A SOC's Incident Response Standard Operating Procedure (SOP) calls for any phishing emails containing files to be detonated in Splunk Attack Analyzer for evaluation. Which of the following can an engineer implement to gain efficiency through automation?
Answer : D
Which fields are used to determine asset priority, when priority is assigned through an asset and identity lookup?
Answer : A
What framework in Enterprise Security allows engineers to build detections using known malicious IOCs comparing them to event logs to find suspicious behavior?
Answer : C
Which of the following can process data from configured containers using an automated sequence of actions?
Answer : C
A Detection Engineer works closely with SOC leads to define expected analyst workflows, often documented as a Standard Operating Procedure (SOP). Which capability can be used to document expected analyst actions in an investigation?
Answer : C
What document can be helpful in understanding the prioritization of risk when comparing entities in an organization?
Answer : D
Which of the following cURL commands would allow an engineer to effectively disable the REST API endpoint they've been utilizing for testing a detection named TestSearchDevelopment?
Answer : C
An engineer wants to track and report on all authentication to corporate assets, and wants to prioritize critical assets without significantly increasing the number of findings (notable events) generated. What process could be used to accomplish this goal?
Answer : C
In the context of Splunk's Common Information Model (CIM), which constraint ensures that events from different data sources appear in the applicable data model?
Answer : D
Which tool can help identify known tactics, techniques, and procedures that a threat group is most likely to use when targeting a financial organization?
Answer : C

Based on the provided screenshot, it's discovered that different machines or accounts have been associated with the shown threat objects. Enterprise Security has identified that these machines and accounts all point back to one owner - Fyodor.
Which two frameworks in ES are responsible for programmatically associating this information together?
Answer : C
An engineer notices that a detection is creating multiple findings (notables) for the same potential incident. Which setting can be adjusted to reduce the number of generated findings (notables)?
Answer : D
Which of the following should an engineer do as they evaluate their Threat Detection and Incident Response lifecycle?
Answer : A
Which of the following is the most efficient search to return a list of all visible indexes and the sourcetypes contained within them?
Answer : D
When creating a detection that searches user activity across CIM-compliant data, which CIM field should be reviewed to ensure that data is aggregated appropriately?
Answer : D
Have any questions or issues ? Please dont hesitate to contact us