Splunk Related Exams
SPLK-5001 Exam
The Lockheed Martin Cyber Kill Chain® breaks an attack lifecycle into several stages. A threat actor modified the registry on a compromised Windows system to ensure that their malware would automatically run at boot time. Into which phase of the Kill Chain would this fall?
Which dashboard in Enterprise Security would an analyst use to generate a report on users who are currently on a watchlist?
According to David Bianco's Pyramid of Pain, which indicator type is least effective when used in continuous monitoring?