ES Admin Flashcards

(28 cards)

1
Q

The Add-On Builder creates Splunk Apps that start with what?

A. DA-
B. SA-
C. TA-
D. App-

A

C. TA-

ES Admin Slide 182

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following are examples of sources for events in the endpoint security domain dashboards?

A. REST API invocations
B. Investigation final results status
C. Workstations, notebooks, & point-of-sale systems
D. Lifecycle auditing of incidents, from assignement to resolution

A

C. Workstations, notebooks, & point-of-sale systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

When creating custom correlation searches, what format is used to embed field values in the title, description, & drill-down fields of a notable event?

A. $fieldname$
B. ג€fieldnameג€
C. %fieldname%
D. _fieldname_

A

A. $fieldname$

ES Admin Slide 222 (Module 10: Creating Correlation Searches)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What feature of Enterprise Security downloads threat intelligence data from a web server?

A. Threat Service Manager
B. Threat Download Manager
C. Threat Intelligence Parser
D. Threat Intelligence Enforcement

A

B. Threat Download Manager

ES Admin Slide 278 (Module 12: Managing Threat Intelligence)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The Remote Access panel within the User Activity dashboard is not populating with the most recent hour of data. What data model should be checked for potential errors such as skipped searches?

A. Web
B. Risk
C. Performance
D. Authentication

A

D. Authentication

https://help.splunk.com/en/splunk-enterprise-security-8/administer/8.0/dashboards/data-model-reference-for-dashboards-in-splunk-enterprise-security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In order to include an eventtype in a data model node, what is the next step after extracting the correct fields?

A. Save the settings
B. Apply the correct tags
C. Run the correct search
D. Visit the CIM dashboard

A

C. Run the correct search

Run the correct search to ensure the data is accurately represented.
Apply the correct tags to categorize the events and ensure that they are processed correctly within the data model.
Applying tags helps identify and group events based on common characteristics, making it easier for the data model to classify and use these events in searches, dashboards, or correlation searches.

https://docs.splunk.com/Documentation/CIM/4.15.0/User/UsetheCIMtonormalizeOSSECdata

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What role should be assigned to a security team member who will be taking ownership of notable events in the incident review dashboard?

A. ess_user
B. ess_admin
C. ess_analyst
D. ess_reviewer

A

C. ess_analyst

ES Admin Slide 21 (Module 1: Introduction to Enterprise Security)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which column in the Asset or Identity list is combined with event security to make a notable event’s urgency?

A. VIP
B. Priority
C. Importance
D. Criticality

A

B. Priority

ES Admin Slide 33 (Module 2: Security Monitoring)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does the risk framework add to an object (user, server or other type) to indicate increased risk?

A. An urgency
B. A risk profile
C. An aggregation
D. A numeric score

A

D. A numeric score

ES Admin Slide 58 (Module 3: Risk-Based Alerting)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which indexes are searched by default for CIM data models?

A. notable and default
B. summary and notable
C. _internal and summary
D. All indexes

A

D. All indexes

ES Admin Slide 158 (Module 7: Validating ES Data)

https://community.splunk.com/t5/All-Apps-and-Add-ons/Indexes-searched-by-CIM-data-models/td-p/348455

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which setting is used in indexes.conf to specify alternate locations for accelerated storage?

A. thawedPath
B. tstatsHomePath
C. summaryHomePath
D. warmToColdScript

A

C. summaryHomePath

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following is a way to test for a property normalized data model?

A. Use Audit -> Normalization Audit & check the Errors panel
B. Run a | datamodel search, compare results to the CIM documentation for the datamodel
C. Run a | loadjob search, look at tag values & compare them to known tags based on the encoding
D. Run a | datamodel search & compare the results to the list of data models in the ES normalization guide

A

B. Run a | datamodel search, compare results to the CIM documentation for the datamodel

ES Admin Slide 160 (Module 7: Validating ES Data)

https://docs.splunk.com/Documentation/CIM/4.15.0/User/UsetheCIMtonormalizedataatsearchtime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which argument to the | tstats command restricts the search to summarized data only?

A. summaries=t
B. summaries=all
C. summariesonly=t
D. summariesonly=all

A

C. summariesonly=t

ES Admin Slide 11 (Module 1: Introduction to Enterprise Security) or 147

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

When investigating, what is the best way to store a newly-found IOC?

A. Paste it into Notepad
B. Click the “Add IOC” button
C. Click the “Add Artifact” button
D. Add it ina a text note to the investigation

A

C. Click the “Add Artifact” button

ES Admin Slides 369-372 (Appendix: Using ES Investigations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How is it possible to navigate to the list of currently-enabled ES correlation searches?

A. Configure > Correlation Search > Select Status “Enabled”
B. Settings > Searches, Reports, and Alerts > Filter by Name of “Correlation”
C. Configure > Content Management > Select Type “Correlation” and Status “Enabled”
D. Settings > Searches, Reports, and Alerts > Select App of “SplunkEnterpriseSecuritySuite” and filter by “-Rule”

A

C. Configure > Content Management > Select Type “Correlation” and Status “Enabled”

ES Admin Slide 17 (Module 1: Introduction to Enterprise Security)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following is a risk of using the Auto Deployment feature of Distributed Configuration Management to distribute indexes.conf?

A. Indexers might crash
B. Indexers might be processing
C. Indexers might not be reachable
D. Indexers have different settings

A

D. Indexers have different settings

17
Q

Which of the following are data models used by ES? (Choose all that apply)

A. Web
B. Anomalies
C. Authentication
D. Network Traffic

A

A. Web
C. Authentication
D. Network Traffic

ES Admin Slide 154 (Module 7: Validating ES Data)

18
Q

At what point in the ES installation process should Splunk_TA_ForIndexers.spl be deployed to the indexers?

A. When adding apps to the deployment server
B. Splunk_TA_ForIndexers.spl is installed first
C. After installing ES on the search head(s) & running the distributed configuration management tool
D. Splunk_TA_ForIndexers.spl is only installed on indexer cluster sites using the cluster master & the splunk apply cluster-bundle command

A

C. After installing ES on the search head(s) & running the distributed configuration management tool

ES Admin Slide 105 (Module 5: Installation)

19
Q

Which correlation search feature is used to throttle the creation of notable events?

A. Schedule priority
B. Window interval
C. Window duration
D. Schedule window

A

C. Window duration

ES Admin Slide 203 (Module 9: Tuning Correlation Searches)

20
Q

Both `Recommended Actions` and `Adaptive Response Actions` use adaptive response. How do they differ?

A. Recommended Actions show a textual description to an analyst, Adaptive Response Actions show them encoded
B. Recommended Actions show a list of Adaptive Responses to an analyst, Adaptive Response Actions run them automatically
C. Recommended Actions show a list of Adaptive Responses that have already been run, Adaptive Response Actions run them automatically
D. Recommended Actions show a list of Adaptive Responses to an analyst, Adaptive Response Actions run manually with analyst intervention

A

B. Recommended Actions show a list of Adaptive Responses to an analyst, Adaptive Response Actions run them automatically

ES Admin Slide 224 & 226 (Module 10: Creating Correlation Searches)

21
Q

What does the Security Posture dashboard display?

A. Active investigations and their status
B. A high-level overview of notable events
C. Current threats being tracked by the SOC
D. A display of the status of security tools

A

B. A high-level overview of notable events

ES Admin Slides 28 (Module 2: Security Monitoring)

22
Q

`10.22.63.159`, `websvr4`, and `00:26:08:18:CF:1D` would be matched against what in ES?

A. A user
B. A device
C. An asset
D. An identity

A

C. An asset

ES Admin Slides 235 (Module 11: Asset & Identity Management)

23
Q

How should an administrator add a new lookup through the ES app?

A. Upload the lookup file in Settings > Lookups > Lookup Definitions
B. Upload the lookup file in Settings > Lookups > Lookup table files
C. Add the lookup file /etc/apps/SplunkEnterpriseSecuritySuite/lookups
D. Upload the lookup file using Configure > Content Management > Create New Content > Managed Lookup

A

D. Upload the lookup file using Configure > Content Management > Create New Content > Managed Lookup

24
Q

An administrator is asked to configure an `Nslookup` adaptive response action, so that it appears as a selectable option in the notable event’s action menu when an anlayst is working in the Incident Review dashboard. What steps would the administrator take to configure this option?

A. Configure > Content Management > Type: Correlation Search > Notable > Nslookup
B. Configure > Type: Correlation Search > Notable > Recommended Actions > Nslookup
C. Configure > Content Management > Type: Correlation Search > Notable > Next Steps > Nslookup
D. Configure > Content Management > Type: Correlation Search > Notable > Recommended Actions > Nslookup

A

D. Configure > Content Management > Type: Correlation Search > Notable > Recommended Actions > Nslookup

ES Admin Slide 224 (Module 10: Creating Correlation Searches)

25
What are the steps to add a new column to the Notable Event table in the Incident Review dashboard? A. Configure > Incident Management > Notable Event Statuses B. Configure > Content Management > Type: Correlation Search C. Configure > Incident Management > Incident Review Settings > Event Management D. Configure > Incident Management > Incident Review Settings > Table Attributes
D. Configure > Incident Management > Incident Review Settings > Table Attributes | ES Admin Slide 41 (Module 2: Securit Monitoring), now Table & Event Attr ## Footnote [2025 Update](https://splunk.my.site.com/customer/s/article/How-to-add-additional-fields-on-Incident-Review-Dashboard)
26
To observe what network services are in use in a network's activity overall, which of the following dashboards in Enterprise Security will contain the most relevant data? A. Intrusion Center B. Protocol Analysis C. User Intelligence D. Threat Intelligence
B. Protocol Analysis
27
Adaptive response action history is stored in which index? A. cim\_modactions B. modular\_history C. cim\_adaptiveactions D. modular\_action\_history
D. modular\_action\_history
28
Which of the following actions would not reduce the number of false positives from a correlation search? A. Reducing the severity B. Removing throttling fields C. Increasing the throttling window D. Increasing threshold sensitivity
B. Removing throttling fields