Splunk Enterprise Security Certified Admin Exam Questions and Answers
Which of the following would allow an add-on to be automatically imported into Splunk Enterprise Security?
Glass tables can display static images and text, the results of ad-hoc searches, and which of the following objects?
The Add-On Builder creates Splunk Apps that start with what?
ES apps and add-ons from $SPLUNK_HOME/etc/apps should be copied from the staging instance to what location on the cluster deployer instance?
A site has a single existing search head which hosts a mix of both CIM and non-CIM compliant applications. All of the applications are mission-critical. The customer wants to carefully control cost, but wants good ES performance. What is the best practice for installing ES?
Which two fields combine to create the Urgency of a notable event?
To observe what network services are in use in a network’s activity overall, which of the following dashboards in Enterprise Security will contain the most relevant data?
To which of the following should the ES application be uploaded?
What feature of Enterprise Security downloads threat intelligence data from a web server?
Which column in the Asset or Identity list is combined with event security to make a notable event’s urgency?
The Brute Force Access Behavior Detected correlation search is enabled, and is generating many false positives. Assuming the input data has already been validated. How can the correlation search be made less sensitive?
When ES content is exported, an app with a .spl extension is automatically created. What is the best practice when exporting and importing updates to ES content?
Analysts have requested the ability to capture and analyze network traffic data. The administrator has researched the documentation and, based on this research, has decided to integrate the Splunk App for Stream with ES.
Which dashboards will now be supported so analysts can view and analyze network Stream data?
Which of the following threat intelligence types can ES download? (Choose all that apply)
Which correlation search feature is used to throttle the creation of notable events?
Which tool Is used to update indexers In E5?
In order to include an event type in a data model node, what is the next step after extracting the correct fields?
How should an administrator add a new look up through the ES app?
What is the main purpose of the Dashboard Requirements Matrix document?
Which setting is used in indexes.conf to specify alternate locations for accelerated storage?
What is the first step when preparing to install ES?
After installing Enterprise Security, the distributed configuration management tool can be used to create which app to configure indexers?
How does ES know local customer domain names so it can detect internal vs. external emails?
Which lookup table does the Default Account Activity Detected correlation search use to flag known default accounts?
Which of the following is an adaptive action that is configured by default for ES?
When installing Enterprise Security, what should be done after installing the add-ons necessary for normalizing data?
A set of correlation searches are enabled at a new ES installation, and results are being monitored. One of the correlation searches is generating many notable events which, when evaluated, are determined to be false positives.
What is a solution for this issue?
What are adaptive responses triggered by?
Who can delete an investigation?