<< Prev Question Next Question >>

Question 21/91

Which of the following is a key feature of a glass table?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (91q)
Question 1: When installing Enterprise Security, what should be done aft...
Question 2: An administrator wants to ensure that none of the ES indexed...
Question 3: Which data model populated the panels on the Risk Analysis d...
Question 4: Which indexes are searched by default for CIM data models?...
Question 5: Which of the following are examples of sources for events in...
Question 6: When investigating, what is the best way to store a newly-fo...
Question 7: After managing source types and extracting fields, which key...
Question 8: Which of the following is a recommended pre-installation ste...
Question 9: ES apps and add-ons from $SPLUNK_HOME/etc/appsshould be copi...
Question 10: What kind of value is in the red box in this picture? (Exhib...
Question 11: Which columns in the Assets lookup are used to identify an a...
Question 12: What are the steps to add a new column to the Notable Event ...
Question 13: Which of the following ES features would a security analyst ...
Question 14: Which column in the Asset or Identity list is combined with ...
Question 15: A site has a single existing search head which hosts a mix o...
Question 16: Accelerated data requires approximately how many times the d...
Question 17: When creating custom correlation searches, what format is us...
Question 18: "10.22.63.159", "websvr4", and "00:26:08:18: CF:1D" would be...
Question 19: What does the risk framework add to an object (user, server ...
Question 20: What kind of value is in the red box in this picture? (Exhib...
Question 21: Which of the following is a key feature of a glass table?...
Question 22: Which column in the Asset or Identity list is combined with ...
Question 23: Enterprise Security's dashboards primarily pull data from wh...
Question 24: What is the maximum recommended volume of indexing per day, ...
Question 25: What can be exported from ES using the Content Management pa...
Question 26: What does the Security Posture dashboard display?...
Question 27: What feature of Enterprise Security downloads threat intelli...
Question 28: Which of the following are the default ports that must be co...
Question 29: Which two fields combine to create the Urgency of a notable ...
Question 30: What role should be assigned to a security team member who w...
Question 31: Which of the following would allow an add-on to be automatic...
Question 32: At what point in the ES installation process should Splunk_T...
Question 33: Both "Recommended Actions" and "Adaptive Response Actions" u...
Question 34: Which settings indicates that the correlation search will be...
Question 35: Which column in the Asset or Identity list is combined with ...
Question 36: Which settings indicated that the correlation search will be...
Question 37: How is notable event urgency calculated?...
Question 38: How is it possible to navigate to the list of currently-enab...
Question 39: What should be used to map a non-standard field name to a CI...
Question 40: Where is the Add-On Builder available from?...
Question 41: Which of the following is part of tuning correlation searche...
Question 42: Which of the following threat intelligence types can ES down...
Question 43: What do threat gen searches produce?...
Question 44: At what point in the ES installation process should Splunk_T...
Question 45: Which of the following threat intelligence types can ES down...
Question 46: How is it possible to navigate to the list of currently-enab...
Question 47: Which settings indicated that the correlation search will be...
Question 48: Which of the following actions would not reduce the number o...
Question 49: The Brute Force Access Behavior Detected correlation search ...
Question 50: What does the risk framework add to an object (user, server ...
Question 51: What role should be assigned to a security team member who w...
Question 52: After data is ingested, which data management step is essent...
Question 53: When ES content is exported, an app with a .spl extension is...
Question 54: Which indexes are searched by default for CIM data models?...
Question 55: What are the steps to add a new column to the Notable Event ...
Question 56: Which of the following would allow an add-on to be automatic...
Question 57: Which of the following are examples of sources for events in...
Question 58: Where is the Add-On Builder available from?...
Question 59: Analysts have requested the ability to capture and analyze n...
Question 60: What is the first step when preparing to install ES?...
Question 61: After installing Enterprise Security, the distributed config...
Question 62: Which of the following are data models used by ES? (Choose a...
Question 63: Which of the following features can the Add-on Builder confi...
Question 64: What does the risk framework add to an object (user, server ...
Question 65: ES apps and add-ons from $SPLUNK_HOME/etc/apps should be cop...
Question 66: Which of the following is part of tuning correlation searche...
Question 67: An administrator is asked to configure an "Nslookup" adaptiv...
Question 68: What are the steps to add a new column to the Notable Event ...
Question 69: Which of the following is a way to test for a property norma...
Question 70: After installing Enterprise Security, the distributed config...
Question 71: How should an administrator add a new lookup through the ES ...
Question 72: ES apps and add-ons from $SPLUNK_HOME/etc/apps should be cop...
Question 73: What are adaptive responses triggered by?...
Question 74: What tools does the Risk Analysis dashboard provide?...
Question 75: Where is it possible to export content, such as correlation ...
Question 76: The Remote Access panel within the User Activity dashboard i...
Question 77: Adaptive response action history is stored in which index?...
Question 78: What is the main purpose of the Dashboard Requirements Matri...
Question 79: What is the first step when preparing to install ES?...
Question 80: Which setting is used in indexes.conf to specify alternate l...
Question 81: If a username does not match the 'identity' column in the id...
Question 82: Where should an ES search head be installed?...
Question 83: When ES content is exported, an app with a .splextension is ...
Question 84: Who can delete an investigation?...
Question 85: Which data model populates the panels on the Risk Analysis d...
Question 86: Which of the following lookup types in Enterprise Security c...
Question 87: A newly built custom dashboard needs to be available to a te...
Question 88: Which of the following are data models used by ES? (Choose a...
Question 89: When investigating, what is the best way to store a newly-fo...
Question 90: What do threat gen searches produce?...
Question 91: Which of the following ES features would a security analyst ...