What is the term for a model of normal network activity used to detect deviations?
Answer : A
What is the first phase of the Continuous Monitoring cycle?
Answer : B
A Risk Notable Event has been triggered in Splunk Enterprise Security, an analyst investigates the alert, and determines it is a false positive. What metric would be used to define the time between alert creation and close of the event?
Answer : A
Which dashboard in Enterprise Security would an analyst use to generate a report on users who are currently on a watchlist?
Answer : D
Rotating encryption keys after a security incident is most closely linked to which security concept?
Answer : A
While the top command is utilized to find the most common values contained within a field, a Cyber Defense Analyst hunts for anomalies. Which of the following Splunk commands returns the least common values?
Answer : C
What Splunk feature would enable enriching public IP addresses with ASN and owner information?
Answer : B