Exam 6: Splunk IT Service Intelligence Certified Admin

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What feature of Enterprise Security downloads threat intelligence data from a web server?

(Multiple Choice)
4.8/5
(38)

In order to include an eventtype in a data model node, what is the next step after extracting the correct fields?

(Multiple Choice)
4.8/5
(42)

The Brute Force Access Behavior Detected correlation search is enabled, and is generating many false positives. Assuming the input data has already been validated. How can the correlation search be made less sensitive?

(Multiple Choice)
4.8/5
(37)

What does the Security Posture dashboard display?

(Multiple Choice)
4.9/5
(36)

What are adaptive responses triggered by?

(Multiple Choice)
4.7/5
(31)

ES needs to be installed on a search head with which of the following options?

(Multiple Choice)
4.7/5
(36)

Which argument to the | tstats command restricts the search to summarized data only?

(Multiple Choice)
4.9/5
(43)

A customer site is experiencing poor performance. The UI response time is high and searches take a very long time to run. Some operations time out and there are errors in the scheduler logs, indicating too many concurrent searches are being started. 6 total correlation searches are scheduled and they have already been tuned to weed out false positives. Which of the following options is most likely to help performance?

(Multiple Choice)
4.9/5
(34)

If a username does not match the 'identity' column in the identities list, which column is checked next?

(Multiple Choice)
4.8/5
(33)

"10.22.63.159", "websvr4", and "00:26:08:18: CF:1D" would be matched against what in ES?

(Multiple Choice)
4.7/5
(42)

Which data model populates the panels on the Risk Analysis dashboard?

(Multiple Choice)
4.9/5
(28)

Which of the following is a risk of using the Auto Deployment feature of Distributed Configuration Management to distribute indexes.conf ?

(Multiple Choice)
4.9/5
(32)

Which correlation search feature is used to throttle the creation of notable events?

(Multiple Choice)
4.9/5
(34)

How is notable event urgency calculated?

(Multiple Choice)
4.8/5
(33)

What should be used to map a non-standard field name to a CIM field name?

(Multiple Choice)
4.8/5
(37)

Where are attachments to investigations stored?

(Multiple Choice)
4.9/5
(50)

Which of the following would allow an add-on to be automatically imported into Splunk Enterprise Security?

(Multiple Choice)
4.8/5
(36)

Enterprise Security's dashboards primarily pull data from what type of knowledge object?

(Multiple Choice)
4.8/5
(33)

Glass tables can display static images and text, the results of ad-hoc searches, and which of the following objects?

(Multiple Choice)
4.8/5
(36)

Which settings indicates that the correlation search will be executed as new events are indexed?

(Multiple Choice)
5.0/5
(40)
Showing 41 - 60 of 72
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)