Splunk Related Exams
SPLK-5001 Exam
Which dashboard in Enterprise Security would an analyst use to generate a report on users who are currently on a watchlist?
An analyst would like to visualize threat objects across their environment and chronological risk events for a Risk Object in Incident Review. Where would they find this?
The Lockheed Martin Cyber Kill Chain® breaks an attack lifecycle into several stages. A threat actor modified the registry on a compromised Windows system to ensure that their malware would automatically run at boot time. Into which phase of the Kill Chain would this fall?