hiexam
splunk · SPLK-5001 · Q604 · multiple_choice · topic_1

A Risk Rule generates events on Suspicious Cloud Share Activity and regularly contributes to confirmed incidents from R…

A Risk Rule generates events on Suspicious Cloud Share Activity and regularly contributes to confirmed incidents from Risk Notables. An analyst realizes the raw logs these events are generated from contain information which helps them determine what might be malicious. What should they ask their engineer for to make their analysis easier?
  • A.Create a field extraction for this information.
  • B.Add this information to the risk_message.
  • C.Create another detection for this information.
  • D.Allowlist more events based on this information.
Explanation
Option B. Add this information to the risk_message is indeed a viable and effective choice, especially in the context of Risk-Based Alerting (RBA) in Splunk. By adding key information to the risk_message, you enhance the context around each risk event, allowing the analyst to quickly view relevant details without needing to drill down into raw logs. This approach can streamline investigations by summarizing essential details directly within the notable events, making the process faster and more efficient for the analyst. In this case, both A and B can be good options, but B might offer more immediate context within the Incident Review, especially if the goal is to have critical information surfaced directly in risk events.

Reference: examtopics_top_comment

Practice with progress tracking

Sign in to track wrong answers, get spaced-repetition reminders, and run timed exam mode.