SPLK-5002 Practice Test Questions

57 Questions


A company wants to implement risk-based detection for privileged account activities.

Whatshould they configure first?


A. Asset and identity information for privileged accounts


B. Correlation searches with low thresholds


C. Event sampling for raw data


D. Automated dashboards for all accounts





A.
  Asset and identity information for privileged accounts

A security analyst needs to update the SOP for handling phishing incidents.

What should they prioritize?


A. Ensuring all reports are manually verified by analysts


B. Automating the isolation of suspected phishing emails


C. Documenting steps for user awareness training


D. Reporting incidents to the executive board immediately





C.
  Documenting steps for user awareness training

What are key benefits of using summary indexing in Splunk? (Choose two)


A. Reduces storage space required for raw data


B. Improves search performance on aggregated data


C. Provides automatic field extraction during indexing


D. Increases data retention period





B.
  Improves search performance on aggregated data

D.
  Increases data retention period

What is the primary function of summary indexing in Splunk reporting?


A. Storing unprocessed log data


B. Creating pre-aggregated data for faster reporting


C. Normalizing raw data for analysis


D. Enhancing the accuracy of alerts





B.
  Creating pre-aggregated data for faster reporting

What methods improve the efficiency of Splunk’s automation capabilities? (Choose three)


A. Using modular inputs


B. Optimizing correlation search queries


C. Leveraging saved search acceleration


D. Implementing low-latency indexing


E. Employing prebuilt SOAR playbooks





A.
  Using modular inputs

B.
  Optimizing correlation search queries

E.
  Employing prebuilt SOAR playbooks

What methods can improve dashboard usability for security program analytics?(Choosethree)


A. Using drill-down options for detailed views


B. Standardizing color coding for alerts


C. Limiting the number of panels on the dashboard


D. Adding context-sensitive filters


E. Avoiding performance optimization





A.
  Using drill-down options for detailed views

B.
  Standardizing color coding for alerts

D.
  Adding context-sensitive filters

How can you incorporate additional context into notable events generated by correlation searches?


A. By adding enriched fields during search execution


B. By using the dedup command in SPL


C. By configuring additional indexers


D. By optimizing the search head memory





A.
  By adding enriched fields during search execution

Explanation: In Splunk Enterprise Security (ES), notable events are generated by correlation searches, which are predefined searches designed to detect security incidents by analyzing logs and alerts from multiple data sources. Adding additional context to these notable events enhances their value for analysts and improves the efficiency of incident response.

To incorporate additional context, you can:

Use lookup tables to enrich data with information such as asset details, threat intelligence, and user identity.

Leverage KV Store or external enrichment sources like CMDB (Configuration Management Database) and identity management solutions.

Apply Splunk macros orevalcommands to transform and enhance event data dynamically.

Use Adaptive Response Actions in Splunk ES to pull additional information into a notable event.

The correct answer is A. By adding enriched fields during search execution, because enrichment occurs dynamically during search execution, ensuring that additional fields (such as geolocation, asset owner, and risk score) are included in the notable event.

What is the primary purpose of developing security metrics in a Splunk environment?


A. To enhance data retention policies


B. To measure and evaluate the effectiveness of security programs


C. To identify low-priority alerts for suppression


D. To automate case management workflows





B.
  To measure and evaluate the effectiveness of security programs

Explanation: Security metrics help organizations assess their security posture and make data-driven decisions.

Primary Purpose of Security Metrics in Splunk:

Measure Security Effectiveness (B)

Tracks incident response times, threat detection rates, and alert accuracy.

Helps SOC teams and leadership evaluate security program performance.

Improve Threat Detection & Incident Response

Identifies gaps in detection logic and false positives.

Helps fine-tune correlation searches and notable events.

Which Splunk feature helps in tracking and documenting threat trends over time?


A. Event sampling


B. Risk-based dashboards


C. Summary indexing


D. Data model acceleration





B.
  Risk-based dashboards

When generating documentation for a security program, what key element should be included?


A. Vendor contract details


B. Organizational hierarchy chart


C. Standard operating procedures (SOPs)


D. Financial cost breakdown





C.
  Standard operating procedures (SOPs)

During a high-priority incident, a user queries an index but sees incomplete results.

Whatis the most likely issue?


A. Buckets in the warm state are inaccessible.


B. Data normalization was not applied.


C. Indexers have reached their queue capacity.


D. The search head configuration is outdated.





C.
  Indexers have reached their queue capacity.

Which actions enhance the accuracy of Splunk dashboards?(Choosetwo)


A. Using accelerated data models


B. Avoiding token-based filters


C. Performing regular data validation


D. Disabling drill-down features





A.
  Using accelerated data models

C.
  Performing regular data validation


Page 1 out of 5 Pages