Free SPLK-3001 Exam Braindumps (page: 11)

Page 10 of 22

Which of the following threat intelligence types can ES download? (Choose all that apply.)

  1. Text
  2. STIX/TAXII
  3. VulnScanSPL
  4. SplunkEnterpriseThreatGenerator

Answer(s): B


Reference:

https://docs.splunk.com/Documentation/ES/6.1.0/Admin/Downloadthreatfeed



A site has a single existing search head which hosts a mix of both CIM and non-CIM compliant applications. All of the applications are mission-critical. The customer wants to carefully control cost, but wants good ES performance. What is the best practice for installing ES?

  1. Install ES on the existing search head.
  2. Add a new search head and install ES on it.
  3. Increase the number of CPUs and amount of memory on the search head, then install ES.
  4. Delete the non-CIM-compliant apps from the search head, then install ES.

Answer(s): B


Reference:

https://www.splunk.com/pdfs/technical-briefs/splunk-validated-architectures.pdf



Enterprise Security’s dashboards primarily pull data from what type of knowledge object?

  1. Tstats
  2. KV Store
  3. Data models
  4. Dynamic lookups

Answer(s): C


Reference:

https://docs.splunk.com/Splexicon:Knowledgeobject



To which of the following should the ES application be uploaded?

  1. The indexer.
  2. The KV Store.
  3. The search head.
  4. The dedicated forwarder.

Answer(s): C


Reference:

https://docs.splunk.com/Documentation/ES/6.1.0/Install/InstallEnterpriseSecuritySHC






Post your Comments and Discuss Splunk® SPLK-3001 exam with other Community members:

SPLK-3001 Discussions & Posts