SPLK-5001試験無料問題集「Splunk Certified Cybersecurity Defense Analyst 認定」

Which of the following data sources can be used to discover unusual communication within an organization's network?

As an analyst, tracking unique users is a common occurrence. The Security Operations Center (SOC) manager requested a search with results in a table format to track the cumulative downloads by distinct IP address. Which example calculates the running total of distinct users over time?

Which of the following is considered Personal Data under GDPR?

When searching in Splunk, which of the following SPL commands can be used to run a subsearch across every field in a wildcard field list?

A Cyber Threat Intelligence (CTI) team produces a report detailing a specific threat actor's typical behaviors and intent. This would be an example of what type of intelligence?

The field file_acl contains access controls associated with files affected by an event. In which data model would an analyst find this field?

Which of the following is not considered a type of default metadata in Splunk?

The Lockheed Martin Cyber Kill Chain breaks an attack lifecycle into several stages. A threat actor modified the registry on a compromised Windows system to ensure that their malware would automatically run at boot time. Into which phase of the Kill Chain would this fall?

Refer to the exibit.

An analyst is building a search to examine Windows XML Event Logs, but the initial search is not returning any extracted fields. Based on the above image, what is themost likelycause?

An analyst is attempting to investigate a Notable Event within Enterprise Security. Through the course of their investigation they determined that the logs and artifacts needed to investigate the alert are not available.
What event disposition should the analyst assign to the Notable Event?