SPLK-3001 Practice Test Questions

98 Questions


Which of the following are examples of sources for events in the endpoint security domain dashboards?


A.

REST API invocations.


B.

Investigation final results status.


C.

Workstations, notebooks, and point-of-sale systems.


D.

Lifecycle auditing of incidents, from assignment to resolution.





D.
  

Lifecycle auditing of incidents, from assignment to resolution.



Reference:
https://docs.splunk.com/Documentation/ES/6.1.0/User/EndpointProtectionDomaindashboar
ds

After installing Enterprise Security, the distributed configuration management tool can be used to create which app to configure indexers?


A.

Splunk_DS_ForIndexers.spl


B.

Splunk_ES_ForIndexers.spl


C.

Splunk_SA_ForIndexers.spl


D.

Splunk_TA_ForIndexers.spl





D.
  

Splunk_TA_ForIndexers.spl



Reference: https://docs.splunk.com/Documentation/ES/6.1.0/Install/InstallTechnologyAddons

What is the bar across the bottom of any ES window?


A.

The Investigator Workbench.


B.

The Investigation Bar.


C.

The Analyst Bar.


D.

The Compliance Bar.





B.
  

The Investigation Bar.



Reference: https://docs.splunk.com/Documentation/ES/6.4.1/User/Startaninvestigation

Which of the following is an adaptive action that is configured by default for ES?


A.

Create notable event


B.

Create new correlation search


C.

Create investigation


D.

Create new asset





B.
  

Create new correlation search



Glass tables can display static images and text, the results of ad-hoc searches, and which of the following objects?


A.

Lookup searches.


B.

Summarized data.


C.

Security metrics.


D.

Metrics store searches.





C.
  

Security metrics.



Reference: https://docs.splunk.com/Documentation/ES/6.1.0/User/CreateGlassTable

What are the steps to add a new column to the Notable Event table in the Incident Review dashboard?


A.

Configure -> Incident Management -> Notable Event Statuses


B.

Configure -> Content Management -> Type: Correlation Search


C.

Configure -> Incident Management -> Incident Review Settings -> Event Management


D.

Configure -> Incident Management -> Incident Review Settings -> Table Attributes





D.
  

Configure -> Incident Management -> Incident Review Settings -> Table Attributes



Reference: https://docs.splunk.com/Documentation/ES/6.1.0/Admin/Customizenotables

Where is it possible to export content, such as correlation searches, from ES?


A.

Content exporter


B.

Configure -> Content Management


C.

Export content dashboard


D.

Settings Menu -> ES -> Export





B.
  

Configure -> Content Management



Reference: https://docs.splunk.com/Documentation/ES/6.1.0/Admin/Export

An administrator is asked to configure an “Nslookup” adaptive response action, so that it
appears as a selectable option in the notable event’s action menu when an analyst is
working in the Incident Review dashboard. What steps would the administrator take to
configure this option?


A.

Configure -> Content Management -> Type: Correlation Search -> Notable -> Nslookup


B.

Configure -> Type: Correlation Search -> Notable -> Recommended Actions ->
Nslookup


C.

Configure -> Content Management -> Type: Correlation Search -> Notable -> Next Steps -> Nslookup


D.

Configure -> Content Management -> Type: Correlation Search -> Notable ->
Recommended Actions -> Nslookup





D.
  

Configure -> Content Management -> Type: Correlation Search -> Notable ->
Recommended Actions -> Nslookup



Which of the following are data models used by ES? (Choose all that apply)


A.

Web


B.

Anomalies


C.

Authentication


D.

Network Traffic





A.
  

Web



C.
  

Authentication



D.
  

Network Traffic



Reference:
https://dev.splunk.com/enterprise/docs/developapps/enterprisesecurity/datamodelsusedbye
s/

ES apps and add-ons from $SPLUNK_HOME/etc/apps should be copied from the staging instance to what location on the cluster deployer instance?


A.

$SPLUNK_HOME/etc/master-apps/


B.

$SPLUNK_HOME/etc/system/local/


C.

$SPLUNK_HOME/etc/shcluster/apps


D.

$SPLUNK_HOME/var/run/searchpeers





C.
  

$SPLUNK_HOME/etc/shcluster/apps



Explanation:
The upgraded contents of the staging instance will be migrated back to the deployer and
deployed to the search head cluster members. On the staging instance, copy
$SPLUNK_HOME/etc/apps to
$SPLUNK_HOME/etc/shcluster/apps on the deployer. 1. On the deployer, remove any
deprecated apps or add-ons in $SPLUNK_HOME/etc/shcluster/apps that were removed
during the upgrade on staging. Confirm by reviewing the ES upgrade report generated on
staging, or by examining the apps moved into
$SPLUNK_HOME/etc/disabled-apps on staging

Which lookup table does the Default Account Activity Detected correlation search use to flag known default accounts?


A.

Administrative Identities


B.

Local User Intel


C.

Identities


D.

Privileged Accounts





C.
  

Identities



How is notable event urgency calculated?


A.

Asset priority and threat weight.


B.

Alert severity found by the correlation search.


C.

Asset or identity risk and severity found by the correlation search.


D.

Severity set by the correlation search and priority assigned to the associated asset or identity.





D.
  

Severity set by the correlation search and priority assigned to the associated asset or identity.



Reference: https://docs.splunk.com/Documentation/ES/6.1.0/User/Howurgencyisassigned


Page 2 out of 9 Pages
Previous