Splunk SPLK-5001 - Splunk Certified Cybersecurity Defense Analyst Exam
Page: 1 / 14
Total 66 questions
Question #1 (Topic: Exam A)
Which Enterprise Security framework provides a mechanism for running preconfigured actions within the Splunk platform or integrating with external applications?
A. Asset and Identity
B. Notable Event
C. Threat Intelligence
D. Adaptive Response
Answer: D
Question #2 (Topic: Exam A)
Which of the following Splunk Enterprise Security features allows industry frameworks such as CIS Critical Security Controls, MITRE ATT&CK, and the Lockheed Martin Cyber Kill Chain® to be mapped to Correlation Search results?
A. Annotations
B. Playbooks
C. Comments
D. Enrichments
Answer: A
Question #3 (Topic: Exam A)
Which of the following is the primary benefit of using the CIM in Splunk?
A. It allows for easier correlation of data from different sources.
B. It improves the performance of search queries on raw data.
C. It enables the use of advanced machine learning algorithms.
D. It automatically detects and blocks cyber threats.
Answer: A
Question #4 (Topic: Exam A)
Tactics, Techniques, and Procedures (TTPs) are methods or behaviors utilized by attackers. In which framework are these categorized?
A. NIST 800-53
B. ISO 27000
C. CIS18
D. MITRE ATT&CK
Answer: D
Question #5 (Topic: Exam A)
A threat hunter executed a hunt based on the following hypothesis:
As an actor, I want to plant rundll32 for proxy execution of malicious code and leverage Cobalt Strike for Command and Control.
Relevant logs and artifacts such as Sysmon, netflow, IDS alerts, and EDR logs were searched, and the hunter is confident in the conclusion that Cobalt Strike is not present in the company’s environment.
Which of the following best describes the outcome of this threat hunt?
As an actor, I want to plant rundll32 for proxy execution of malicious code and leverage Cobalt Strike for Command and Control.
Relevant logs and artifacts such as Sysmon, netflow, IDS alerts, and EDR logs were searched, and the hunter is confident in the conclusion that Cobalt Strike is not present in the company’s environment.
Which of the following best describes the outcome of this threat hunt?
A. The threat hunt was successful because the hypothesis was not proven.
B. The threat hunt failed because the hypothesis was not proven.
C. The threat hunt failed because no malicious activity was identified.
D. The threat hunt was successful in providing strong evidence that the tactic and tool is not present in the environment.
Answer: D