Cyber Monday Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Splunk SPLK-5001 - Splunk Certified Cybersecurity Defense Analyst

Page: 2 / 3
Total 99 questions

Which of the following is a tactic used by attackers, rather than a technique?

A.

Gathering information about a target.

B.

Establishing persistence with a scheduled task.

C.

Using a phishing email to gain initial access.

D.

Escalating privileges via UAC bypass.

What is the first phase of the Continuous Monitoring cycle?

A.

Monitor and Protect

B.

Define and Predict

C.

Assess and Evaluate

D.

Respond and Recover

The Lockheed Martin Cyber Kill Chain® breaks an attack lifecycle into several stages. A threat actor modified the registry on a compromised Windows system to ensure that their malware would automatically run at boot time. Into which phase of the Kill Chain would this fall?

A.

Act on Objectives

B.

Exploitation

C.

Delivery

D.

Installation

In which phase of the Continuous Monitoring cycle are suggestions and improvements typically made?

A.

Define and Predict

B.

Establish and Architect

C.

Analyze and Report

D.

Implement and Collect

An analyst notices that one of their servers is sending an unusually large amount of traffic, gigabytes more than normal, to a single system on the Internet. There doesn’t seem to be any associated increase in incoming traffic.

What type of threat actor activity might this represent?

A.

Data exfiltration

B.

Network reconnaissance

C.

Data infiltration

D.

Lateral movement

According to Splunk CIM documentation, which field in the Authentication Data Model represents the user who initiated a privilege escalation?

A.

dest_user

B.

src_user_id

C.

src_user

D.

username

While the top command is utilized to find the most common values contained within a field, a Cyber Defense Analyst hunts for anomalies. Which of the following Splunk commands returns the least common values?

A.

least

B.

uncommon

C.

rare

D.

base

A Cyber Threat Intelligence (CTI) team produces a report detailing a specific threat actor’s typical behaviors and intent. This would be an example of what type of intelligence?

A.

Operational

B.

Executive

C.

Tactical

D.

Strategic

What is the main difference between hypothesis-driven and data-driven Threat Hunting?

A.

Data-driven hunts always require more data to search through than hypothesis-driven hunts.

B.

Data-driven hunting tries to uncover activity within an existing data set, hypothesis-driven hunting begins with a potential activity that the hunter thinks may be happening.

C.

Hypothesis-driven hunts are typically executed on newly ingested data sources, while data-driven hunts are not.

D.

Hypothesis-driven hunting tries to uncover activity within an existing data set, data-driven hunting begins with an activity that the hunter thinks may be happening.

Which search command allows an analyst to match whatever is inside the parentheses as a single term in the index, even if it contains characters that are usually recognized as minor breakers such as periods or underscores?

A.

CASE()

B.

LIKE()

C.

FORMAT ()

D.

TERM ()