Splunk Related Exams
SPLK-5001 Exam
An analyst is investigating a network alert for suspected lateral movement from one Windows host to another Windows host. According to Splunk CIM documentation, the IP address of the host from which the attacker is moving would be in which field?
While investigating findings in Enterprise Security, an analyst has identified a compromised device. Without leaving ES, what action could they take to run a sequence of containment activities on the compromised device that also updates the original finding?
An adversary uses "LoudWiner" to hijack resources for crypto mining. What does this represent in a TTP framework?