Splunk-SPLK-3001
Splunk-SPLK-3001
SPLK-3001
SPLK-3001
SSpplulunnkkEEnntteerrpprrisiseeSSeeccuurritityyCCeerrttififieieddA
AddmmininEExxaamm
Question #:1
When ES content is exported, an app with a .spl extension is automatically created. What is the best practice
when exporting and importing updates to ES content?
D. Either use new app names or always include both existing and new content.
Answer: D
Explanation
Either use new app names each time (which could be difficult to manage) or make sure you always include all
content (old and new) each time you export.
Question #:2
Which of the following is a way to test for a property normalized data model?
A. Use Audit -> Normalization Audit and check the Errors panel.
B. Run a | datamodel search, compare results to the CIM documentation for the datamodel.
C. Run a | loadjob search, look at tag values and compare them to known tags based on the encoding.
D. Run a | datamodel search and compare the results to the list of data models in the ES normalization
guide.
Answer: B
Question #:3
Enterprise Security’s dashboards primarily pull data from what type of knowledge object?
A. Tstats
B. KV Store
C. Data models
D. Dynamic lookups
1 of 33
Splunk - SPLK-
Answer: C
Question #:4
The Add-On Builder creates Splunk Apps that start with what?
A. DA-
B. SA-
C. TA-
D. App-
Answer: C
Question #:5
After managing source types and extracting fields, which key step comes next In the Add-On Builder?
Answer: D
Question #:6
ES apps and add-ons from $SPLUNK_HOME/etc/apps should be copied from the staging instance to what
location on the cluster deployer instance?
A. $SPLUNK_HOME/etc/master-apps/
B. $SPLUNK_HOME/etc/system/local/
C. $SPLUNK_HOME/etc/shcluster/apps
D. $SPLUNK_HOME/var/run/searchpeers/
Answer: C
Explanation
2 of 33
Splunk - SPLK-
The upgraded contents of the staging instance will be migrated back to the deployer and deployed to the search
head cluster members. On the staging instance, copy $SPLUNK_HOME/etc/apps to
$SPLUNK_HOME/etc/disabled-apps on staging
Question #:7
A. 1 minute
B. 5 minutes
C. 15 minutes
D. 1 hour
Answer: B
Question #:8
Answer: A
Question #:9
“10.22.63.159”, “websvr4”, and “00:26:08:18: CF:1D” would be matched against what in ES?
A. A user.
B. A device.
C. An asset.
3 of 33
Splunk - SPLK-
D. An identity.
Answer: B
Question #:10
A. Install ES.
Answer: D
Question #:11
A. A risk score.
B. A source ranking.
C. An event priority.
D. An IP address rating.
Answer: A
4 of 33
Splunk - SPLK-
Question #:12
The Brute Force Access Behavior Detected correlation search is enabled, and is generating many false
positives. Assuming the input data has already been validated. How can the correlation search be made less
sensitive?
A. Edit the search and modify the notable event status field to make the notable events less urgent.
B. Edit the search, look for where or xswhere statements, and after the threshold value being compared to
make it less common match.
C. Edit the search, look for where or xswhere statements, and alter the threshold value being compared to
make it a more common match.
D. Modify the urgency table for this correlation search and add a new severity level to make notable events
from this search less urgent.
Answer: B
Question #:13
A. Index Updater
C. indexes.conf
D. Splunk_TA_ForIndexeres. spl
Answer: B
Question #:14
Which of the following threat intelligence types can ES download? (Choose all that apply)
A. Text
B. STIX/TAXII
C. VulnScanSPL
D. SplunkEnterpriseThreatGenerator
Answer: A B
5 of 33
Splunk - SPLK-
Question #:15
Which columns in the Assets lookup are used to identify an asset in an event?
Answer: C
Question #:16
Which of the following features can the Add-on Builder configure in a new add-on?
A. Expire data.
B. Normalize data.
C. Summarize data.
D. Translate data.
Answer: B
Question #:17
D. Add notable event suppressions for correlation searches with high numbers of false positives.
Answer: A
Question #:18
6 of 33
Splunk - SPLK-
A. SA-CIM.
B. SA-Notable.
C. ES application.
D. Technology add-on.
Answer: A
Question #:19
A set of correlation searches are enabled at a new ES installation, and results are being monitored. One of the
correlation searches is generating many notable events which, when evaluated, are determined to be false
positives.
Answer: A
Question #:20
When installing Enterprise Security, what should be done after installing the add-ons necessary for
normalizing data?
B. Disable the add-ons until they are ready to be used, then enable the add-ons.
Answer: A
Question #:21
7 of 33
Splunk - SPLK-
What does the risk framework add to an object (user, server or other type) to indicate increased risk?
A. An urgency.
B. A risk profile.
C. An aggregation.
D. A numeric score.
Answer: D
Question #:22
A security manager has been working with the executive team en long-range security goals. A primary goal
for the team Is to Improve managing user risk in the organization. Which of the following ES features can help
identify users accessing inappropriate web sites?
A. Configuring the identities lookup with user details to enrich notable event Information for forensic
analysis.
B. Make sure the Authentication data model contains up-to-date events and is properly accelerated.
C. Configuring user and website watchlists so the User Activity dashboard will highlight unwanted user
actions.
D. Use the Access Anomalies dashboard to identify unusual protocols being used to access corporate sites.
Answer: C
Question #:23
In order to include an eventtype in a data model node, what is the next step after extracting the correct fields?
Answer: C
Question #:24
8 of 33
Splunk - SPLK-
Answer: D
Explanation
https://docs.splunk.com/Documentation/ES/6.4.1/Admin/Createthreatmatchspecs
Question #:25
Which of the following is an adaptive action that is configured by default for ES?
C. Create investigation
Answer: A
Question #:26
Answer: B
Explanation
The Security Posture dashboard is designed to provide high-level insight into the notable events across all
domains of your deployment, suitable for display in a Security Operations Center (SOC). This dashboard
9 of 33
Splunk - SPLK-
Question #:27
After installing Enterprise Security, the distributed configuration management tool can be used to create which
app to configure indexers?
A. Splunk_DS_ForIndexers.spl
B. Splunk_ES_ForIndexers.spl
C. Splunk_SA_ForIndexers.spl
D. Splunk_TA_ForIndexers.spl
Answer: D
Question #:28
A. MAC address
B. User name
C. Server
D. People
Answer: A
Question #:29
Which of the following are examples of sources for events in the endpoint security domain dashboards?
Answer: C
Question #:30
10 of
Splunk - SPLK-
Glass tables can display static images and text, the results of ad-hoc searches, and which of the following
objects?
A. Lookup searches.
B. Summarized data.
C. Security metrics.
Answer: C
Question #:31
Which of the following actions would not reduce the number of false positives from a correlation search?
Answer: A
Question #:32
A. cim_modactions
B. modular_history
C. cim_adaptiveactions
D. modular_action_history
Answer: A
Question #:33
Which data model populated the panels on the Risk Analysis dashboard?
11 of
Splunk - SPLK-
A. Risk
B. Audit
C. Domain analysis
D. Threat intelligence
Answer: A
Question #:34
Answer: C
Question #:35
A. No other apps.
Answer: D
Question #:36
12 of
Splunk - SPLK-
Answer: B
Question #:37
After data is ingested, which data management step is essential to ensure raw data can be accelerated by a Data
Model and used by ES?
A. Applying Tags.
D. Extracting Fields.
Answer: C
Question #:38
Which of the following is a risk of using the Auto Deployment feature of Distributed Configuration
Management to distribute indexes.conf?
Answer: A
Question #:39
The Remote Access panel within the User Activity dashboard is not populating with the most recent hour of
data. What data model should be checked for potential errors such as skipped searches?
A. Web
B. Risk
13 of
Splunk - SPLK-
C. Performance
D. Authentication
Answer: D
Question #:40
A. Configure -> Content Management -> Type: Correlation Search -> Notable -> Nslookup
B. Configure -> Type: Correlation Search -> Notable -> Recommended Actions -> Nslookup
C. Configure -> Content Management -> Type: Correlation Search -> Notable -> Next Steps -> Nslookup
D. Configure -> Content Management -> Type: Correlation Search -> Notable -> Recommended Actions
-> Nslookup
Answer: D
Question #:41
Which of the following lookup types in Enterprise Security contains information about known hostile IP
addresses?
A. Security domains.
B. Threat intel.
C. Assets.
D. Domains.
Answer: B
Question #:42
14 of
Splunk - SPLK-
D. Severity set by the correlation search and priority assigned to the associated asset or identity.
Answer: D
Question #:43
Answer: B
Question #:44
Both “Recommended Actions” and “Adaptive Response Actions” use adaptive response. How do they differ?
A. Recommended Actions show a textual description to an analyst, Adaptive Response Actions show them
encoded.
B. Recommended Actions show a list of Adaptive Responses to an analyst, Adaptive Response Actions run
them automatically.
C. Recommended Actions show a list of Adaptive Responses that have already been run, Adaptive
Response Actions run them automatically.
D. Recommended Actions show a list of Adaptive Resposes to an analyst, Adaptive Response Actions run
manually with analyst intervention.
Answer: D
Question #:45
When using distributed configuration management to create the Splunk_TA_ForIndexers package, which three
files can be included?
15 of
Splunk - SPLK-
Answer: A
Question #:46
Which of the following are the default ports that must be configured for Splunk Enterprise Security to
function?
Answer: C
Explanation
https://docs.splunk.com/Documentation/Splunk/8.1.2/Security/SecureSplunkonyournetwork
Question #:47
Answer: C
Question #:48
A customer site is experiencing poor performance. The UI response time is high and searches take a very long
time to run. Some operations time out and there are errors in the scheduler logs, indicating too many
concurrent searches are being started. 6 total correlation searches are scheduled and they have already been
16 of
Splunk - SPLK-
B. Add heavy forwarders between the universal forwarders and indexers so inputs can be parsed before
indexing.
C. Increase memory and CPUs on the search head(s) and add additional indexers.
Answer: C
Question #:49
Answer: C
Question #:50
A. Network Center
B. Endpoint Center
Answer: C
Question #:51
17 of
Splunk - SPLK-
C. Settings -> User Interface -> Navigation -> Click on “Enterprise Security”
D. Settings -> User Interface -> Navigation Menus -> Click on “default” next to
SplunkEnterpriseSecuritySuite
Answer: B
Question #:52
An administrator wants to ensure that none of the ES indexed data could be compromised through tampering.
What feature would satisfy this requirement?
A. Index consistency.
C. Indexer acknowledgement.
Answer: B
Question #:53
Analysts have requested the ability to capture and analyze network traffic data. The administrator has
researched the documentation and, based on this research, has decided to integrate the Splunk App for Stream
with ES.
Which dashboards will now be supported so analysts can view and analyze network Stream data?
A. Endpoint dashboards.
Answer: C
Question #:54
18 of
Splunk - SPLK-
A. Reports run faster because normalized data models can be optimized for better performance.
C. Searches can be built no matter the specific source technology for a normalized data type.
Answer: A
Question #:55
Answer: A
Question #:56
Which settings indicated that the correlation search will be executed as new events are indexed?
A. Always-On
B. Real-Time
C. Scheduled
D. Continuous
Answer: C
Question #:57
19 of
Splunk - SPLK-
B. Correlation Searches
C. Predictive Analytics
D. Adaptive Responses
Answer: B
Question #:58
What should be used to map a non-standard field name to a CIM field name?
A. Field alias.
C. Tag.
D. Eventtype.
Answer: A
Question #:59
Answer: D
Question #:60
D. All indexes
Answer: D
20 of
Splunk - SPLK-
Question #:61
A site has a single existing search head which hosts a mix of both CIM and non-CIM compliant applications.
All of the applications are mission-critical. The customer wants to carefully control cost, but wants good ES
performance. What is the best practice for installing ES?
C. Increase the number of CPUs and amount of memory on the search head, then install ES.
D. Delete the non-CIM-compliant apps from the search head, then install ES.
Answer: B
Question #:62
B. Purge KV Store.
Answer: C
Question #:63
Which of the following steps will make the Threat Activity dashboard the default landing page in ES?
A. From the Edit Navigation page, drag and drop the Threat Activity view to the top of the page.
B. From the Preferences menu for the user, select Enterprise Security as the default application.
C. From the Edit Navigation page, click the 'Set this as the default view" checkmark for Threat Activity.
D. Edit the Threat Activity view settings and checkmark the Default View option.
Answer: C
21 of
Splunk - SPLK-
Question #:64
Which correlation search feature is used to throttle the creation of notable events?
A. Schedule priority.
B. Window interval.
C. Window duration.
D. Schedule windows.
Answer: C
Question #:65
Answer: A
Question #:66
A newly built custom dashboard needs to be available to a team of security analysts In ES. How is It possible
to Integrate the new dashboard?
B. Create a new role Inherited from es_analyst, make the dashboard permissions read-only, and make this
dashboard the default view for the new role.
C. Set the dashboard permissions to allow access by es_analysts and use the navigation editor to add it to
the menu.
D. Add the dashboard to a custom add-in app and install it to ES using the Content Manager.
Answer: C
Question #:67
When creating custom correlation searches, what format is used to embed field values in the title, description,
and drill-down fields of a notable event?
22 of
Splunk - SPLK-
A. $fieldname$
B. “fieldname”
C. %fieldname%
D. _fieldname_
Answer: A
Question #:68
A. Content exporter
Answer: B
Question #:69
A. KV Store
B. notable index
C. attachments.csv lookup
D. <splunk_home>/etc/apps/SA-Investigations/default/ui/views/attachments
Answer: A
Question #:70
A. The indexer.
23 of
Splunk - SPLK-
B. The KV Store.
Answer: C
Question #:71
What is the maximum recommended volume of indexing per day, per indexer, for a non-cloud (on-prem) ES
deployment?
A. 50 GB
B. 100 GB
C. 300 GB
D. 500 MB
Answer: B
Question #:72
How does ES know local customer domain names so it can detect internal vs. external emails?
A. Web and email domain names are set in General -> General Configuration.
B. ES uses the User Activity index and applies machine learning to determine internal and external
domains.
C. The Corporate Web and Email Domain Lookups are edited during initial configuration.
D. ES extracts local email and web domains automatically from SMTP and HTTP logs.
Answer: C
Question #:73
To observe what network services are in use in a network’s activity overall, which of the following dashboards
in Enterprise Security will contain the most relevant data?
A. Intrusion Center
24 of
Splunk - SPLK-
B. Protocol Analysis
C. User Intelligence
D. Threat Intelligence
Answer: B
Question #:74
What role should be assigned to a security team member who will be taking ownership of notable events in the
incident review dashboard?
A. ess_user
B. ess_admin
C. ess_analyst
D. ess_reviewer
Answer: B
Question #:75
Following the installation of ES, an admin configured users with the ess_user role the ability to close notable
events.
How would the admin restrict these users from being able to change the status of Resolved notable events to
Closed?
A. In Enterprise Security, give the ess_user role the Own Notable Events permission.
B. From the Status Configuration window select the Closed status. Remove ess_user from the status
C. From the Status Configuration window select the Resolved status. Remove ess_user from the status
transitions for the Closed status.
D. From Splunk Access Controls, select the ess_user role and remove the edit_notable_events
capability.
Answer: B
25 of
Splunk - SPLK-
Question #:76
Which setting is used in indexes.conf to specify alternate locations for accelerated storage?
A. thawedPath
B. tstatsHomePath
C. summaryHomePath
D. warmToColdScript
Answer: B
Question #:77
Which column in the Asset or Identity list is combined with event security to make a notable event’s urgency?
A. VIP
B. Priority
C. Importance
D. Criticality
Answer: B
Question #:78
What are the steps to add a new column to the Notable Event table in the Incident Review dashboard?
C. Configure -> Incident Management -> Incident Review Settings -> Event Management
D. Configure -> Incident Management -> Incident Review Settings -> Table Attributes
Answer: C
Question #:79
Accelerated data requires approximately how many times the daily data volume of additional storage space per
year?
26 of
Splunk - SPLK-
A. 3.4
B. 5.7
C. 1.0
D. 2.5
Answer: A
Question #:80
A. Upload the lookup file in Settings -> Lookups -> Lookup Definitions
B. Upload the lookup file in Settings -> Lookups -> Lookup table files
D. Upload the lookup file using Configure -> Content Management -> Create New Content -> Managed
Lookup
Answer: D
Question #:81
D. The Description.
Answer: B
Explanation
https://docs.splunk.com/Documentation/ES/6.4.1/User/Takeactiononanotableevent
Question #:82
If a username does not match the ‘identity’ column in the identities list, which column is checked next?
A. Email.
27 of
Splunk - SPLK-
B. Nickname
C. IP address.
Answer: A
Question #:83
An administrator is provisioning one search head prior to installing ES. What are the reference minimum
requirements for OS, CPU, and RAM for that machine?
Answer: C
Question #:84
Which of the following are data models used by ES? (Choose all that apply)
A. Web
B. Anomalies
C. Authentication
D. Network Traffic
Answer: A C D
Question #:85
At what point in the ES installation process should Splunk_TA_ForIndexes.spl be deployed to the indexers?
28 of
Splunk - SPLK-
C. After installing ES on the search head(s) and running the distributed configuration management tool.
D. Splunk_TA_ForIndexers.spl is only installed on indexer cluster sites using the cluster master and the
splunk apply cluster-bundle command.
Answer: C
Question #:86
D. Key indicators showing the highest probability correlation searches in the environment.
Answer: C
Question #:87
Following the Installation of ES, an admin configured Leers with the ©ss_uso r role the ability to close notable
events. How would the admin restrict these users from being able to change the status of Resolved notable
events to closed?
A. From the Status Configuration window select the Resolved status. Remove ess_user from the status
transitions for the closed status.
B. From the Status Configuration windows select the closed status. Remove ess_use r from the status
transitions for the Resolved status.
C. In Enterprise Security, give the ess_user role the own Notable Events permission.
D. From Splunk Access Controls, select the ess_user role and remove the edit_notabie_events capability.
Answer: B
Question #:88
29 of
Splunk - SPLK-
Answer: C
Question #:89
Which lookup table does the Default Account Activity Detected correlation search use to flag known default
accounts?
A. Administrative Identities
C. Identities
D. Privileged Accounts
Answer: C
Question #:90
Which argument to the | tstats command restricts the search to summarized data only?
A. summaries=t
B. summaries=all
C. summariesonly=t
D. summariesonly=all
Answer: C
Question #:91
Which of the following ES features would a security analyst use while investigating a network anomaly
notable?
A. Correlation editor.
Answer: D
30 of
Splunk - SPLK-
Question #:92
B. Provides instructions for customizing each dashboard for local data models.
Answer: D
Question #:93
Which of the following is part of tuning correlation searches for a new ES installation?
Answer: A
Question #:94
A. Rigidity.
B. Customization.
C. Interactive investigations.
Answer: B
Question #:95
31 of
Splunk - SPLK-
Which of the following would allow an add-on to be automatically imported into Splunk Enterprise Security?
A. A prefix of CIM_
B. A suffix of .spl
C. A prefix of TECH_
D. A prefix of Splunk_TA_
Answer: D
Question #:96
Answer: B
Question #:97
B. Settings -> Searches, Reports, and Alerts -> Filter by Name of “Correlation”
C. Configure -> Content Management -> Select Type “Correlation” and Status “Enabled”
D. Settings -> Searches, Reports, and Alerts -> Select App of “SplunkEnterpriseSecuritySuite” and filter by
“- Rule”
Answer: C
Question #:98
What feature of Enterprise Security downloads threat intelligence data from a web server?
32 of
Splunk - SPLK-
Answer: B
Explanation
"The Threat Intelligence Framework provides a modular input (Threat Intelligence Downloads) that handles
the majority of configurations typically needed for downloading intelligence files & data. To access this
modular input, you simply need to create a stanza in your Inputs.conf file called “threatlist”."
Question #:99
A. GitHub
B. SplunkBase
C. www.splunk.com
Answer: B
33 of