Black Friday Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtick70

050-11-CARSANWLN01 RSA NetWitness Logs & Network Administrator Exam Questions and Answers

Questions 4

To prevent a Meta key from being indexed on a core service, you can

Options:

A.

disable the parser for the Meta key in the device configuration

B.

add the value /eve/= indexNone to the key in the custom index file

C.

remove the Meta key from the Manage Default Meta Keys interface

D.

add the value valueMax= ‘’000000’’ to the key in the custom index file

Buy Now
Questions 5

The accuracy of Automated Threat Detection is enhanced by configuring

Options:

A.

Who is Lookup Service

B.

Incident Rules

C.

ESA Analytics Mappings

D.

Context Hub

Buy Now
Questions 6

In RSA NetWitness. viewing text or image data associated with a session is accessed through a

Options:

A.

packet level drill

B.

meta value view

C.

session reconstruction view

D.

decoder analysis view

Buy Now
Questions 7

To add an action to the right-click menu in the Investigation Ul. create a

Options:

A.

Right-click action

B.

Profile

C.

Context Hub List

D.

Context Menu Action

Buy Now
Questions 8

The RSA NetWitness Reporting Engine provides visibility into captured data via which of the following mechanisms?

Options:

A.

static and/or dynamic analysis

B.

alerts, reports and charts

C.

community and/or sandbox analysis

D.

ad hoc, schedules, and/or auto-run features

Buy Now
Questions 9

Which of the following statements best defines an RSA NetWitness application rule?

Options:

A.

The rule filters, truncates, keeps or otherwise flags data analyzed by RSA NetWitness

B.

The rule is used primarily to distribute content among RSA NetWitness appliances

C.

The rule uses external intelligence based on IP addresses or domains to add contextual content to network traffic

D.

The rule is an open programming language for customizing logic into the RSA NetWitness processing engine to identify new protocols or extract data to be indexed

Buy Now
Questions 10

When storage on the core devices fills to capacity, what happens?

Options:

A.

new traffic cannot be ingested

B.

the decoder leverages capacity in the concentrator, and collection continues

C.

the decoder leverages capacity in the broker, and collection continues

D.

the oldest stored sessions are deleted and collection continues

Buy Now
Exam Code: 050-11-CARSANWLN01
Exam Name: RSA NetWitness Logs & Network Administrator Exam
Last Update: Nov 25, 2024
Questions: 71
050-11-CARSANWLN01 pdf

050-11-CARSANWLN01 PDF

$25.5  $84.99
050-11-CARSANWLN01 Engine

050-11-CARSANWLN01 Testing Engine

$30  $99.99
050-11-CARSANWLN01 PDF + Engine

050-11-CARSANWLN01 PDF + Testing Engine

$40.5  $134.99