Questions for the SPLK-3001 were updated on : Nov 16 ,2024
The Add-On Builder creates Splunk Apps that start with what?
C
Explanation:
Reference:
https://dev.splunk.com/enterprise/docs/developapps/enterprisesecurity/abouttheessolution/
Which of the following are examples of sources for events in the endpoint security domain
dashboards?
C
Explanation:
Reference:
https://docs.splunk.com/Documentation/ES/6.1.0/User/EndpointProtectionDomaindashboards
When creating custom correlation searches, what format is used to embed field values in the title,
description, and drill-down fields of a notable event?
A
Explanation:
Reference:
https://docs.splunk.com/Documentation/ITSI/4.4.2/Configure/Createcorrelationsearch
What feature of Enterprise Security downloads threat intelligence data from a web server?
B
Explanation:
"The Threat Intelligence Framework provides a modular input (Threat Intelligence Downloads) that
handles the majority of configurations typically needed for downloading intelligence files & data. To
access this modular input, you simply need to create a stanza in your Inputs.conf file called
threatlist."
The Remote Access panel within the User Activity dashboard is not populating with the most recent
hour of dat
a. What data model should be checked for potential errors such as skipped searches?
D
Explanation:
Reference:
https://answers.splunk.com/answers/565482/how-to-resolve-skipped-scheduled-searches.html
In order to include an eventtype in a data model node, what is the next step after extracting the
correct fields?
C
Explanation:
Reference:
https://docs.splunk.com/Documentation/CIM/4.15.0/User/UsetheCIMtonormalizeOSSECdata
What role should be assigned to a security team member who will be taking ownership of notable
events in the incident review dashboard?
B
Explanation:
Reference:
https://docs.splunk.com/Documentation/ES/6.1.0/User/Triagenotableevents
Which column in the Asset or Identity list is combined with event security to make a notable events
urgency?
B
Explanation:
Reference:
https://docs.splunk.com/Documentation/ES/6.1.0/User/Howurgencyisassigned
What does the risk framework add to an object (user, server or other type) to indicate increased risk?
D
Explanation:
Reference:
https://docs.splunk.com/Documentation/ES/6.1.0/User/RiskScoring
Which indexes are searched by default for CIM data models?
D
Explanation:
Reference:
https://answers.splunk.com/answers/600354/indexes-searched-by-cim-data-models.html
Which setting is used in indexes.conf to specify alternate locations for accelerated storage?
B
Explanation:
Reference:
https://docs.splunk.com/Documentation/Splunk/8.0.2/Knowledge/Acceleratedatamodels
Which of the following is a way to test for a property normalized data model?
B
Explanation:
Reference:
https://docs.splunk.com/Documentation/CIM/4.15.0/User/UsetheCIMtonormalizedataatsearchtime
Which argument to the | tstats command restricts the search to summarized data only?
C
Explanation:
Reference:
https://docs.splunk.com/Documentation/Splunk/8.0.2/Knowledge/Acceleratedatamodels
When investigating, what is the best way to store a newly-found IOC?
C
How is it possible to navigate to the list of currently-enabled ES correlation searches?
C
Explanation:
Reference:
https://docs.splunk.com/Documentation/ES/6.1.0/Admin/Listcorrelationsearches