How are Notable Events configured in Splunk Enterprise Security?
Correct : D
Start a Discussions
An analyst is investigating a network alert for suspected lateral movement from one Windows host to another Windows host. According to Splunk CIM documentation, the IP address of the host from which the attacker is moving would be in which field?
Correct : D
Start a Discussions
Which of the following data sources can be used to discover unusual communication within an organization's network?
Correct : B
Start a Discussions
When threat hunting for outliers in Splunk, which of the following SPL pipelines would filter for users with over a thousand occurrences?
Correct : B
Start a Discussions
The United States Department of Defense (DoD) requires all government contractors to provide adequate security safeguards referenced in National Institute of Standards and Technology (NIST) 800-171. All DoD contractors must continually reassess, monitor, and track compliance to be able to do business with the US government.
Which feature of Splunk Enterprise Security provides an analyst context for the correlation search mapping to the specific NIST guidelines?
Correct : D
Start a Discussions