What is the term for a model of normal network activity used to detect deviations?
When searching in Splunk, which of the following SPL commands can be used to run a subsearch across every field in a wildcard field list?
An analyst is investigating the number of failed login attempts by IP address. Which SPL command can be used to create a temporary table containing the number of failed login attempts by IP address over a specific time period?
What is the main difference between hypothesis-driven and data-driven Threat Hunting?
Which metric would track improvements in analyst efficiency after dashboard customization?
Which dashboard in Enterprise Security would an analyst use to generate a report on users who are currently on a watchlist?
Upon investigating a report of a web server becoming unavailable, the security analyst finds that the web server’s access log has the same log entry millions of times:
147.186.119.200 - - [28/Jul/2023:12:04:13 -0300] "GET /login/ HTTP/1.0" 200 3733
What kind of attack is occurring?
A threat hunter generates a report containing the list of users who have logged in to a particular database during the last 6 months, along with the number of times they have each authenticated. They sort this list and remove any user names who have logged in more than 6 times. The remaining names represent the users who rarely log in, as their activity is more suspicious. The hunter examines each of these rare logins in detail.
This is an example of what type of threat-hunting technique?