In order to include an eventtype in a data model node, what is the next step after extracting the correct fields?
Correct Answer:C
Reference: https://docs.splunk.com/Documentation/CIM/4.15.0/User/UsetheCIMtonormalizeOSSECdata
Both “Recommended Actions” and “Adaptive Response Actions” use adaptive response. How do they differ?
Correct Answer:D
Reference: https://docs.splunk.com/Documentation/ES/latest/Admin/Configureadaptiveresponse
Glass tables can display static images and text, the results of ad-hoc searches, and which of the following objects?
Correct Answer:C
Reference: https://docs.splunk.com/Documentation/ES/6.1.0/User/CreateGlassTable
To which of the following should the ES application be uploaded?
Correct Answer:C
Reference: https://docs.splunk.com/Documentation/ES/6.1.0/Install/InstallEnterpriseSecuritySHC
Which indexes are searched by default for CIM data models?
Correct Answer:D
Reference: https://answers.splunk.com/answers/600354/indexes-searched-by-cim-data-models.html
Which of the following ES features would a security analyst use while investigating a network anomaly notable?
Correct Answer:D
Reference: https://www.splunk.com/en_us/products/premium-solutions/splunk-enterprise-security/features.html