MultipleChoice
When threat hunting for outliers in Splunk, Which option best SPL pipelines would filter for users with over a thousand occurrences?
OptionsMultipleChoice
While testing the dynamic removal of credit card numbers, an analyst lands on using therexcommand. What mode needs to be set to in order to replace the defined values with X?
| makeresults
| eval ccnumber="511388720478619733"
| rex field=ccnumber mode=???"s/(\d{4}-){3)/XXXX-XXXX-XXXX-/g"
Please assume that the aboverexcommand is correctly written.
OptionsMultipleChoice
An analyst discovers malicious software present within the network. When tracing the origin of the software, the analyst discovers it is actually a part of a third-party vendor application that is used regularly by the organization. This is an example of what kind of threat?
OptionsMultipleChoice
What Splunk feature would enable enriching public IP addresses with ASN and owner information?
Options