Where is the Add-On Builder available from?
Answer : B
Reference:
https://docs.splunk.com/Documentation/AddonBuilder/3.0.1/UserGuide/Installation
Which of the following would allow an add-on to be automatically imported into Splunk Enterprise Security?
Answer : D
Reference:
https://dev.splunk.com/enterprise/docs/developapps/enterprisesecurity/planintegrationes/
ES apps and add-ons from $SPLUNK_HOME/etc/apps should be copied from the staging instance to what location on the cluster deployer instance?
Answer : C
The upgraded contents of the staging instance will be migrated back to the deployer and deployed to the search head cluster members. On the staging instance, copy $SPLUNK_HOME/etc/apps to $SPLUNK_HOME/etc/shcluster/apps on the deployer. 1. On the deployer, remove any deprecated apps or add-ons in
$SPLUNK_HOME/etc/shcluster/apps that were removed during the upgrade on staging. Confirm by reviewing the ES upgrade report generated on staging, or by examining the apps moved into $SPLUNK_HOME/etc/disabled-apps on staging
How is notable event urgency calculated?
Answer : D
Reference:
https://docs.splunk.com/Documentation/ES/6.1.0/User/Howurgencyisassigned
What kind of value is in the red box in this picture?
Answer : C
Reference:
https://docs.splunk.com/Documentation/Splunk/8.0.2/Data/FormateventsforHTTPEventCollector
Where is it possible to export content, such as correlation searches, from ES?
Answer : B
Reference:
https://docs.splunk.com/Documentation/ES/6.1.0/Admin/Export
Which of the following threat intelligence types can ES download? (Choose all that apply.)
Answer : B
Reference:
https://docs.splunk.com/Documentation/ES/6.1.0/Admin/Downloadthreatfeed
A site has a single existing search head which hosts a mix of both CIM and non-CIM compliant applications. All of the applications are mission-critical. The customer wants to carefully control cost, but wants good ES performance.
What is the best practice for installing ES?
Answer : B
Reference:
https://www.splunk.com/pdfs/technical-briefs/splunk-validated-architectures.pdf
Enterprise Security's dashboards primarily pull data from what type of knowledge object?
Answer : C
Reference:
https://docs.splunk.com/Splexicon:Knowledgeobject
To which of the following should the ES application be uploaded?
Answer : C
Reference:
https://docs.splunk.com/Documentation/ES/6.1.0/Install/InstallEnterpriseSecuritySHC
If a username does not match the `˜identity' column in the identities list, which column is checked next?
Answer : C
Which of the following features can the Add-on Builder configure in a new add-on?
Answer : B
Reference:
https://docs.splunk.com/Documentation/AddonBuilder/3.0.1/UserGuide/Overview
What is the maximum recommended volume of indexing per day, per indexer, for a non-cloud (on-prem) ES deployment?
Answer : B
Reference:
https://docs.splunk.com/Documentation/ITSI/4.4.2/Install/Plan
ES needs to be installed on a search head with which of the following options?
Answer : A
Reference:
https://docs.splunk.com/Documentation/ES/6.1.0/Install/InstallEnterpriseSecurity
Which settings indicates that the correlation search will be executed as new events are indexed?
Answer : C
Reference:
https://docs.splunk.com/Documentation/ES/6.1.0/Admin/Configurecorrelationsearches
Have any questions or issues ? Please dont hesitate to contact us