SPLK-2003 Practice Test Questions

107 Questions


How can a user with the username "pat" configure the Analyst Queue to only show new events that are assigned to the current user?


A. Create a filter for label-new and owner-pat.


B. Create a filter for status-open and owner-pat.


C. Create a filter for status=new and owner=pat.


D. Create a filter for status=new or owner=pat.





C.
  Create a filter for status=new and owner=pat.

To configure the Analyst Queue to only show new events that are assigned to the current user "pat", the correct filter would involve two conditions:
status=new: This ensures that only new events are displayed.
owner=pat: This ensures that the displayed events are specifically assigned to the user "pat."
By applying both of these filters, the user will only see events that are both in the "new" status and assigned to them. The other options, such as filtering for "label" or using "or" in the filter, would either result in showing incorrect data or broader results that are not restricted to new events assigned to the user.

Regarding the Splunk SOAR Automation Broker requirements, which of the following statements is not correct?


A. The Splunk SOAR Automation Broker requires outbound/egress connectivity to the Splunk SOAR (Cloud) or Splunk SOAR (On-premises) instance.


B. The Splunk SOAR Automation Broker must be able to connect to TCP port 443 (HTTPS) on the Splunk SOAR (Cloud) or Splunk SOAR (On-premises) instance.


C. The Splunk SOAR Automation Broker requires both inbound/ingress and outbound/egress connectivity to the Splunk SOAR (Cloud) or Splunk SOAR (On-premises) instance.


D. The Splunk SOAR Automation Broker requires inbound/ingress network connection from the Splunk SOAR (Cloud) or Splunk SOAR (On-premises) instance.





D.
  The Splunk SOAR Automation Broker requires inbound/ingress network connection from the Splunk SOAR (Cloud) or Splunk SOAR (On-premises) instance.

Explanation: The Splunk SOAR Automation Broker does not require inbound/ingress network connections from the Splunk SOAR (Cloud) or (On-premises) instance. Instead, it requires only outbound/egress connectivity. The Automation Broker is responsible for securely communicating with SOAR to execute actions, retrieve data, and send results, but this communication is initiated from the Automation Broker towards SOAR, using outbound connections (typically over TCP port 443). This ensures that no inbound connections need to be established, which simplifies firewall and security configurations.

When configuring a Splunk asset for SOAR to connect to a Splunk Cloud instance, the user discovers that they need to be able to run two different on_poll searches. How is this possible?


A. Install a second Splunk app and configure the query in the second app.


B. Configure the second query in the Splunk App for SOAR Export.


C. Enter the two queries in the asset as comma separated values.


D. Configure a second Splunk asset with the second query.





D.
  Configure a second Splunk asset with the second query.

Explanation:
In Splunk SOAR, when needing to run multiple on_poll searches to a Splunk Cloud instance, the recommended approach is to configure a second Splunk asset specifically for the second query. This method allows each Splunk asset to maintain its own settings and query configurations, ensuring that each search can be managed and optimized independently. This separation also helps in troubleshooting and maintaining clarity in the configuration.
Option A, installing a second Splunk app, is not necessarily relevant as the app itself does not determine the number of queries but rather how they are managed and processed through assets.
Option B, configuring the second query in the Splunk App for SOAR Export, does not apply as this app typically handles data exportation from SOAR to Splunk, not managing multiple polling queries.
Option C, entering the two queries as comma-separated values, would not be practical or functional as Splunk SOAR’s asset configuration does not process multiple queries in this manner for polling purposes.
When configuring a Splunk asset for SOAR to connect to a Splunk Cloud instance and there is a need to run two different on_poll searches, the appropriate action is to configure a second Splunk asset with the second query. This allows each Splunk asset to have its own unique on_poll search configuration, enabling them to run independently and retrieve different sets of data as required. The other options, such as installing a second app or entering queries as comma-separated values, are not standard practices for managing multiple on_poll searches in Splunk SOAR1.

After a playbook has run, where are the results stored?


A. Splunk Index


B. Case


C. Container


D. Log file





C.
  Container

Explanation:
The correct answer is C because after a playbook has run, the results are stored in the container that triggered the playbook. The container is a data object that represents an event or a case in Phantom. The container contains information such as the name, the description, the severity, the status, the owner, and the labels of the event or case. The container also contains the artifacts, the action results, the comments, the notes, and the phases and tasks associated with the event or case.
The answer A is incorrect because after a playbook has run, the results are not stored in a Splunk index, which is a data structure that stores events from various data sources in Splunk. The Splunk index is not directly accessible by Phantom, but can be queried by Phantom using the Splunk app.
The answer B is incorrect because after a playbook has run, the results are not stored in a case, which is a type of container that represents a security incident in Phantom. The case is a subset of the container, and not all containers are cases.
The answer D is incorrect because after a playbook has run, the results are not stored in a log file, which is a file that records the activities or events that occur in a system or a process. The log file is not a data object in Phantom, but can be a data source for Phantom.

Reference: Splunk SOAR User Guide, page 19. In Splunk Phantom, after a playbook has been executed, the results of the actions within that playbook are stored in the container associated with the event. A container is a data structure that encapsulates all relevant information and data for an incident or event within Phantom, including action results, artifacts, notes, and more. The container allows users to see a consolidated view of all the data and activity related to a particular event. These results are not stored in the Splunk Index, a separate case, or a log file as their primary storage but may be sent to a Splunk index for further analysis.

Which of the following is a step when configuring event forwarding from Splunk to Phantom?


A. Map CIM to CEF fields.


B. Create a Splunk alert that uses the event_forward.py script to send events to Phantom.


C. Map CEF to CIM fields.


D. Create a saved search that generates the JSON for the new container on Phantom.





B.
  Create a Splunk alert that uses the event_forward.py script to send events to Phantom.

Explanation:
A step when configuring event forwarding from Splunk to Phantom is to create a Splunk alert that uses the event_forward.py script to send events to Phantom. This script will convert the Splunk events to CEF format and send them to Phantom as containers. The other options are not valid steps for event forwarding. See Forwarding events from Splunk to Phantom for more details.

Configuring event forwarding from Splunk to Phantom typically involves creating a Splunk alert that leverages a script (like event_forward.py) to automatically send triggered event data to Phantom. This setup enables Splunk to act as a detection mechanism that, upon identifying notable events based on predefined criteria, forwards these events to Phantom for further orchestration, automation, and response actions. This integration streamlines the process of incident management by connecting Splunk's powerful data analysis capabilities with Phantom's orchestration and automation framework.

How can the debug log for a playbook execution be viewed?


A. On the Investigation page, select Debug Log from the playbook's action menu in the Recent Activity panel.


B. Click Expand Scope m the debug window.


C. In Administration > System Health > Playbook Run History, select the playbook execution entry, then select Log.


D. Open the playbook in the Visual Playbook Editor, and select Debug Logs in Settings.





A.
  On the Investigation page, select Debug Log from the playbook's action menu in the Recent Activity panel.

Explanation: Debug logs are essential for troubleshooting and understanding the execution flow of a playbook in Splunk Phantom. The debug log for a playbook execution can be viewed by navigating to the Investigation page of a specific event or container. Within the Recent Activity panel, there is an action menu associated with each playbook run. Selecting "Debug Log" from this menu will display the detailed execution log, showing each action taken, the results of those actions, and any errors or messages generated during the playbook run.

Phantom supports multiple user authentication methods such as LDAP and SAML2. What other user authentication method is supported?


A. SAML3


B. PIV/CAC


C. Biometrics


D. OpenID





B.
  PIV/CAC

Explanation: Splunk SOAR supports multiple user authentication methods to ensure secure access to the platform. Apart from LDAP (Lightweight Directory Access Protocol) and SAML2 (Security Assertion Markup Language 2.0), SOAR also supports PIV (Personal Identity Verification) and CAC (Common Access Card) as authentication methods. These are particularly used in government and military organizations for secure and authenticated access to systems, providing a high level of security through physical tokens or cards that contain encrypted user credentials.

During a second test of a playbook, a user receives an error that states: 'an empty parameters list was passed to phantom.act()." What does this indicate?


A. The container has artifacts not parameters.


B. The playbook is using an incorrect container.


C. The playbook debugger's scope is set to new.


D. The playbook debugger's scope is set to all.





A.
  The container has artifacts not parameters.

Explanation: The error message "an empty parameters list was passed to phantom.act()" typically indicates that the action being called by the playbook does not have the required parameters to execute. This can happen if the playbook expects certain data to be present in the container's artifacts but finds none. Artifacts in Splunk SOAR (Phantom) are data elements associated with a container (such as an event or alert) that playbooks can act upon. If a playbook action is designed to use data from artifacts as parameters and those artifacts are missing or do not contain the expected data, the playbook cannot execute the action properly, leading to this error.

When assigning an input parameter to an action while building a playbook, a user notices the artifact value they are looking for does not appear in the auto-populated list. How is it possible to enter the unlisted artifact value?


A. Type the CEF data path in manually.


B. Delete and recreate the artifact.


C. Edit the artifact to enable the List as Parameter option for the CEF value.


D. Edit the container to allow CEF parameters.





A.
  Type the CEF data path in manually.

Explanation:

When building a playbook in Splunk SOAR, if the desired artifact value does not appear in the auto-populated list of input parameters for an action, users have the option to manually enter the Common Event Format (CEF) datapath for that value. This allows for greater flexibility and customization in playbook design, ensuring that specific data points can be targeted even if they're not immediately visible in the interface. This manual entry of CEF datapaths allows users to directly reference the necessary data within artifacts, bypassing limitations of the auto-populated list. Options B, C, and D suggest alternative methods that are not typically used for this purpose, making option A the correct and most direct approach to entering an unlisted artifact value in a playbook action.

When assigning an input parameter to an action while building a playbook, a user can use the auto-populated list of artifact values that match the expected data type for the parameter. The auto-populated list is based on the contains parameter of the action inputs and outputs, which enables contextual actions in the SOAR user interface. However, the auto-populated list may not include all the possible artifact values that can be used as parameters, especially if the artifact values are nested or have uncommon data types. In that case, the user can type the CEF datapath in manually, using the syntax artifact.., where field is the name of the artifact field, such as cef, and key is the name of the subfield within the artifact field, such as sourceAddress. Typing the CEF datapath in manually allows the user to enter the unlisted artifact value as an input parameter to the action.

Therefore, option A is the correct answer, as it states how it is possible to enter the unlisted artifact value. Option B is incorrect, because deleting and recreating the artifact is not a way to enter the unlisted artifact value, but rather a way to lose the existing artifact data. Option C is incorrect, because editing the artifact to enable the List as Parameter option for the CEF value is not a way to enter the unlisted artifact value, but rather a way to make the artifact value appear in the auto-populated list. Option D is incorrect, because editing the container to allow CEF parameters is not a way to enter the unlisted artifact value, but rather a way to modify the container properties, which are not related to the action parameters.

Some of the playbooks on the SOAR server should only be executed by members of the admin role. How can this rule be applied?


A. Make sure the Execute Playbook capability is removed from all roles except admin.


B. Place restricted playbooks in a second source repository that has restricted access.


C. Add a filter block to all restricted playbooks that filters for runRole = "Admin".


D. Add a tag with restricted access to the restricted playbooks.





A.
  Make sure the Execute Playbook capability is removed from all roles except admin.

Explanation: To restrict playbook execution to members of the admin role within Splunk SOAR, the 'Execute Playbook' capability must be managed appropriately. This is done by ensuring that this capability is removed from all other roles except the admin role. Role-based access control (RBAC) in Splunk SOAR allows for granular permissions, which means you can configure which roles have the ability to execute playbooks, and by restricting this capability, you can control which users are able to initiate playbook runs.

How can more than one user perform tasks in a workbook?


A. Any user in a role with write access to the case's workbook can be assigned to tasks.


B. Add the required users to the authorized list for the container.


C. Any user with a role that has Perform Task enabled can execute tasks for workbooks.


D. The container owner can assign any authorized user to any task in a workbook.





C.
  Any user with a role that has Perform Task enabled can execute tasks for workbooks.

Explanation: In Splunk SOAR, tasks within workbooks can be performed by any user whose role has the 'Perform Task' capability enabled. This capability is assigned within the role configuration and allows users with the appropriate permissions to execute tasks. It is not limited to users with write access or the container owner; rather, it is based on the specific permissions granted to the role with which the user is associated.

A user wants to use their Splunk Cloud instance as the external Splunk instance for Phantom. What ports need to be opened on the Splunk Cloud instance to facilitate this? Assume default ports are in use.


A. TCP 8088 and TCP 8099.


B. TCP 80 and TCP 443


C. Splunk Cloud is not supported.


D. TCP 8080 and TCP 8191.





B.
  TCP 80 and TCP 443

Explanation: To integrate Splunk Phantom with a Splunk Cloud instance, network communication over certain ports is necessary. The default ports for web traffic are TCP 80 for HTTP and TCP 443 for HTTPS. Since Splunk Cloud instances are accessed over the internet, ensuring that these ports are open is essential for Phantom to communicate with Splunk Cloud for various operations, such as running searches, sending data, and receiving results. It is important to note that TCP 8088 is typically used by Splunk's HTTP Event Collector (HEC), which may also be relevant depending on the integration specifics.


Page 2 out of 9 Pages
Previous