Splunk SPLK-5001 - Splunk Certified Cybersecurity Defense Analyst
Which of the following is a tactic used by attackers, rather than a technique?
What is the first phase of the Continuous Monitoring cycle?
The Lockheed Martin Cyber Kill Chain® breaks an attack lifecycle into several stages. A threat actor modified the registry on a compromised Windows system to ensure that their malware would automatically run at boot time. Into which phase of the Kill Chain would this fall?
In which phase of the Continuous Monitoring cycle are suggestions and improvements typically made?
An analyst notices that one of their servers is sending an unusually large amount of traffic, gigabytes more than normal, to a single system on the Internet. There doesn’t seem to be any associated increase in incoming traffic.
What type of threat actor activity might this represent?
According to Splunk CIM documentation, which field in the Authentication Data Model represents the user who initiated a privilege escalation?
While the top command is utilized to find the most common values contained within a field, a Cyber Defense Analyst hunts for anomalies. Which of the following Splunk commands returns the least common values?
A Cyber Threat Intelligence (CTI) team produces a report detailing a specific threat actor’s typical behaviors and intent. This would be an example of what type of intelligence?
What is the main difference between hypothesis-driven and data-driven Threat Hunting?
Which search command allows an analyst to match whatever is inside the parentheses as a single term in the index, even if it contains characters that are usually recognized as minor breakers such as periods or underscores?
