Option D is right since "Event description" isn't a default Splunk metadata field. But if the question had asked for "user-generated" metadata instead of just "default," source or host could change depending on custom settings, right?
C or D for me. FISMA (D) includes some maturity assessments in NIST reviews, so I picked D at first. But most practice guides point to CMMC (maybe that's meant by CHMC) as the one actually built for maturity modeling. Official study guide and Splunk blueprint both cover this area, but the question wording makes it tricky. Anyone else pick D?
Had something like this in a mock. Since tuning or bringing in new data sources is more of an implementation task, it usually goes to the Security Engineer (C). Analysts don’t typically handle that level of SIEM customization, but open to other thoughts if anyone’s seen different setups.
I don't think it's B, I'd pick A instead. tstats is faster since it runs earlier in the pipeline so it doesn't have to wait for field extraction. Trap is thinking it's about metadata only.
I picked B since there's millions of requests, so I thought it's DDoS related. Didn't notice the logs only mention one source IP though. Makes sense if it's still just DoS, but just going by the huge request volume, DDoS came to mind first. Not 100% sure here.