Q: 11
During their shift, an analyst receives an alert about an executable being run from
C:\Windows\Temp. Why should this be investigated further?
Options
Discussion
Hard to say, B
Its D. Official study guide and Splunk lab practice both call out temp folders as risky for malware staging.
Be respectful. No spam.
Q: 12
What is the following step-by-step description an example of?
1. The attacker devises a non-default beacon profile with Cobalt Strike and embeds this within a
document.
2. The attacker creates a unique email with the malicious document based on extensive research
about their target.
3. When the victim opens this document, a C2 channel is established to the attacker’s temporary
infrastructure on a compromised website.
Options
Discussion
Option D had something like this in a mock and picked Technique.
C tbh. This is showing each action the attacker takes, in order, with details about tools and steps. That matches what I'd call a "procedure" in frameworks like MITRE ATT&CK. Techniques are more generic, this is much more specific. But if anyone's got a reason to pick D, open to hearing it.
Be respectful. No spam.
Q: 13
Which of the following roles is commonly responsible for selecting and designing the infrastructure
and tools that a security analyst utilizes to effectively complete their job duties?
Options
Discussion
D makes sense here since Security Architect is usually the one deciding on overall security tools and infrastructure layout. Security Engineer (C) is more about building and maintaining, but Architect determines what's needed in the first place. Pretty sure that's what the question is after. Let me know if anyone disagrees.
D imo, saw similar on a practice test where Security Architect was picked for this.
Be respectful. No spam.
Q: 14
A Risk Notable Event has been triggered in Splunk Enterprise Security, an analyst investigates the
alert, and determines it is a false positive. What metric would be used to define the time between
alert creation and close of the event?
Options
Discussion
A , MTTR measures from alert creation to close. MTTA is a trap here, since that's about acknowledgment not full closure.
I’d say A since MTTR covers the full time from alert to closure, not just initial response. The others don’t measure that end-to-end window as directly. Pretty sure about this but curious if anyone disagrees.
A makes sense here since MTTR is about closing out incidents, whether they're real or false positives. B, C, and D wouldn't fit because they track totally different parts of the timeline. I think MTTR fits best for alert creation to closure, but if the process involved initial triage only (not full resolve), sometimes folks mix up with MTTA. Anyone else seen exam items where that's caused confusion?
A , saw a similar one in the official practice. Official docs and blueprints help nail these metric questions.
Be respectful. No spam.
Q: 15
A Cyber Threat Intelligence (CTI) team produces a report detailing a specific threat actor’s typical
behaviors and intent. This would be an example of what type of intelligence?
Options
Discussion
A not D. Strategic is more broad or big-picture, but here it's about the specifics of threat actors. Trap option for sure.
B not D. High-level intent and big-picture stuff is more "strategic," but this question is about behaviors and intent tied to a specific threat actor. That's operational intelligence-focused on TTPs and actual adversary methods. If it were broad trends or long-term risks, then D would fit, but here it's clearly A in the Splunk context. I might be splitting hairs but that's how most CTI frameworks split it up. Disagree?
D , I think that's more about high-level intent and big-picture threats. Operational feels like a trap here.
A
A
Be respectful. No spam.
Question 11 of 20 · Page 2 / 2