Splunk Enterprise Security Certified Admin Sample Questions
Question 1 – What is the start of the Splunk Apps created with Add-On Builder?
- A. DA-
- B. SA-
- C. TA-
- D. App-
Correct Answer: C
Reference: https://dev.splunk.com/enterprise/docs/developapps/enterprisesecurity/abouttheessolution/
Question 2 – What types of events can be found on the dashboards for the endpoint security domain?
- A. REST API invocations.
- B. Investigation final results status.
- C. Workstations, notebooks, and point-of-sale systems.
- D. Lifecycle auditing of incidents, from assignment to resolution.
Correct Answer: D
Reference: https://docs.splunk.com/Documentation/ES/6.1.0/User/EndpointProtectionDomaindashboards
Question 3 – When creating custom correlation searches, how do field values appear in a notable event’s title, description, and drill-down fields?
- A. $fieldname$
- B. ‘fieldname’
- C. %fieldname%
- D. _fieldname_
Correct Answer: C
Reference: https://docs.splunk.com/Documentation/ITSI/4.4.2/Configure/Createcorrelationsearch
Question 4 – How is threat intelligence data downloaded from a web server in Enterprise Security?
- A. Threat Service Manager
- B. Threat Download Manager
- C. Threat Intelligence Parser
- D. Threat Intelligence Enforcement
Correct Answer: B
Question 5 – Data for the most recent hour in the Remote Access panel is not populating in the User Activity dashboard.
What data model needs to be checked for errors such as skipped searches?
- A. Web
- B. Risk
- C. Performance
- D. Authentication
Correct Answer: A
Reference: https://answers.splunk.com/answers/565482/how-to-resolve-skipped-scheduled-searches.html
Question 6 – Once the correct fields are extracted, what is the next step to including an eventtype in a model node?
- A. Saving the settings.
- B. Applying the correct tags.
- C. Running the correct search.
- D. Visiting the CIM dashboard.
Correct Answer: C
Reference: https://docs.splunk.com/Documentation/CIM/4.15.0/User/UsetheCIMtonormalizeOSSECdata
Question 7 – In the incident review dashboard, what role should be assigned to the member of the security team who will take charge of notable events?
- A. ess_user
- B. ess_admin
- C. ess_analyst
- D. ess_reviewer
Correct Answer: B
Reference: https://docs.splunk.com/Documentation/ES/6.1.0/User/Triagenotableevents
Question 8 – By combining event security with asset or identity lists, what column determines a notable event’s urgency?
- A. VIP
- B. Priority
- C. Importance
- D. Criticality
Correct Answer: B
Reference: https://docs.splunk.com/Documentation/ES/6.1.0/User/Howurgencyisassigned
Question 9 – How is the risk framework applied to objects (users, servers, or other types) to indicate a higher level of risk?
- A. An urgency.
- B. A risk profile.
- C. An aggregation.
- D. A numeric score.
Correct Answer: C
Reference: https://docs.splunk.com/Documentation/ES/6.1.0/User/RiskScoring
Question 10 – How are CIM data models indexed by default?
- A. notable and default
- B. summary and notable
- C. _internal and summary
- D. All indexes
Correct Answer: D
Reference: https://answers.splunk.com/answers/600354/indexes-searched-by-cim-data-models.html
Question 11 – What is the setting in indexes. conf that specifies alternate locations for accelerated storage?
- A. thawedPath
- B. tstatsHomePath
- C. summaryHomePath
- D. warmToColdScript
Correct Answer: B
Reference: https://docs.splunk.com/Documentation/Splunk/8.0.2/Knowledge/Acceleratedatamodels
Question 12 – What type of test can be used to assess the normalization of a property data model?
- A. Using Audit -> Normalization Audit and checking the Errors panel.
- B. Running a data model search, comparing results to the CIM documentation for the datamodel.
- C. Running a loadjob search, looking at tag values and comparing them to known tags based on the encoding.
- D. Running a datamodel search and comparing the results to the list of data models in the ES normalization guide.
Correct Answer: B
Reference: https://docs.splunk.com/Documentation/CIM/4.15.0/User/UsetheCIMtonormalizedataatsearchtime
Question 13 – How can I restrict the search to only summarized data using the tstats command?
- A. summaries=t
- B. summaries=all
- C. summariesonly=t
- D. summariesonly=all
Correct Answer: C
Reference: https://docs.splunk.com/Documentation/Splunk/8.0.2/Knowledge/Acceleratedatamodels
Question 14 – How should a newly-found IOC be stored after the investigation?
- A. Pasting it into Notepad.
- B. Clicking the Add IOC button.
- C. Clicking the Add Artifact button.
- D. Adding it in a text note to the investigation.
Correct Answer: B
Question 15 – Where can I find the list of the correlation searches that are currently enabled with ES?
- A. Configure -> Correlation Searches -> Select Status ‘Enabled’
- B. Settings -> Searches, Reports, and Alerts -> Filter by Name of ‘Correlation’
- C. Configure -> Content Management -> Select Type ‘Correlation’ and Status ‘Enabled’
- D. Settings -> Searches, Reports, and Alerts -> Select App of ‘SplunkEnterpriseSecuritySuite’ and filter by ‘Rule’
Correct Answer: A
Reference: https://docs.splunk.com/Documentation/ES/6.1.0/Admin/Listcorrelationsearches
Question 16 – Which of the following is a potential risk associated with using Distributed Configuration Management’s Auto Deployment feature. conf?
A. Indexers might crash.
B. Indexers might be processing.
C. Indexers might not be reachable.
D. Indexers have different settings.
Correct Answer: A
Reference: https://docs.splunk.com/Documentation/Splunk/8.0.2/Admin/Indexesconf
Question 17 – Which of the below-mentioned are data models is used by ES? (Choose all that apply.)
- A. Web
- B. Anomalies
- C. Authentication
- D. Network Traffic
Correct Answer: B
Reference: https://dev.splunk.com/enterprise/docs/developapps/enterprisesecurity/datamodelsusedbyes/
Question 18 – What is the most suitable point in the ES installation process when the Splunk_TA_ForIndexers.spl must be deployed to the indexers?
- A. While adding apps to the deployment server.
- B. Splunk_TA_ForIndexers.spl is installed first.
- C. After you’ve installed ES on the search head(s) and then run the distributed configuration management tool.
- D. Splunk_TA_ForIndexers.spl is only installed on the indexer cluster sites by using the cluster master and also the Splunk applies cluster-bundle command.
Correct Answer: B
Reference: https://docs.splunk.com/Documentation/ES/6.1.0/Install/InstallTechnologyAdd-ons
Question 19 – Which of the given correlation search feature can be used for throttling the creation of notable events?
- A. Schedule priority.
- B. Window interval.
- C. Window duration.
- D. Schedule window.
Correct Answer: C
Reference: https://docs.splunk.com/Documentation/ES/6.1.0/Admin/Configurecorrelationsearches
Question 20 – Both Recommended Actions and Adaptive Response Actions make use of adaptive response, but how do they differ?
- A. Recommended Actions shows a textual description to an analyst, while Adaptive Response Actions encodes them.
- B. Recommended Actions shows a list of Adaptive Responses to an analyst, while Adaptive Response Actions runs them automatically.
- C. Recommended Actions shows a list of Adaptive Responses that have already been run, while Adaptive Response Actions runs them automatically.
- D. Recommended Actions shows a list of Adaptive Responses to an analyst, while Adaptive Response Actions runs manually with analyst intervention.
Correct Answer: D
Reference: https://docs.splunk.com/Documentation/ES/latest/Admin/Configureadaptiveresponse