An analyst is noticing false positives from a single IP on a specific offense. How can the analyst tune
the event rule to eliminate these false positives?
Question No 2
An analyst is investigating access to sensitive data on a Linux system. Data is accessible from
the /secret directory and can be viewed using the 'sudo oaf command. The specific file
/secret/file_08 - txt was known to be accessed in this way. After searching in the Log Activity Tab, the
following results are shown.
When interpreting this, the analyst is having trouble locating events which show when the file was
accessed. Why could this be?
Question No 3
The SOC team complained that they have can only see one Offense in the Offenses tab. space of 10
minutes, but the analyst How can the analyst ensure only one email is sent in this circumstance?
Question No 4
An analyst has been assigned a number of Offenses to review and a new event occurs, review and
manage. While reviewing an inactive offense, a new event occurs.
Which statement applies to the Offense?
Question No 5
An analyst has been assigned a task to modify a rule in such a manner that Source IP of the triggered
Offense from this rule should be stored in a Reference set.
Under which section of the rule wizard can the analyst achieve this?