Analyst Exam
Question 1. Which principle in cybersecurity ensures that data is
accessible to authorized users when needed?
A) Confidentiality
B) Integrity
C) Availability
D) Non-repudiation
Answer: C) Availability
Explanation: Availability guarantees that authorized users can access
data and resources when required, which is a core principle of
cybersecurity.
Question 2. What is a common attack vector used in phishing
campaigns?
A) Malware infection
B) Social engineering via deceptive emails
C) DDoS attacks
D) Insider threats
Answer: B) Social engineering via deceptive emails
, Splunk Certified Cybersecurity Defense
Analyst Exam
Explanation: Phishing primarily involves social engineering tactics,
often through emails that trick users into revealing sensitive
information.
Question 3. Which cybersecurity framework is published by ISO to
provide best practices for information security management?
A) NIST Cybersecurity Framework
B) ISO 27001
C) PCI-DSS
D) GDPR
Answer: B) ISO 27001
Explanation: ISO 27001 is an international standard outlining
requirements for an information security management system (ISMS).
Question 4. In Splunk architecture, what is the primary role of a
forwarder?
A) Indexing incoming data
B) Collecting and forwarding data to indexers
C) Running search queries
, Splunk Certified Cybersecurity Defense
Analyst Exam
D) Managing user authentication
Answer: B) Collecting and forwarding data to indexers
Explanation: Forwarders are responsible for collecting data from
sources and sending it to Splunk indexers for processing and storage.
Question 5. Which type of data source is most commonly ingested
into Splunk for cybersecurity monitoring?
A) Financial reports
B) Network logs
C) Customer surveys
D) Physical asset inventories
Answer: B) Network logs
Explanation: Network logs are essential for cybersecurity monitoring
as they record traffic and events that can indicate security incidents.
Question 6. What is the key difference between SIEM and SOAR
systems?
A) SIEM focuses on threat detection; SOAR automates response
B) SIEM is cloud-only; SOAR is on-premises only
, Splunk Certified Cybersecurity Defense
Analyst Exam
C) SIEM manages user identities; SOAR manages network devices
D) SIEM is used for compliance; SOAR is used for hardware
provisioning
Answer: A) SIEM focuses on threat detection; SOAR automates
response
Explanation: SIEM systems aggregate and analyze security data to
detect threats, while SOAR platforms automate and orchestrate
response actions.
Question 7. Which Splunk feature allows security analysts to correlate
events and generate alerts?
A) Data ingestion pipeline
B) Correlation searches
C) Indexing queues
D) User access controls
Answer: B) Correlation searches
Explanation: Correlation searches in Splunk analyze multiple events
to identify patterns indicative of security threats, enabling alerts.