Splunk® SPLK-5001 Exam Practice Questions (P. 2)
- Full Access (111 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #6
An analyst notices that one of their servers is sending an unusually large amount of traffic, gigabytes more than normal, to a single system on the Internet. There doesn’t seem to be any associated increase in incoming traffic.
What type of threat actor activity might this represent?
What type of threat actor activity might this represent?
- AData exfiltration
- BNetwork reconnaissance
- CData infiltration
- DLateral movement
send
light_mode
delete
Question #7
In which phase of the Continuous Monitoring cycle are suggestions and improvements typically made?
- ADefine and Predict
- BEstablish and Architect
- CAnalyze and Report
- DImplement and Collect
send
light_mode
delete
Question #8
An analyst is not sure that all of the potential data sources at her company are being correctly or completely utilized by Splunk and Enterprise Security. Which of the following might she suggest using, in order to perform an analysis of the data types available and some of their potential security uses?
- ASplunk ITSI
- BSplunk Security Essentials
- CSplunk SOAR
- DSplunk Intelligence Management
send
light_mode
delete
Question #9
During their shift, an analyst receives an alert about an executable being run from C:\Windows\Temp. Why should this be investigated further?
- ATemp directories aren’t owned by any particular user, making it difficult to track the process owner when files are executed.
- BTemp directories are flagged as non-executable, meaning that no files stored within can be executed, and this executable was run from that directory.
- CTemp directories contain the system page file and the virtual memory file, meaning the attacker can use their malware to read the in memory values of running programs.
- DTemp directories are world writable thus allowing attackers a place to drop, stage, and execute malware on a system without needing to worry about file permissions.
send
light_mode
delete
Question #10
An analyst would like to visualize threat objects across their environment and chronological risk events for a Risk Object in Incident Review. Where would they find this?
- ARunning the Risk Analysis Adaptive Response action within the Notable Event.
- BVia a workflow action for the Risk Investigation dashboard.
- CVia the Risk Analysis dashboard under the Security Intelligence tab in Enterprise Security.
- DClicking the risk event count to open the Risk Event Timeline.
send
light_mode
delete
All Pages