Splunk Related Exams
SPLK-5001 Exam
Which of the following is not a component of the Splunk Security Content library (ESCU, SSE)?
An adversary uses "LoudWiner" to hijack resources for crypto mining. What does this represent in a TTP framework?
An analyst is investigating a network alert for suspected lateral movement from one Windows host to another Windows host. According to Splunk CIM documentation, the IP address of the host from which the attacker is moving would be in which field?