Splunk Related Exams
SPLK-5001 Exam
An analyst is examining the logs for a web application’s login form. They see thousands of failed logon attempts using various usernames and passwords. Internet research indicates that these credentials may have been compiled by combining account information from several recent data breaches.
Which type of attack would this be an example of?
What is the term for a model of normal network activity used to detect deviations?
According to David Bianco's Pyramid of Pain, which indicator type is least effective when used in continuous monitoring?