How does ES know local customer domain names so it can detect internal vs. external emails?
A. Web and email domain names are set in General -> General Configuration.
B. ES uses the User Activity index and applies machine learning to determine internal and external domains.
C. The Corporate Web and Email Domain Lookups are edited during initial configuration.
D. ES extracts local email and web domains automatically from SMTP and HTTP logs.
Explanation: Splunk Enterprise Security knows the local customer domain names so it can detect internal vs. external emails by using the Corporate Web and Email Domain Lookups. These are lookup files that contain the list of domains that are considered internal or corporate for the organization. The Corporate Web and Email Domain Lookups are edited during the initial configuration of Splunk Enterprise Security, and they are used to enrich events with the tag=internal_web or tag=internal_email fields. These fields indicate whether the web or email activity is internal or external, and they are used by dashboards and correlation searches in Splunk Enterprise Security to monitor and analyze the web and email traffic.
How is it possible to navigate to the ES graphical Navigation Bar editor?
A.
Configure -> Navigation Menu
B.
Configure -> General -> Navigation
C.
Settings -> User Interface -> Navigation -> Click on “Enterprise Security”
D.
Settings -> User Interface -> Navigation Menus -> Click on “default” next to
SplunkEnterpriseSecuritySuite
Configure -> General -> Navigation
Reference: https://docs.splunk.com/Documentation/ES/6.1.0/Admin/
Customizemenubar#Restore_the_default_navigation
What is the main purpose of the Dashboard Requirements Matrix document?
A.
Identifies on which data model(s) each dashboard depends.
B.
Provides instructions for customizing each dashboard for local data models.
C.
Identifies the searches used by the dashboards.
D.
Identifies which data model(s) depend on each dashboard.
Identifies which data model(s) depend on each dashboard.
What are adaptive responses triggered by?
A.
By correlation searches and users on the incident review dashboard.
B.
By correlation searches and custom tech add-ons.
C.
By correlation searches and users on the threat analysis dashboard.
D.
By custom tech add-ons and users on the risk analysis dashboard
By custom tech add-ons and users on the risk analysis dashboard
What is an example of an ES asset?
A.
MAC address
B.
User name
C.
Server
D.
People
MAC address
Analysts have requested the ability to capture and analyze network traffic data. The
administrator has researched the documentation and, based on this research, has decided
to integrate the Splunk App for Stream with ES.
Which dashboards will now be supported so analysts can view and analyze network
Stream data?
A.
Endpoint dashboards.
B.
User Intelligence dashboards.
C.
Protocol Intelligence dashboards.
D.
Web Intelligence dashboards.
Protocol Intelligence dashboards.
Page 1 out of 17 Pages |