A successful Continuous Monitoring initiative involves the entire organization. When an analyst discovers the need for more context or additional information, perhaps from additional data sources or altered correlation rules, to what role would this request generally escalate?
Which Splunk Enterprise Security framework provides a way to identify incidents from events and then manage the ownership, triage process, and state of those incidents?
Which dashboard in Enterprise Security would an analyst use to generate a report on users who are currently on a watchlist?
Which pre-packaged app delivers security content and detections on a regular, ongoing basis for Enterprise Security and SOAR?
An analysis of an organization’s security posture determined that a particular asset is at risk and a new process or solution should be implemented to protect it. Typically, who would be in charge of implementing the new process or solution that was selected?
Which of the following is a best practice when creating performant searches within Splunk?
The Security Operations Center (SOC) manager is interested in creating a new dashboard for typosquatting after a successful campaign against a group of senior executives. Which existing ES dashboard could be used as a starting point to create a custom dashboard?
Which stage of continuous monitoring involves adding data, creating detections, and building drilldowns?
What is the main difference between hypothesis-driven and data-driven Threat Hunting?
A network security tool that continuously monitors a network for malicious activity and takes action to block it is known as which of the following?
An analyst is looking at Web Server logs, and sees the following entry as the last web request that a server processed before unexpectedly shutting down:
[51.125.121.100 - [28/01/2006:10:27:10 -0300] "POST /cgi-bin/shurdown/ HTTP/1.0" 200 3304]
What kind of attack is most likely occurring?
An adversary uses "LoudWiner" to hijack resources for crypto mining. What does this represent in a TTP framework?
The field file_acl contains access controls associated with files affected by an event. In which data model would an analyst find this field?
While the top command is utilized to find the most common values contained within a field, a Cyber Defense Analyst hunts for anomalies. Which of the following Splunk commands returns the least common values?
Which of the following is a correct Splunk search that will return results in the most performant way?
A threat hunter executed a hunt based on the following hypothesis:
As an actor, I want to plant rundll32 for proxy execution of malicious code and leverage Cobalt Strike for Command and Control.
Relevant logs and artifacts such as Sysmon, netflow, IDS alerts, and EDR logs were searched, and the hunter is confident in the conclusion that Cobalt Strike is not present in the company’s environment.
Which of the following best describes the outcome of this threat hunt?
What is the following step-by-step description an example of?
1. The attacker devises a non-default beacon profile with Cobalt Strike and embeds this within a document.
2. The attacker creates a unique email with the malicious document based on extensive research about their target.
3. When the victim opens this document, a C2 channel is established to the attacker’s temporary infrastructure on a compromised website.
Which of the following compliance frameworks was specifically created to measure the level of cybersecurity maturity within an organization?
While investigating findings in Enterprise Security, an analyst has identified a compromised device. Without leaving ES, what action could they take to run a sequence of containment activities on the compromised device that also updates the original finding?
An analyst would like to test how certain Splunk SPL commands work against a small set of data. What command should start the search pipeline if they wanted to create their own data instead of utilizing data contained within Splunk?
Which field is automatically added to search results when assets are properly defined and enabled in Splunk Enterprise Security?
In which phase of the Continuous Monitoring cycle are suggestions and improvements typically made?
Which of the following data sources would be most useful to determine if a user visited a recently identified malicious website?