11.11 Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

SPLK-3001 Exam Dumps - Splunk Enterprise Security Certified Admin Exam

Question # 4

Which setting is used in indexes.conf to specify alternate locations for accelerated storage?

A.

thawedPath

B.

tstatsHomePath

C.

summaryHomePath

D.

warmToColdScript

Full Access
Question # 5

When investigating, what is the best way to store a newly-found IOC?

A.

Paste it into Notepad.

B.

Click the “Add IOC” button.

C.

Click the “Add Artifact” button.

D.

Add it in a text note to the investigation.

Full Access
Question # 6

How is it possible to navigate to the ES graphical Navigation Bar editor?

A.

Configure -> Navigation Menu

B.

Configure -> General -> Navigation

C.

Settings -> User Interface -> Navigation -> Click on “Enterprise Security”

D.

Settings -> User Interface -> Navigation Menus -> Click on “default” next to SplunkEnterpriseSecuritySuite

Full Access
Question # 7

Which of the following are the default ports that must be configured for Splunk Enterprise Security to function?

A.

SplunkWeb (8068), Splunk Management (8089), KV Store (8000)

B.

SplunkWeb (8390), Splunk Management (8323), KV Store (8672)

C.

SplunkWeb (8000), Splunk Management (8089), KV Store (8191)

D.

SplunkWeb (8043), Splunk Management (8088), KV Store (8191)

Full Access
Question # 8

How should an administrator add a new look up through the ES app?

A.

Upload the lookup file in Settings -> Lookups -> Lookup Definitions

B.

Upload the lookup file in Settings -> Lookups -> Lookup table files

C.

Add the lookup file to /etc/apps/SplunkEnterpriseSecuritySuite/lookups

D.

Upload the lookup file using Configure -> Content Management -> Create New Content -> Managed Lookup

Full Access
Question # 9

When using distributed configuration management to create the Splunk_TA_ForIndexers package, which three files can be included?

A.

indexes.conf, props.conf, transforms.conf

B.

web.conf, props.conf, transforms.conf

C.

inputs.conf, props.conf, transforms.conf

D.

eventtypes.conf, indexes.conf, tags.conf

Full Access
Question # 10

When ES content is exported, an app with a .spl extension is automatically created. What is the best practice when exporting and importing updates to ES content?

A.

Use new app names each time content is exported.

B.

Do not use the .spl extension when naming an export.

C.

Always include existing and new content for each export.

D.

Either use new app names or always include both existing and new content.

Full Access
Question # 11

Which of the following features can the Add-on Builder configure in a new add-on?

A.

Expire data.

B.

Normalize data.

C.

Summarize data.

D.

Translate data.

Full Access
Question # 12

Where is the Add-On Builder available from?

A.

GitHub

B.

SplunkBase

C.

www.splunk.com

D.

The ES installation package

Full Access
Question # 13

Which of the following steps will make the Threat Activity dashboard the default landing page in ES?

A.

From the Edit Navigation page, drag and drop the Threat Activity view to the top of the page.

B.

From the Preferences menu for the user, select Enterprise Security as the default application.

C.

From the Edit Navigation page, click the 'Set this as the default view" checkmark for Threat Activity.

D.

Edit the Threat Activity view settings and checkmark the Default View option.

Full Access
Question # 14

Which of the following are data models used by ES? (Choose all that apply)

A.

Web

B.

Anomalies

C.

Authentication

D.

Network Traffic

Full Access
Question # 15

What is the bar across the bottom of any ES window?

A.

The Investigator Workbench.

B.

The Investigation Bar.

C.

The Analyst Bar.

D.

The Compliance Bar.

Full Access
Question # 16

Which of the following is a recommended pre-installation step?

A.

Disable the default search app.

B.

Configure search head forwarding.

C.

Download the latest version of KV Store from MongoDBxom.

D.

Install the latest Python distribution on the search head.

Full Access
Question # 17

Which data model populated the panels on the Risk Analysis dashboard?

A.

Risk

B.

Audit

C.

Domain analysis

D.

Threat intelligence

Full Access
Question # 18

To which of the following should the ES application be uploaded?

A.

The indexer.

B.

The KV Store.

C.

The search head.

D.

The dedicated forwarder.

Full Access
Question # 19

Where should an ES search head be installed?

A.

On a Splunk server with top level visibility.

B.

On any Splunk server.

C.

On a server with a new install of Splunk.

D.

On a Splunk server running Splunk DB Connect.

Full Access
Question # 20

Who can delete an investigation?

A.

ess_admin users only.

B.

The investigation owner only.

C.

The investigation owner and ess-admin.

D.

The investigation owner and collaborators.

Full Access
Question # 21

An administrator is provisioning one search head prior to installing ES. What are the reference minimum requirements for OS, CPU, and RAM for that machine?

A.

OS: 32 bit, RAM: 16 MB, CPU: 12 cores

B.

OS: 64 bit, RAM: 32 MB, CPU: 12 cores

C.

OS: 64 bit, RAM: 12 MB, CPU: 16 cores

D.

OS: 64 bit, RAM: 32 MB, CPU: 16 cores

Full Access
Question # 22

What is the default schedule for accelerating ES Datamodels?

A.

1 minute

B.

5 minutes

C.

15 minutes

D.

1 hour

Full Access
Question # 23

What should be used to map a non-standard field name to a CIM field name?

A.

Field alias.

B.

Search time extraction.

C.

Tag.

D.

Eventtype.

Full Access
Question # 24

Which of the following is a risk of using the Auto Deployment feature of Distributed Configuration Management to distribute indexes.conf?

A.

Indexes might crash.

B.

Indexes might be processing.

C.

Indexes might not be reachable.

D.

Indexes have different settings.

Full Access
Question # 25

Which indexes are searched by default for CIM data models?

A.

notable and default

B.

summary and notable

C.

_internal and summary

D.

All indexes

Full Access
Question # 26

Which component normalizes events?

A.

SA-CIM.

B.

SA-Notable.

C.

ES application.

D.

Technology add-on.

Full Access
Question # 27

What is the main purpose of the Dashboard Requirements Matrix document?

A.

Identifies on which data model(s) each dashboard depends.

B.

Provides instructions for customizing each dashboard for local data models.

C.

Identifies the searches used by the dashboards.

D.

Identifies which data model(s) depend on each dashboard.

Full Access
Question # 28

Analysts have requested the ability to capture and analyze network traffic data. The administrator has researched the documentation and, based on this research, has decided to integrate the Splunk App for Stream with ES.

Which dashboards will now be supported so analysts can view and analyze network Stream data?

A.

Endpoint dashboards.

B.

User Intelligence dashboards.

C.

Protocol Intelligence dashboards.

D.

Web Intelligence dashboards.

Full Access
Question # 29

Both “Recommended Actions” and “Adaptive Response Actions” use adaptive response. How do they differ?

A.

Recommended Actions show a textual description to an analyst, Adaptive Response Actions show them encoded.

B.

Recommended Actions show a list of Adaptive Responses to an analyst, Adaptive Response Actions run them automatically.

C.

Recommended Actions show a list of Adaptive Responses that have already been run, Adaptive Response Actions run them automatically.

D.

Recommended Actions show a list of Adaptive Responses to an analyst, Adaptive Response Actions run manually with analyst intervention.

Full Access