To observe what network services are in use in a network’s activity overall, which of the following dashboards in Enterprise Security will contain the most relevant data?
What does the Security Posture dashboard display?
What role should be assigned to a security team member who will be taking ownership of notable events in the incident review dashboard?
What tools does the Risk Analysis dashboard provide?
What does the risk framework add to an object (user, server or other type) to indicate increased risk?
How is it possible to navigate to the ES graphical Navigation Bar editor?
Which of the following is a Web Intelligence dashboard?
When creating custom correlation searches, what format is used to embed field values in the title, description, and drill-down fields of a notable event?
Analysts have requested the ability to capture and analyze network traffic data. The administrator has researched the documentation and, based on this research, has decided to integrate the Splunk App for Stream with ES.
Which dashboards will now be supported so analysts can view and analyze network Stream data?
At what point in the ES installation process should Splunk_TA_ForIndexes.spl be deployed to the indexers?
A newly built custom dashboard needs to be available to a team of security analysts In ES. How is It possible to Integrate the new dashboard?
What is the default schedule for accelerating ES Datamodels?
Which of the following is a key feature of a glass table?
Which of the following would allow an add-on to be automatically imported into Splunk Enterprise Security?
What feature of Enterprise Security downloads threat intelligence data from a web server?
An administrator is provisioning one search head prior to installing ES. What are the reference minimum requirements for OS, CPU, and RAM for that machine?
Which of the following are examples of sources for events in the endpoint security domain dashboards?
Accelerated data requires approximately how many times the daily data volume of additional storage space per year?
ES needs to be installed on a search head with which of the following options?
Where is detailed information about identities stored?
A set of correlation searches are enabled at a new ES installation, and results are being monitored. One of the correlation searches is generating many notable events which, when evaluated, are determined to be false positives.
What is a solution for this issue?
What do threat gen searches produce?
ES apps and add-ons from $SPLUNK_HOME/etc/apps should be copied from the staging instance to what location on the cluster deployer instance?
An administrator wants to ensure that none of the ES indexed data could be compromised through tampering. What feature would satisfy this requirement?
The Remote Access panel within the User Activity dashboard is not populating with the most recent hour of data. What data model should be checked for potential errors such as skipped searches?
Which of the following threat intelligence types can ES download? (Choose all that apply)
Which of the following features can the Add-on Builder configure in a new add-on?
Who can delete an investigation?
“10.22.63.159”, “websvr4”, and “00:26:08:18: CF:1D” would be matched against what in ES?