Exam Name: | Splunk Certified Cybersecurity Defense Analyst | ||
Exam Code: | SPLK-5001 Dumps | ||
Vendor: | Splunk | Certification: | Cybersecurity Defense Analyst |
Questions: | 99 Q&A's | Shared By: | jasmin |
What is the term for a model of normal network activity used to detect deviations?
An analyst discovers malicious software present within the network. When tracing the origin of the software, the analyst discovers it is actually a part of a third-party vendor application that is used regularly by the organization. This is an example of what kind of threat?
The following list contains examples of Tactics, Techniques, and Procedures (TTPs):
1. Exploiting a remote service
2. Lateral movement
3. Use EternalBlue to exploit a remote SMB server
In which order are they listed below?
Which dashboard in Enterprise Security would an analyst use to generate a report on users who are currently on a watchlist?