable Events configured in Splunk Enterprise Security?
A. During an investigation.
B. As part of an audit.
C. Via an Adaptive Response Action in a regular search.
D. Via an Adaptive Response Action in a correlation search.
正解:D
質問 5:
An analyst is building a search to examine Windows XML Event Logs, but the initial search is not returning any extracted fields. Based on the above image, what is the most likely cause?
A. The analyst did not add the excract command to their search pipeline.
B. The analyst does not have the proper role to search this data.
C. The analyst is not in the Drooer Search Mode and should switch to Smart or Verbose.
D. The analyst is searching newly indexed data that was improperly parsed.
正解:A
神宫** -
SPLK-5001のアプリバージョンはおすすめです。スマートフォンからアクセスしてもできるので、電車での移動中でも利用していました。それのおかげで試験にも無事合格しました。