100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4.2 TrustPilot
logo-home
Tentamen (uitwerkingen)

Enhancing Cisco Security Solutions with Data Analytics | ECSS Cisco XDR, Splunk SEIM, Splunk SOAR| Questions And Answers| With Complete Solution

Beoordeling
-
Verkocht
-
Pagina's
5
Cijfer
A+
Geüpload op
17-12-2025
Geschreven in
2025/2026

Enhancing Cisco Security Solutions with Data Analytics | ECSS Cisco XDR, Splunk SEIM, Splunk SOAR| Questions And Answers| With Complete Solution

Instelling
Cisco
Vak
Cisco









Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
Cisco
Vak
Cisco

Documentinformatie

Geüpload op
17 december 2025
Aantal pagina's
5
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

Voorbeeld van de inhoud

Enhancing Cisco Security Solutions with Data Analytics | ECSS
Cisco XDR, Splunk SEIM, Splunk SOAR

Which statement is correct regarding XDR?
XDR correlates but does not contextualize the ingested data from the sources.
 XDR can reduce false positives and deliver prioritized incidents based on
potential risk and impact.
 XDR displays only current attacks, without the history of past attacks and
patterns
 XDR can directly execute SOAR playbooks for TDIR.

Which two security actions can you perform using SIEM? (Choose two.)
Display wireless users with failed login attempts for the last 6 hours from your branch
offices.
 Execute a playbook to contain an endpoint with malicious software.
 Query all endpoints in your environment to perform advanced threat hunting.
 Detect spikes of traffic that are the result of a DDoS attack against your
company's website.
 Block an attachment with malicious software in an email.

Which two options are key functions of SOAR? (Choose two.)
Gather and store events and logs from various sources.
 Provide comprehensive endpoint protection.
 Automate repetitive and time-consuming tasks.
 Orchestrate workflows to coordinate various security solutions.
 Microsegment the network to enhance security and optimize performance.

You work as analyst in a SOC that uses integrated SIEM, SOAR, and XDR for security
operations. Which statement is correct?
SOAR can receive alerts from both SIEM and XDR.
 SOAR can receive alerts from SIEM only.
 SOAR can receive alerts from XDR only.
 SOAR cannot receive alerts from the SIEM or XDR.

What does the "X" in XDR stand for?
an extended automated response to threats
 an extended manual response to threats
 an extended orchestration capability of various security solutions
 an extended reach that covers all relevant control points including endpoints and
networks

You are explaining the evolution of key SOC solutions to a younger colleague, which
emerged in different periods to address specific challenges in the cybersecurity
landscape. Which solution appeared the latest?
EDR
 XDR
 SIEM
 SOAR
 NDR


This study source was downloaded by 100000820853758 from CourseHero.com on 12-17-2025 07:57:58 GMT -06:00


https://www.coursehero.com/file/251712786/Cisco-U-CEUs-ECSS-with-Data-Analytics-02-09192025docx/

, You work as a SOC analyst and you want to employ SOAR for phishing investigation and
response in your organization after a user reported this type of attack. What is the most
effective action you can take?
Use a predefined playbook to triage, investigate, and respond to phishing email threats.
 Create your own playbook to triage, investigate, and respond to phishing email
threats.
 Manually inspect alerts and initiate actions, since automated action cannot be
effective for this type of attack.
 Send the alerts to the SIEM, where you can perform more effective actions.

What are the behaviors and methods employed by adversaries during a cyberattack
described as in the MITRE ATT&CK framework?
User Behavior Analytics (UBA)
 User and Entity Behavior Analytics (UEBA)
 Tools, Technologies, and Procedures (TTPs)
 Tactics, Techniques, and Procedures (TTPs)

You work as a SOC analyst and you plan to refine your playbooks in Splunk SOAR based
on the post-incident analysis to improve the coverage, response times, and overall
effectiveness of your automation actions. You are not familiar with Python scripting, so
how can you easily accomplish this task?
Use Visual Basic to edit and refine the playbooks.
 Use Visual Studio Code (VS Code) to edit and refine the playbooks.
 Use the Visual Playbook editor to edit and refine the playbooks.
 Use Notepad++ to edit and refine the playbooks.

You are planning to integrate Splunk SOAR with your Splunk Enterprise platform so you
can import data from Splunk SOAR and send data from your Splunk Enterprise instance
to Splunk SOAR. Which two apps do you need to install and on which solution? (Choose
two.)
Splunk App for SOAR Export on Splunk SOAR
 Splunk App for Splunk Enterprise on Splunk SOAR
 Splunk App for SOAR on Splunk Enterprise
 Splunk App for SOAR Import on Splunk Enterprise
 Splunk App for SOAR Export on Splunk Enterprise

You are working as a SOC manager and explaining the incident management process in
Cisco XDR to a new colleague, who is a SOC analyst. While showing the Cisco XDR
incidents page, you emphasize that new incidents are assigned a priority score and
automatically enriched. How is the incident Priority score calculated in Cisco XDR?
Detection Risk times MITRE TTP Financial Risk
 MITRE TTP Financial Risk times Asset Value
 Detection Risk times Source Severity
 Detection Risk times Asset Value

Match each Cisco XDR response option with its description.
Pivot menus > Provide immediate response actions within the incident management
through out-of-the-box Cisco XDR automation workflows.
Playbooks > Available from drop-down icons next to observables in various places
within Cisco XDR.

This study source was downloaded by 100000820853758 from CourseHero.com on 12-17-2025 07:57:58 GMT -06:00


https://www.coursehero.com/file/251712786/Cisco-U-CEUs-ECSS-with-Data-Analytics-02-09192025docx/

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
Succeed Havard University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
1794
Lid sinds
5 jaar
Aantal volgers
1499
Documenten
5757
Laatst verkocht
3 uur geleden

3,9

286 beoordelingen

5
162
4
34
3
34
2
9
1
47

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen