Exam Flashcards
(100 cards)
Which of the following is a recommended pre-installation step?
A) Disable the default search app.
B) Configure search head forwarding.
C) Download the latest version of KV Store from MongoDBxom.
D) Install the latest Python distribution on the search head.
Answer: B
According to the Splunk Enterprise Security documentation, one of the recommended pre-installation steps is to configure search head forwarding. Search head forwarding is a feature that allows the search head to forward its internal logs and metrics to an indexer or a heavy forwarder for indexing and analysis. This feature
helps you monitor the health and performance of the search head and troubleshoot any issues that may arise. You can configure search head forwarding by editing the outputs.conf file on the search head and specifying the destination indexer or forwarder. See Configure search head forwarding for more details. The other options are not recommended, because they are either unnecessary or harmful for the installation of ES. Disabling the default search app is not a good option, because it may cause some features of ES to not work properly, such as the Content Management page and the navigation editor. Downloading the latest version of KV Store from MongoDB.com is not a good option, because ES uses the built-in KV Store service that comes with Splunk Enterprise and does not require any external installation or configuration. Installing the latest Python distribution on the search head is not a good option, because it may cause compatibility issues with ES, which uses the Python version that comes with Splunk Enterprise. Therefore, the correct answer is B. Configure search head forwarding. References = Configure search head forwarding.
The Add-On Builder creates Splunk Apps that start with what?
A) DA-
B) SA-
C) TA-
D) App-
Answer: C
The Splunk Add-on Builder helps you create technology add-ons, which are specialized add-ons that help to collect, transform, and normalize data feeds from specific sources in your environment. Technology add-ons
are often referred to as TAs, and they start with the prefix TA-12.
How should an administrator add a new look up through the ES app?
A) Upload the lookup file in Settings -> Lookups -> Lookup Definitions
B) Upload the lookup file in Settings -> Lookups -> Lookup table files
C) Add the lookup file to /etc/apps/SplunkEnterpriseSecuritySuite/lookups
D) Upload the lookup file using Configure -> Content Management -> Create New Content -> Managed
Lookup
Answer: D
The correct way to add a new lookup through the ES app is to upload the lookup file using Configure > Content Management > Create New Content > Managed Lookup. This allows the user to create or select an existing lookup file and definition, specify the lookup type, label, and description, and enable editing of the lookup file. This also stores the lookup file at the application level, which makes it easier to edit and share. The other options are either incorrect or not recommended for ES. Uploading the lookup file in Settings > Lookups > Lookup table files does not create a lookup definition or a label and description for the lookup. Uploading the lookup file in Settings > Lookups > Lookup Definitions does not upload the lookup file itself,
but only creates a definition for an existing file. Adding the lookup file to
/etc/apps/SplunkEnterpriseSecuritySuite/lookups requires manual editing of the file system and is not recommended for ES.
Which of the following is an adaptive action that is configured by default for ES?
A) Create notable event
B) Create new correlation search
C) Create investigation
D) Create new asset
Answer: A
According to the Splunk Enterprise Security documentation, the Create Notable Event adaptive response action is one of the included adaptive response actions that is configured by default for ES. This action allows you to create a notable event from the results of a correlation search or from the details of another notable
event. You can customize the title, description, urgency, owner, and other fields of the notable event. The Create Notable Event action is useful for creating alerts or tasks based on specific conditions or criteria. Therefore, the correct answer is A. Create notable event. References = Create Notable Event.
What can be exported from ES using the Content Management page?
A) Only correlation searches, managed lookups, and glass tables.
B) Only correlation searches.
C) Any content type listed in the Content Management page.
D) Only correlation searches, glass tables, and workbench panels.
Answer = C
The Content Management page in Splunk Enterprise Security allows you to export any content type that is listed on the page as an app. The content types include correlation searches, glass tables, dashboards, reports,
saved searches, key indicators, workbench panels, and managed lookups. You can use the export option to share custom content with other ES instances, such as migrating customized searches from a development or
testing environment into production. You can also import content from other ES instances or from Splunkbase using the Content Management page.
ES apps and add-ons from $SPLUNK_HOME/etc/apps should be copied from the staging instance to what
location on the cluster deployer instance?
A) $SPLUNK_HOME/etc/master-apps/
B) $SPLUNK_HOME/etc/system/local/
C) $SPLUNK_HOME/etc/shcluster/apps
D) $SPLUNK_HOME/var/run/searchpeers/
Answer = C
ES apps and add-ons from $SPLUNK_HOME/etc/apps should be copied from the staging instance to the
$SPLUNK_HOME/etc/shcluster/apps location on the cluster deployer instance. This is the directory where the deployer stores the configuration bundle that it distributes to the search head cluster members. The configuration bundle consists of apps and other configuration files that are not replicated by the cluster. The deployer does not use the $SPLUNK_HOME/etc/master-apps/ directory, which is used by the master node in
an indexer cluster. The deployer does not use the $SPLUNK_HOME/etc/system/local/ directory, which is used to store local configuration files for the deployer instance itself. The deployer does not use the
$SPLUNK_HOME/var/run/searchpeers/ directory, which is used by the search head to store information about
the indexer cluster peers.
Which of these Is a benefit of data normalization?
A) Reports run faster because normalized data models can be optimized for better performance.
B) Dashboards take longer to build.
C) Searches can be built no matter the specific source technology for a normalized data type.
D) Forwarder-based inputs are more efficient.
Answer: C
According to the Splunk Enterprise Security documentation, one of the benefits of data normalization is that searches can be built no matter the specific source technology for a normalized data type. Data normalization
is a way to ingest and store data in the Splunk platform using a common format for consistency and efficiency. When data is normalized, it follows the same field names and event tags for equivalent events from different
sources or vendors. This allows you to perform cross-source analysis and correlation of security events without worrying about the differences in data formats. For example, if you have data from Windows, Linux, and Mac OS systems, you can normalize them using the Endpoint data model and use the same fields, such as , , and , to search for endpoint events across all systems. Therefore, the correct answer is C. Searches can be built no matter the specific source technology for a normalized data type.
A site has a single existing search head which hosts a mix of both CIM and non-CIM compliant applications.
All of the applications are mission-critical. The customer wants to carefully control cost, but wants good ES
performance. What is the best practice for installing ES?
A) Install ES on the existing search head.
B) Add a new search head and install ES on it.
C) Increase the number of CPUs and amount of memory on the search head, then install ES.
D) Delete the non-CIM-compliant apps from the search head, then install ES.
Answer: B
This is because ES is a resource-intensive application that requires a dedicated search head with sufficient CPU and memory. Installing ES on the existing search head may cause performance issues and conflicts with
other applications. Deleting the non-CIM-compliant apps from the search head is not recommended, as they are mission-critical for the site. Increasing the number of CPUs and amount of memory on the search head
may not be enough to handle the load of ES and other applications. Therefore, option B is the most suitable answer. You can find more information about installing ES on this web page1.
Which column in the Asset or Identity list is combined with event security to make a notable event’s urgency?
A) VIP
B) Priority
C) Importance
D) Criticality
Answer: B
Explanation
The priority column in the asset or identity list is combined with the event severity to make a notable event’s
urgency in Splunk Enterprise Security. The urgency is a measure of how important it is to address a notable
event, and it is calculated based on a matrix that maps the priority of the asset or identity involved in the event
and the severity of the event. The urgency can be one of the following values: low, medium, high, or critical12. For example, by default, medium, high, and critical priority, combined with critical severity, will generate a critical urgency ranking3.
Which argument to the | tstats command restricts the search to summarized data only?
A) summaries=t
B) summaries=all
C) summariesonly=t
D) summariesonly=all
Answer: C
The argument to the | tstats command that restricts the search to summarized data only is summariesonly=t. Summarized data is the data that is generated by the data model acceleration process, which creates summary indexes (TSIDX files) for the data models. By using summariesonly=t, the tstats command will only search the summary indexes, which can improve the performance and efficiency of the search. However, this also means
that the search will not return any events that are not covered by the data model acceleration, such as events outside the acceleration time range or events that do not match the data model constraints12.
When installing Enterprise Security, what should be done after installing the add-ons necessary for normalizing data?
A) Configure the add-ons according to their README or documentation.
B) Disable the add-ons until they are ready to be used, then enable the add-ons.
C) Nothing, there are no additional steps for add-ons.
D) Configure the add-ons via the Content Management dashboard.
Answer: A
After installing the add-ons necessary for normalizing data, you should configure the add-ons according to their README or documentation. The add-ons that are included in the Splunk Enterprise Security package are preconfigured and do not require additional steps. However, the add-ons that are downloaded separately from Splunkbase may require additional configuration steps, such as enabling inputs, setting up credentials, or
modifying props and transforms. You should review the README or documentation for each add-on to determine the specific configuration requirements and follow the instructions accordingly.
What feature of Enterprise Security downloads threat intelligence data from a web server?
A) Threat Service Manager
B) Threat Download Manager
C) Threat Intelligence Parser
D) Therat Intelligence Enforcement
Answer: B
The Threat Download Manager is a feature of Splunk Enterprise Security that downloads threat intelligence data from a web server. The Threat Download Manager is a modular input that runs on a schedule and fetches threat intelligence data from various sources, such as STIX/TAXII servers, RSS feeds, or custom URLs. The Threat Download Manager then passes the downloaded data to the Threat Intelligence Parser for further
processing12.
Where should an ES search head be installed?
A) On a Splunk server with top level visibility.
B) On any Splunk server.
C) On a server with a new install of Splunk.
D) On a Splunk server running Splunk DB Connect.
Answer: C
According to the Splunk Enterprise Security documentation, the recommended way to install ES is on a server with a new install of Splunk. This is because ES requires a dedicated search head that is not shared with other
apps or users. Installing ES on a server with a new install of Splunk ensures that there are no conflicts or performance issues with other apps or configurations. If you want to install ES on an existing search head, you need to follow some additional steps, such as redirecting distributed search connections, purging KV Store,
and backing up existing data.
Which of the following is a key feature of a glass table?
A) Rigidity.
B) Customization.
C) Interactive investigations.
D) Strong data for later retrieval.
Answer: B
A key feature of a glass table is customization. A glass table is a dashboard that allows you to create dynamic and interactive visualizations of your security data. You can customize a glass table by adding static images and text, the results of ad-hoc searches, and security metrics that show the values of KPIs, service health
scores, or notable events. You can also configure the appearance, behavior, and drilldown options of the glass table elements. A glass table is not rigid, but flexible and adaptable to your security needs. A glass table is not designed for interactive investigations, but for high-level monitoring and analysis. A glass table does not store data for later retrieval, but shows real-time data generated by KPIs and services.
After data is ingested, which data management step is essential to ensure raw data can be accelerated by a Data
Model and used by ES?
A) Applying Tags.
B) Normalization to Customer Standard.
C) Normalization to the Splunk Common Information Model.
D) Extracting Fields.
Answer C
After data is ingested, the data management step that is essential to ensure raw data can be accelerated by a data model and used by ES is normalization to the Splunk Common Information Model (CIM). The CIM is a
standard and consistent way of naming and structuring the fields and tags for different types of data, such as network, web, email, authentication, and malware. The CIM allows you to use the same search queries and
dashboards across different data sources, even if they have different formats or schemas. Normalizing data to the CIM involves mapping the raw data fields and tags to the CIM fields and tags using technology add-ons.
Technology add-ons are Splunk apps that provide the necessary configurations and extractions for specific data sources. By normalizing data to the CIM, you can enable data model acceleration for the data models thatuse the CIM fields and tags. Data model acceleration is a feature that speeds up searches and reports that use data models by pre-computing and storing the results of the data model queries. Data model acceleration is
required for most of the dashboards and correlation searches in Splunk Enterprise Security.
What kind of value is in the red box in this picture?
Additional Fields // Value
HTTP Method // GET
Source // 10.98.27.195 (red box with 500)
A) A risk score.
B) A source ranking.
C) An event priority.
D) An IP address rating.
Answer: D
The value in the red box is an IP address rating. This is a numerical value that represents the risk associated with an IP address. The higher the value, the higher the risk. This value is calculated based on the number of security events associated with the IP address, the severity of those events, and the time since the last event.
Which of the following is a Web Intelligence dashboard?
A) Network Center
B) Endpoint Center
C) HTTP Category Analysis
D) stream: http Protocol dashboard
Answer: C
According to the Splunk Enterprise Security documentation, the HTTP Category Analysis dashboard is one of the Web Intelligence dashboards that help you analyze web traffic in your network and identify notable HTTP
categories, user agents, new domains, and long URLs. The dashboard shows the top HTTP categories by bytes, requests, and users, and allows you to filter the data by time range, category, user, and domain. The dashboard also provides drilldown links to other dashboards, such as the Web User Agent Analysis dashboard and the Web Domain Analysis dashboard, for further analysis.
Which indexes are searched by default for CIM data models?
A) notable and default
B) summary and notable
C) _internal and summary
D) All indexes
Answer: D
By default, the CIM data models search all indexes in Splunk Enterprise Security. This means that any event that matches the tags and fields of a data model can be included in the data model, regardless of the index where it is stored. However, this can also affect the performance and efficiency of the data model searches, especially if there are many indexes that do not contain relevant data for the data model. Therefore, it is recommended to use the indexes allow list setting in the CIM add-on to constrain the indexes that each data model searches. The indexes allow list is a comma-separated list of indexes that you want to include in the data model search. You can specify index names or index macros. For example, you can set the indexes allow
list for the Authentication data model to index=main, index=security, index=auth to limit the search to only
those three indexes12.
To observe what network services are in use in a network’s activity overall, which of the following dashboards in Enterprise Security will contain the most relevant data?
A) Intrusion Center
B) Protocol Analysis
C) User Intelligence
D) Threat Intelligence
Answer = B
To observe what network services are in use in a network’s activity overall, the Protocol Analysis dashboard in Enterprise Security will contain the most relevant data. The Protocol Analysis dashboard shows the network traffic data by protocol, such as TCP, UDP, ICMP, and others. You can use this dashboard to identify the most active protocols, the most active hosts, the most active ports, and the most active connections in your network. You can also filter the dashboard by protocol, host, port, or connection to narrow down your analysis. The Protocol Analysis dashboard uses the data from the Network Resolution (stream) data model, which requires the Splunk Stream app to collect network packet data1.
How is it possible to navigate to the ES graphical Navigation Bar editor?
A) Configure -> Navigation Menu
B) Configure -> General -> Navigation
C) Settings -> User Interface -> Navigation -> Click on “Enterprise Security”
D) Settings -> User Interface -> Navigation Menus -> Click on “default” next to
SplunkEnterpriseSecuritySuite
Answer = B
To navigate to the ES graphical Navigation Bar editor, you need to click the Configure menu in the ES app bar, then select General, and then select Navigation. The Navigation page allows you to customize the navigation bar of the ES app by adding, removing, or reordering the menu items. You can also edit the labels,
icons, and links of the menu items. You can use the graphical editor to drag and drop the menu items, or you can edit the navigation XML directly. For more information, see Customize the navigation bar in Splunk Enterprise Security1. The other options, A, C, and D, are not correct. There is no Navigation Menu option under the Configure menu. The Settings menu does not allow you to edit the navigation bar of the ES app. The Settings menu only allows you to edit the navigation menus of the Splunk platform, such as the app launcher
and the user menu.
What does the risk framework add to an object (user, server or other type) to indicate increased risk?
A) An urgency.
B) A risk profile.
C) An aggregation.
D) A numeric score.
Answer: D
The risk framework in Splunk Enterprise Security adds a numeric score to an object (user, server or other type) to indicate increased risk. The numeric score is calculated by summing up the risk scores of all the risk
modifiers that are associated with the object. A risk modifier is an event that modifies the risk of an object, such as a malware infection, a failed login, or a suspicious activity. The risk score of a risk modifier is determined by the correlation search that triggers the risk analysis response action, which can be customized or
created by the user12. The numeric score of an object reflects its overall risk level and can be used to prioritize investigation and response actions3.
The option to create a Short ID for a notable event is located where?
A) The Additional Fields.
B) The Event Details.
C) The Contributing Events.
D) The Description.
Answer: B
According to the Splunk Enterprise Security documentation, the option to create a Short ID for a notable event is located in the Event Details section of the notable event. The Event Details section shows the basic information about the notable event, such as title, description, urgency, owner, status, and others. It also provides a link to Create Short ID, which generates a 6-digit alphanumeric code that can be used to identify and share the notable event. The Short ID is appended to the URL of the Incident Review dashboard and can
be used to filter the notable events by the Short ID field. See Manually create a notable event in Splunk Enterprise Security for more details. Therefore, the correct answer is B. The Event Details.
What should be used to map a non-standard field name to a CIM field name?
A) Field alias.
B) Search time extraction.
C) Tag.
D) Eventtype.
Answer: A
A field alias is a knowledge object that maps a non-standard field name to a CIM field name. A field alias allows you to use the same search string to retrieve data from different data sources, even if the data sources use different field names for the same type of data. For example, if you have data sources that use different field names for the source IP address, such as src_ip, source_ip, or sip, you can create a field alias that maps these field names to the CIM field name src. This way, you can use src as a common field name in your searches and reports, and Splunk will automatically replace it with the appropriate field name for each data
source. Field aliases are applied at search time, so they do not affect the original data or the index time field
extractions.
Which feature contains scenarios that are useful during ES Implementation?
A) Use Case Library
B) Correlation Searches
C) Predictive Analytics
D) Adaptive Responses
Answer: A
According to the Splunk Enterprise Security documentation, the Use Case Library is a feature that contains scenarios that are useful during ES implementation. The Use Case Library provides a collection of Analytic Stories that provide actionable guidance for detecting, analyzing, and addressing security threats. An Analytic Story contains the searches, data sources, and explanations that you need to implement the scenario in your own ES environment. The Use Case Library also allows you to explore, activate, bookmark, and configure the searches that are related to each Analytic Story. You can filter the Analytic Stories by industry use cases, frameworks, or data sources. The Use Case Library helps you to quickly and easily deploy the most relevant
security content for your organization. Therefore, the correct answer is A. Use Case Library.