Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Splunk SPLK-5001 - Splunk Certified Cybersecurity Defense Analyst

Page: 1 / 2
Total 66 questions

An analyst is looking at Web Server logs, and sees the following entry as the last web request that a server processed before unexpectedly shutting down:

147.186.119.107 - - [28/Jul/2006:10:27:10 -0300] "POST /cgi-bin/shutdown/ HTTP/1.0" 200 3333

What kind of attack is most likely occurring?

A.

Distributed denial of service attack.

B.

Denial of service attack.

C.

Database injection attack.

D.

Cross-Site scripting attack.

A Cyber Threat Intelligence (CTI) team produces a report detailing a specific threat actor’s typical behaviors and intent. This would be an example of what type of intelligence?

A.

Operational

B.

Executive

C.

Tactical

D.

Strategic

Which of the Enterprise Security frameworks provides additional automatic context and correlation to fields that exist within raw data?

A.

Asset and Identity

B.

Threat Intelligence

C.

Adaptive Response

D.

Risk

Which stage of continuous monitoring involves adding data, creating detections, and building drilldowns?

A.

Implement and Collect

B.

Establish and Architect

C.

Respond and Review

D.

Analyze and Report

What is the following step-by-step description an example of?

1. The attacker devises a non-default beacon profile with Cobalt Strike and embeds this within a document.

2. The attacker creates a unique email with the malicious document based on extensive research about their target.

3. When the victim opens this document, a C2 channel is established to the attacker’s temporary infrastructure on a compromised website.

A.

Tactic

B.

Policy

C.

Procedure

D.

Technique

Which of the following is a best practice for searching in Splunk?

A.

Streaming commands run before aggregating commands in the Search pipeline.

B.

Raw word searches should contain multiple wildcards to ensure all edge cases are covered.

C.

Limit fields returned from the search utilizing the cable command.

D.

Searching over All Time ensures that all relevant data is returned.

Which of the following is considered Personal Data under GDPR?

A.

The birth date of an unidentified user.

B.

An individual's address including their first and last name.

C.

The name of a deceased individual.

D.

A company's registration number.

Which of the following is a tactic used by attackers, rather than a technique?

A.

Gathering information about a target.

B.

Establishing persistence with a scheduled task.

C.

Using a phishing email to gain initial access.

D.

Escalatingprivileges via UAC bypass.

The eval SPL expression supports many types of functions. Which of these function categories is not valid with eval?

A.

JSON functions

B.

Text functions

C.

Comparison and Conditional functions

D.

Threat functions

Upon investigating a report of a web server becoming unavailable, the security analyst finds that the web server’s access log has the same log entry millions of times:

147.186.119.200 - - [28/Jul/2023:12:04:13 -0300] "GET /login/ HTTP/1.0" 200 3733

What kind of attack is occurring?

A.

Denial of Service Attack

B.

Distributed Denial of Service Attack

C.

Cross-Site Scripting Attack

D.

Database Injection Attack