Weekend Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: netbudy65

SPLK-5001 Splunk Certified Cybersecurity Defense Analyst Questions and Answers

Questions 4

An analyst is examining the logs for a web application’s login form. They see thousands of failed logon attempts using various usernames and passwords. Internet research indicates that these credentials may have been compiled by combining account information from several recent data breaches.

Which type of attack would this be an example of?

Options:

A.

Credential sniffing

B.

Password cracking

C.

Password spraying

D.

Credential stuffing

Buy Now
Questions 5

Which of the following roles is commonly responsible for selecting and designing the infrastructure and tools that a security analyst utilizes to effectively complete their job duties?

Options:

A.

Threat Intelligence Analyst

B.

SOC Manager

C.

Security Engineer

D.

Security Architect

Buy Now
Questions 6

After discovering some events that were missed in an initial investigation, an analyst determines this is because some events have an empty src field. Instead, the required data is often captured in another field called machine_name.

What SPL could they use to find all relevant events across either field until the field extraction is fixed?

Options:

A.

| eval src = coalesce(src,machine_name)

B.

| eval src = src + machine_name

C.

| eval src = src . machine_name

D.

| eval src = tostring(machine_name)

Buy Now
Questions 7

Which dashboard in Enterprise Security would an analyst use to generate a report on users who are currently on a watchlist?

Options:

A.

Access Tracker

B.

Identity Tracker

C.

Access Center

D.

Identity Center

Buy Now
Questions 8

A threat hunter generates a report containing the list of users who have logged in to a particular database during the last 6 months, along with the number of times they have each authenticated. They sort this list and remove any user names who have logged in more than 6 times. The remaining names represent the users who rarely log in, as their activity is more suspicious. The hunter examines each of these rare logins in detail.

This is an example of what type of threat-hunting technique?

Options:

A.

Least Frequency of Occurrence Analysis

B.

Co-Occurrence Analysis

C.

Time Series Analysis

D.

Outlier Frequency Analysis

Buy Now
Questions 9

Which field is automatically added to search results when assets are properly defined and enabled in Splunk Enterprise Security?

Options:

A.

asset_category

B.

src_ip

C.

src_category

D.

user

Buy Now
Questions 10

The eval SPL expression supports many types of functions. Which of these function categories is not valid with eval?

Options:

A.

JSON functions

B.

Text functions

C.

Comparison and Conditional functions

D.

Threat functions

Buy Now
Questions 11

What is the main difference between a DDoS and a DoS attack?

Options:

A.

A DDoS attack is a type of physical attack, while a DoS attack is a type of cyberattack.

B.

A DDoS attack uses a single source to target a single system, while a DoS attack uses multiple sources to target multiple systems.

C.

A DDoS attack uses multiple sources to target a single system, while a DoS attack uses a single source to target a single or multiple systems.

D.

A DDoS attack uses a single source to target multiple systems, while a DoS attack uses multiple sources to target a single system.

Buy Now
Questions 12

An analyst is investigating the number of failed login attempts by IP address. Which SPL command can be used to create a temporary table containing the number of failed login attempts by IP address over a specific time period?

Options:

A.

index=security_logs eventtype=failed_login | eval count as failed_attempts by src_ip | sort -failed_attempts

B.

index=security_logs eventtype=failed_login | transaction count as failed_attempts by src_ip | sort -failed_attempts

C.

index=security_logs eventtype=failed_login | stats count as failed_attempts by src_ip | sort -failed_attempts

D.

index=security_logs eventtype=failed_login | sum count as failed_attempts by src_ip | sort -failed_attempts

Buy Now
Questions 13

A successful Continuous Monitoring initiative involves the entire organization. When an analyst discovers the need for more context or additional information, perhaps from additional data sources or altered correlation rules, to what role would this request generally escalate?

Options:

A.

SOC Manager

B.

Security Analyst

C.

Security Engineer

D.

Security Architect

Buy Now
Questions 14

An analyst is looking at Web Server logs, and sees the following entry as the last web request that a server processed before unexpectedly shutting down:

147.186.119.107 - - [28/Jul/2006:10:27:10 -0300] "POST /cgi-bin/shutdown/ HTTP/1.0" 200 3333

What kind of attack is most likely occurring?

Options:

A.

Distributed denial of service attack.

B.

Denial of service attack.

C.

Database injection attack.

D.

Cross-Site scripting attack.

Buy Now
Questions 15

There are different metrics that can be used to provide insights into SOC operations. If Mean Time to Respond is defined as the total time it takes for an Analyst to disposition an event, what is the typical starting point for calculating this metric for a particular event?

Options:

A.

When the malicious event occurs.

B.

When the SOC Manager is informed of the issue.

C.

When a Notable Event is triggered.

D.

When the end users are notified about the issue.

Buy Now
Questions 16

A threat hunter executed a hunt based on the following hypothesis:

As an actor, I want to plant rundll32 for proxy execution of malicious code and leverage Cobalt Strike for Command and Control.

Relevant logs and artifacts such as Sysmon, netflow, IDS alerts, and EDR logs were searched, and the hunter is confident in the conclusion that Cobalt Strike is not present in the company’s environment.

Which of the following best describes the outcome of this threat hunt?

Options:

A.

The threat hunt was successful because the hypothesis was not proven.

B.

The threat hunt failed because the hypothesis was not proven.

C.

The threat hunt failed because no malicious activity was identified.

D.

The threat hunt was successful in providing strong evidence that the tactic and tool is not present in the environment.

Buy Now
Questions 17

Which Splunk Enterprise Security framework provides a way to identify incidents from events and then manage the ownership, triage process, and state of those incidents?

Options:

A.

Asset and Identity

B.

Investigation Management

C.

Notable Event

D.

Adaptive Response

Buy Now
Questions 18

As an analyst, tracking unique users is a common occurrence. The Security Operations Center (SOC) manager requested a search with results in a table format to track the cumulative downloads by distinct IP address. Which example calculates the running total of distinct users over time?

Options:

A.

eventtype="download" | bin_time span=1d | stats values(clientip) as ipa dc(clientip) by _time | streamstats dc(ipa) as "Cumulative total"

B.

eventtype="download" | bin_time span=1d | stats values(clientip) as ipa dc(clientip) by _time

C.

eventtype="download" | bin_time span=1d | table clientip _time user

D.

eventtype="download" | bin_time span=1d | stats values(clientip) as ipa dc(clientip) by user | table _time ipa

Buy Now
Questions 19

Which of the following is not considered an Indicator of Compromise (IOC)?

Options:

A.

A specific domain that is utilized for phishing.

B.

A specific IP address used in a cyberattack.

C.

A specific file hash of a malicious executable.

D.

A specific password for a compromised account.

Buy Now
Questions 20

Which of the following is a best practice for searching in Splunk?

Options:

A.

Streaming commands run before aggregating commands in the Search pipeline.

B.

Raw word searches should contain multiple wildcards to ensure all edge cases are covered.

C.

Limit fields returned from the search utilizing the cable command.

D.

Searching over All Time ensures that all relevant data is returned.

Buy Now
Questions 21

How are Notable Events configured in Splunk Enterprise Security?

Options:

A.

During an investigation.

B.

As part of an audit.

C.

Via an Adaptive Response Action in a regular search.

D.

Via an Adaptive Response Action in a correlation search.

Buy Now
Questions 22

Upon investigating a report of a web server becoming unavailable, the security analyst finds that the web server’s access log has the same log entry millions of times:

147.186.119.200 - - [28/Jul/2023:12:04:13 -0300] "GET /login/ HTTP/1.0" 200 3733

What kind of attack is occurring?

Options:

A.

Denial of Service Attack

B.

Distributed Denial of Service Attack

C.

Cross-Site Scripting Attack

D.

Database Injection Attack

Buy Now
Questions 23

Splunk SOAR uses what feature to automate security workflows so that analysts can spend more time performing analysis and investigation?

Options:

A.

Workbooks

B.

Analytic Stories

C.

Adaptive Actions

D.

Playbooks

Buy Now
Questions 24

An adversary uses "LoudWiner" to hijack resources for crypto mining. What does this represent in a TTP framework?

Options:

A.

Procedure

B.

Tactic

C.

Problem

D.

Technique

Buy Now
Questions 25

Enterprise Security has been configured to generate a Notable Event when a user has quickly authenticated from multiple locations between which travel would be impossible. This would be considered what kind of an anomaly?

Options:

A.

Access Anomaly

B.

Identity Anomaly

C.

Endpoint Anomaly

D.

Threat Anomaly

Buy Now
Questions 26

While testing the dynamic removal of credit card numbers, an analyst lands on using therexcommand. What mode needs to be set to in order to replace the defined values with X?

| makeresults

| eval ccnumber="511388720478619733"

| rex field=ccnumber mode=???"s/(\d{4}-){3)/XXXX-XXXX-XXXX-/g"

Please assume that the aboverexcommand is correctly written.

Options:

A.

sed

B.

replace

C.

mask

D.

substitute

Buy Now
Questions 27

Why is tstats more efficient than stats for large datasets?

Options:

A.

tstats is faster since it operates at the beginning of the search pipeline.

B.

tstats is faster since it only looks at indexed metadata, not raw data.

C.

tstats is faster due to its SQL-like syntax.

D.

tstats is faster since it searches raw logs for extracted fields.

Buy Now
Questions 28

Which Enterprise Security framework provides a mechanism for running preconfigured actions within the Splunk platform or integrating with external applications?

Options:

A.

Asset and Identity

B.

Notable Event

C.

Threat Intelligence

D.

Adaptive Response

Buy Now
Questions 29

An analyst learns that several types of data are being ingested into Splunk and Enterprise Security, and wants to use the metadata SPL command to list them in a search. Which of the following arguments should she use?

Options:

A.

metadata type=cdn

B.

metadata type=sourcetypes

C.

metadata type=assets

D.

metadata type=hosts

Buy Now
Exam Code: SPLK-5001
Exam Name: Splunk Certified Cybersecurity Defense Analyst
Last Update: Sep 11, 2025
Questions: 99

PDF + Testing Engine

$134.99

Testing Engine

$99.99

PDF (Q&A)

$84.99