Splunk SPLK-5001 - Splunk Certified Cybersecurity Defense Analyst
An analyst is looking at Web Server logs, and sees the following entry as the last web request that a server processed before unexpectedly shutting down:
147.186.119.107 - - [28/Jul/2006:10:27:10 -0300] "POST /cgi-bin/shutdown/ HTTP/1.0" 200 3333
What kind of attack is most likely occurring?
A Cyber Threat Intelligence (CTI) team produces a report detailing a specific threat actor’s typical behaviors and intent. This would be an example of what type of intelligence?
Which of the Enterprise Security frameworks provides additional automatic context and correlation to fields that exist within raw data?
Which stage of continuous monitoring involves adding data, creating detections, and building drilldowns?
What is the following step-by-step description an example of?
1. The attacker devises a non-default beacon profile with Cobalt Strike and embeds this within a document.
2. The attacker creates a unique email with the malicious document based on extensive research about their target.
3. When the victim opens this document, a C2 channel is established to the attacker’s temporary infrastructure on a compromised website.
Which of the following is a best practice for searching in Splunk?
Which of the following is considered Personal Data under GDPR?
Which of the following is a tactic used by attackers, rather than a technique?
The eval SPL expression supports many types of functions. Which of these function categories is not valid with eval?
Upon investigating a report of a web server becoming unavailable, the security analyst finds that the web server’s access log has the same log entry millions of times:
147.186.119.200 - - [28/Jul/2023:12:04:13 -0300] "GET /login/ HTTP/1.0" 200 3733
What kind of attack is occurring?