Free SPLK-5001 Exam Braindumps (page: 3)

Page 2 of 18

A threat hunter executed a hunt based on the following hypothesis:

As an actor, I want to plant rundll32 for proxy execution of malicious code and leverage Cobalt Strike for Command and Control.

Relevant logs and artifacts such as Sysmon, netflow, IDS alerts, and EDR logs were searched, and the hunter is confident in the conclusion that Cobalt Strike is not present in the company's environment.

Which of the following best describes the outcome of this threat hunt?

  1. The threat hunt was successful because the hypothesis was not proven.
  2. The threat hunt failed because the hypothesis was not proven.
  3. The threat hunt failed because no malicious activity was identified.
  4. The threat hunt was successful in providing strong evidence that the tactic and tool is not present in the environment.

Answer(s): D



An analyst notices that one of their servers is sending an unusually large amount of traffic, gigabytes more than normal, to a single system on the Internet. There doesn't seem to be any associated increase in incoming traffic.

What type of threat actor activity might this represent?

  1. Data exfiltration
  2. Network reconnaissance
  3. Data infiltration
  4. Lateral movement

Answer(s): A



In which phase of the Continuous Monitoring cycle are suggestions and improvements typically made?

  1. Define and Predict
  2. Establish and Architect
  3. Analyze and Report
  4. Implement and Collect

Answer(s): C



An analyst is not sure that all of the potential data sources at her company are being correctly or completely utilized by Splunk and Enterprise Security.
Which of the following might she suggest using, in order to perform an analysis of the data types available and some of their potential security uses?

  1. Splunk ITSI
  2. Security Essentials
  3. SOAR
  4. Splunk Intelligence Management

Answer(s): B






Post your Comments and Discuss Splunk® SPLK-5001 exam with other Community members:

SPLK-5001 Discussions & Posts