Question 6 of 66

An analyst notices that one of their servers is sending an unusually large amount of traffic, gigabytes more than normal, to a single system on the Internet. There doesn’t seem to be any associated increase in incoming traffic.

What type of threat actor activity might this represent?

    Correct Answer: A

Question 7 of 66

In which phase of the Continuous Monitoring cycle are suggestions and improvements typically made?

    Correct Answer: C

Question 8 of 66

An analyst is not sure that all of the potential data sources at her company are being correctly or completely utilized by Splunk and Enterprise Security. Which of the following might she suggest using, in order to perform an analysis of the data types available and some of their potential security uses?

    Correct Answer: B

Question 9 of 66

During their shift, an analyst receives an alert about an executable being run from C:\Windows\Temp. Why should this be investigated further?

    Correct Answer: D

Question 10 of 66

An analyst would like to visualize threat objects across their environment and chronological risk events for a Risk Object in Incident Review. Where would they find this?

    Correct Answer: D