Which steps will satisfy the security requirements?
Three teams of data analysts use Apache Hive on an Amazon EMR cluster with the EMR File System (EMRFS) to query data stored within each teams Amazon S3 bucket. The EMR cluster has Kerberos enabled and is configured to authenticate users from the corporate Active Directory. The data is highly...
What are the categories of event described in the ITIL service operation book?
What are the categories of event described in the ITIL service operation book?A . Informational, scheduled, normalB . Scheduled, unscheduled, emergencyC . Informational, warning, exceptionD . Warning, reactive, proactiveView AnswerAnswer: C
Within props.conf, which stanzas are valid for data modification? (Choose all that apply.)
Within props.conf, which stanzas are valid for data modification? (Choose all that apply.)A . HostB . ServerC . SourceD . SourcetypeView AnswerAnswer: CD Explanation: Reference: https://answers.splunk.com/answers/3687/host-stanza-in-props-conf-not-being-honored-forudp-514-data-sources.html
Which two are policy types within the Symantec Endpoint Protection Manager? (Select two.)
Which two are policy types within the Symantec Endpoint Protection Manager? (Select two.)A . ExceptionsB . Host ProtectionC . Shared InsightD . Intrusion PreventionE . Process ControlView AnswerAnswer: AD
Internet routable traffic should be allowed to and from which component?
An organization employs laptop users who travel frequently. The organization needs to acquire log data from these Symantec Endpoint Protection clients periodically. This must happen without the use of a VPN. Internet routable traffic should be allowed to and from which component?A . Group Update Provider (GUP)B . LiveUpdate Administrator...
Which four actions should you perform in sequence?
Testlet 1 This is a case study. Case studies are not timed separately. You can use as much exam time as you would like to complete each case. However, there may be additional case studies and sections on this exam. You must manage your time to ensure that you are...
Which forwarder type can parse data prior to forwarding?
Which forwarder type can parse data prior to forwarding?A . Universal forwarderB . Heaviest forwarderC . Hyper forwarderD . Heavy forwarderView AnswerAnswer: D Explanation: Reference: https://docs.splunk.com/Documentation/Splunk/7.3.1/Forwarding/Typesofforwarders
Which of the following requests best illustrates an attempt to exploit an insecure direct object reference vulnerability?
Insecure direct object reference is a type of vulnerability where the application does not verify if the user is authorized to access the internal object via its name or key. Suppose a malicious user Rob tries to get access to the account of a benign user Ned. Which of the...
Log into Splunk
Log into SplunkView AnswerAnswer: C Explanation: Reference: https://docs.splunk.com/Documentation/Splunk/7.3.1/Security/ConfigureDuo
In this sequence of events, which of the following is/are true?
Sterling Drachma is a senior investment consultant currently researching a few high- risk internet stock companies which recently started trading on NASDAQ. Sterling manages 5 large and private investment accounts for which he has discretionary investment authority. Sterling is about 3 years away from retirement and his retirement portfolio is...