What role should be assigned to a security team member who will be taking ownership of notable events in the incident review dashboard?
Which of the following lookup types in Enterprise Security contains information about known hostile IP addresses?
Which of the following is part of tuning correlation searches for a new ES installation?
How is it possible to specify an alternate location for accelerated storage?
An administrator is asked to configure an “Nslookup” adaptive response action, so that it appears as a selectable option in the notable event’s action menu when an analyst is working in the Incident Review dashboard. What steps would the administrator take to configure this option?
Which column in the Asset or Identity list is combined with event security to make a notable event’s urgency?
A set of correlation searches are enabled at a new ES installation, and results are being monitored. One of the correlation searches is generating many notable events which, when evaluated, are determined to be false positives.
What is a solution for this issue?
A newly built custom dashboard needs to be available to a team of security analysts In ES. How is It possible to Integrate the new dashboard?
Enterprise Security’s dashboards primarily pull data from what type of knowledge object?
Which setting is used in indexes.conf to specify alternate locations for accelerated storage?
Which columns in the Assets lookup are used to identify an asset in an event?
An administrator wants to ensure that none of the ES indexed data could be compromised through tampering. What feature would satisfy this requirement?
When installing Enterprise Security, what should be done after installing the add-ons necessary for normalizing data?
The Brute Force Access Behavior Detected correlation search is enabled, and is generating many false positives. Assuming the input data has already been validated. How can the correlation search be made less sensitive?
How is it possible to navigate to the list of currently-enabled ES correlation searches?
After installing Enterprise Security, the distributed configuration management tool can be used to create which app to configure indexers?
After data is ingested, which data management step is essential to ensure raw data can be accelerated by a Data Model and used by ES?
Glass tables can display static images and text, the results of ad-hoc searches, and which of the following objects?