Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam SPLK-5001 All Questions

View all questions & answers for the SPLK-5001 exam

Exam SPLK-5001 topic 1 question 11 discussion

Actual exam question from Splunk's SPLK-5001
Question #: 11
Topic #: 1
[All SPLK-5001 Questions]

A Risk Rule generates events on Suspicious Cloud Share Activity and regularly contributes to confirmed incidents from Risk Notables. An analyst realizes the raw logs these events are generated from contain information which helps them determine what might be malicious.
What should they ask their engineer for to make their analysis easier?

  • A. Create a field extraction for this information.
  • B. Add this information to the risk_message.
  • C. Create another detection for this information.
  • D. Allowlist more events based on this information.
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
CeeCapi
3 weeks ago
Option B. Add this information to the risk_message is indeed a viable and effective choice, especially in the context of Risk-Based Alerting (RBA) in Splunk. By adding key information to the risk_message, you enhance the context around each risk event, allowing the analyst to quickly view relevant details without needing to drill down into raw logs. This approach can streamline investigations by summarizing essential details directly within the notable events, making the process faster and more efficient for the analyst. In this case, both A and B can be good options, but B might offer more immediate context within the Incident Review, especially if the goal is to have critical information surfaced directly in risk events.
upvoted 1 times
...
Nss_dfir
1 month, 2 weeks ago
Selected Answer: A
Creating a field extraction allows the analyst to easily access and utilize specific data points within the raw logs, making it more efficient to analyze and correlate with the suspicious activity. This will enhance their ability to determine the nature of the activity and its potential maliciousness.
upvoted 1 times
...
ProfessorJayy
2 months, 3 weeks ago
Selected Answer: B
see previous comment
upvoted 1 times
...
ProfessorJayy
2 months, 3 weeks ago
B. Add this information to the risk_message. Explanation: The risk_message field in Splunk's Enterprise Security contains details about why a particular risk event was generated. By asking the engineer to add the relevant information from the raw logs to the risk_message, the analyst can have easy access to important context directly within the risk events, making their analysis more efficient without needing to refer back to the raw logs constantly.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...