Splunk Certified Cyber security (SPLK-5001) – Quiz 1 / 15 Category: Splunk Certified Cyber security (SPLK-5001) 1. An analysis of an organization’s security posture determined that a particular asset is at risk and a new process or solution should be implemented to protect it. Typically, who would be in charge of implementing the new process or solution that was selected? A. Security Architect B. SOC Manager C. Security Engineer D. Security Analyst 2 / 15 Category: Splunk Certified Cyber security (SPLK-5001) 2. According to David Bianco’s Pyramid of Pain, which indicator type is least effective when used in continuous monitoring? A. Domain names B. TTPs C. Network/Host artifacts D. Hash values 3 / 15 Category: Splunk Certified Cyber security (SPLK-5001) 3. Upon investigating a report of a web server becoming unavailable, the security analyst finds that the web server’s access log has the same log entry millions of times: 147.186.119.200 – – [28/Jul/2023:12:04:13 -0300] “GET /login/ HTTP/1.0” 200 3733 What kind of attack is occurring? A. Denial of Service Attack B. Distributed Denial of Service Attack C. Cross-Site Scripting Attack D. Database Injection Attack 4 / 15 Category: Splunk Certified Cyber security (SPLK-5001) 4. What device typically sits at a network perimeter to detect command and control and other potentially suspicious traffic? A. Host-based firewall B. Web proxy C. Endpoint Detection and Response D. Intrusion Detection System 5 / 15 Category: Splunk Certified Cyber security (SPLK-5001) 5. A Risk Rule generates events on Suspicious Cloud Share Activity and regularly contributes to confirmed incidents from Risk Notables. An analyst realizes the raw logs these events are generated from contain information which helps them determine what might be malicious. What should they ask their engineer for to make their analysis easier? A. Create a field extraction for this information. B. Add this information to the risk_message. C. Create another detection for this information. D. Allowlist more events based on this information. 6 / 15 Category: Splunk Certified Cyber security (SPLK-5001) 6. An analyst would like to visualize threat objects across their environment and chronological risk events for a Risk Object in Incident Review. Where would they find this? A. Running the Risk Analysis Adaptive Response action within the Notable Event. B. Via a workflow action for the Risk Investigation dashboard. C. Via the Risk Analysis dashboard under the Security Intelligence tab in Enterprise Security. D. Clicking the risk event count to open the Risk Event Timeline. 7 / 15 Category: Splunk Certified Cyber security (SPLK-5001) 7. During their shift, an analyst receives an alert about an executable being run from C:\Windows\Temp. Why should this be investigated further? A. Temp directories aren’t owned by any particular user, making it difficult to track the process owner when files are executed. B. Temp directories are flagged as non-executable, meaning that no files stored within can be executed, and this executable was run from that directory. C. Temp directories contain the system page file and the virtual memory file, meaning the attacker can use their malware to read the in memory values of running programs. D. Temp directories are world writable thus allowing attackers a place to drop, stage, and execute malware on a system without needing to worry about file permissions. 8 / 15 Category: Splunk Certified Cyber security (SPLK-5001) 8. An analyst is not sure that all of the potential data sources at her company are being correctly or completely utilized by Splunk and Enterprise Security. Which of the following might she suggest using, in order to perform an analysis of the data types available and some of their potential security uses? A. Splunk ITSI B. Splunk Security Essentials C. Splunk SOAR D. Splunk Intelligence Management 9 / 15 Category: Splunk Certified Cyber security (SPLK-5001) 9. In which phase of the Continuous Monitoring cycle are suggestions and improvements typically made? A. Define and Predict B. Establish and Architect C. Analyze and Report D. Implement and Collect 10 / 15 Category: Splunk Certified Cyber security (SPLK-5001) 10. An analyst notices that one of their servers is sending an unusually large amount of traffic, gigabytes more than normal, to a single system on the Internet. There doesn’t seem to be any associated increase in incoming traffic. What type of threat actor activity might this represent? A. Data exfiltration B. Network reconnaissance C. Data infiltration D. Lateral movement 11 / 15 Category: Splunk Certified Cyber security (SPLK-5001) 11. A threat hunter executed a hunt based on the following hypothesis: As an actor, I want to plant rundll32 for proxy execution of malicious code and leverage Cobalt Strike for Command and Control. Relevant logs and artifacts such as Sysmon, netflow, IDS alerts, and EDR logs were searched, and the hunter is confident in the conclusion that Cobalt Strike is not present in the company’s environment. Which of the following best describes the outcome of this threat hunt? A. The threat hunt was successful because the hypothesis was not proven. B. The threat hunt failed because the hypothesis was not proven. C. The threat hunt failed because no malicious activity was identified. D. The threat hunt was successful in providing strong evidence that the tactic and tool is not present in the environment 12 / 15 Category: Splunk Certified Cyber security (SPLK-5001) 12. Which Enterprise Security framework provides a mechanism for running preconfigured actions within the Splunk platform or integrating with external applications? A. Asset and Identity B. Notable Event C. Threat Intelligence D. Adaptive Response 13 / 15 Category: Splunk Certified Cyber security (SPLK-5001) 13. Which of the following Splunk Enterprise Security features allows industry frameworks such as CIS Critical Security Controls, MITRE ATT&CK, and the Lockheed Martin Cyber Kill Chain® to be mapped to Correlation Search results? A. Annotations B. Playbooks C. Comments D. Enrichments 14 / 15 Category: Splunk Certified Cyber security (SPLK-5001) 14. Which of the following is the primary benefit of using the CIM in Splunk? A. It allows for easier correlation of data from different sources. B. It improves the performance of search queries on raw data. C. It enables the use of advanced machine learning algorithms. D. It automatically detects and blocks cyber threats. 15 / 15 Category: Splunk Certified Cyber security (SPLK-5001) 15. Tactics, Techniques, and Procedures (TTPs) are methods or behaviors utilized by attackers. In which framework are these categorized? A. NIST 800-53 B. ISO 27000 C. CIS18 D. MITRE ATT&CK Your score is 0% Restart quiz Send feedback