SPLK-1001
SPLK-1001
5 What is Splunk?
You can use the following options to specify start and end
19 time for the query range:
You can also specify a time range in the search bar. You
can use the following for beginning and ending for a time
38 range (Choose two.):
48 Field names are case sensitive and field value are not.
192 What can be configured using the Edit Job Settings menu?
A. By scheduling a report.
B. By creating a link to the job.
C. By changing the job settings.
D. By changing the time range picker to more than 7 days. A
A. No events will be returned.
B. Splunk will prompt you to specify an index.
C. All non-indexed events to which the user has access will
be returned.
D. Events from every index searched by default to which the
user has access will be returned. D
A. index=a index=b
B. (index=a OR index=b)
C. index=(a & b)
D. index = a, b B
A. True
B. False A
A. Splunk is a software platform to search, analyze and
visualize the machine-generated data.
B. Database management tool.
C. Security Information and Event Management (SIEM).
D. Cloud based application that help in analyzing logs. A
A. Will display result depending on the data.
B. Will return event where status field exist but value of that
field is not 100.
C. Will return event where status field exist but value of that
field is not 100 and all events where status field doesn't
exist. C
A. dedup
B. rename
C. sort -
D. fields + D
A. Creating a pivot table.
B. Clicking on the visualizations tab.
C. Viewing your report in a dashboard.
D. Clicking on any field value in the table. D
A. Include all formatting commands before any search
terms.
B. Include at least one function as this is a search
requirement.
C. Include the search terms at the beginning of the search
string.
D. Avoid using formatting clauses, as they add too much
overhead. C
A. Sourcetype=access_combined
B. Sourcetype=Access_Combined
C. sourcetype=Access_Combined
D. SOURCETYPE=access_combined C
A. Use field +to add and field -to remove.
B. Use table +to add and table -to remove.
C. Use fields +to add and fields -to remove.
D. Use fields Plus to add and fields Minus to remove. C
A. True
B. False A
A. Search & Reporting is the only app that can be set as the
default application.
B. Full names can only be changed by accounts with a
Power User or Admin role.
C. Time zones are automatically updated based on the
setting of the computer accessing Splunk.
D. Full name, time zone, and default app can be defined by
clicking the login name in the Splunk bar. D
A. index=security Error Fail
B. index=security error OR fail
C. index=security "error failure"
D. index=security NOT error NOT fail A
A. 10 Minutes
B. 15 Minutes
C. 1 Day
D. 7 Days A
A. host=*
B. host=WWW3
C. host=WWW*
D. Host=WWW3 B
A. index
B. host
C. _time
D. action B
A. Open new search.
B. Exclude the item from search.
C. None of the above.
D. Add the item to search. ABD
A. earliest=
B. latest=
C. beginning=
D. ending=
E. All the above
F. Only 3rd and 4th AB
A. Dashboards
B. Metadata only
C. Non-interesting fields
D. Field descriptions C
A. False
B. True A
A. True
B. False A
A. index=* "failed password"
B. "failed password" index=*
C. (index=* OR index=security) "failed password"
D. index=security "failed password" D
A. Alerting
B. Admin
C. Power
D. User C
A. Date & Time Range
B. Advanced
C. Date Range
D. Presets
E. Relative ABCDE
A. Cloned panel
B. Inline panel
C. Report panel
D. Prebuilt panel B
A. No
B. Yes A
A. App, Owner, Severity, and Type
B. App, Owner, Priority, and Status
C. App, Dashboard, Severity, and Type
D. App, Time Window, Type, and Severity A
A. lookup
B. csvlookup
C. inputlookup
D. outputlookup C
A. action
B. clientip
C. categoryId
D. sourcetype D
A. Can be accessed by Apps > Search & Reporting.
B. Provides default interface for searching and analyzing
logs.
C. Enables the user to create knowledge object, reports,
alerts and dashboards.
D. It only gives us search functionality. ABC
A. In chronological order.
B. Randomly by default.
C. In reverse chronological order.
D. Alphabetically according to field name. C
A. Yes
B. No B
A. _time and host
B. _time and index
C. host and sourcetype
D. index and sourcetype B
A. The value of the field
B. The number of values for the field
C. The number of unique values for the field
D. The numeric non-unique values of the field C
A. Index
B. Search Head
C. Indexer
D. Forwarder C
A. All events that either have a host of www3 or a status of
503.
B. All events with a host of www3 that also have a status of
503.
C. We need more information; we cannot tell without
knowing the time range.
D. We need more information; a search cannot be run
without specifying an index. B
A. time
B. _time
C. EventTime
D. timestamp B
A. An app
B. JSON
C. A role
D. An enhanced solution A
A. Returns the least common field values of a given field in
the results.
B. Returns the most common field values of a given field in
the results.
C. Returns the top 10 field values of a given field in the
results.
D. Returns the lowest 10 field values of a given field in the
results. A
A. Preset - Relative: 30-seconds ago
B. Relative - Earliest: 30-seconds ago, Latest: Now
C. Real-time - Earliest: 30-seconds ago, Latest: Now
D. Advanced - Earliest: 30-seconds ago, Latest: Now C
A. The lookup must be configured to run automatically.
B. The contents of the lookup file must be copied and
pasted into the search bar.
C. The lookup file must be uploaded to Splunk and a lookup
definition must be created.
D. The lookup file must be uploaded to the etc/apps/lookups
folder for automatic ingestion. C
A. Auto-detect changes in performance.
B. Auto-generated PDF reports of overall data trends.
C. Regularly scheduled archiving to keep disk space use
low.
D. Triggering an alert in your Splunk instance when certain
conditions are met. D
A. True
B. False A
A. Zoom to selection
B. Format Timeline
C. Deselect
D. Delete
E. Zoom Out ABCE
A. #
B. %
C. a
D. a# C
A. Review Splunk reports
B. Run ./splunk show
C. Click Data Summary in Splunk Web
D. Search index=* sourcetype=* host=* C
A. Table
B. Raw
C. Pie Chart
D. List ABD
A. None of the above
B. Indexing Phase
C. Parsing Phase
D. Input Phase
E. License Metering D
A. Yes
B. No A
A. No
B. Yes B
A. Indexing
B. Searching
C. Parsing
D. Settings
E. Input ACE
A. Yes
B. No B
A. True
B. False A
A. False
B. True B
A. Splunk User Behavior Analytics (UBA)
B. Splunk IT Service Intelligence (ITSI)
C. Splunk Enterprise Security (ES)
D. Splunk Analytics Security (AS) ABC
A. True
B. False A
A. False
B. True B
A. False
B. True B
A. =
B. >
C. !
D. * D
A. ASCII Character order.
B. Reverse chronological order.
C. Alphanumeric order.
D. Chronological order. B
A. Only A, B
B. Router and Switch Logs
C. Firewall and Web Server Logs
D. Only C
E. Database logs
F. All firewall, web server, database, router and switch logs F
A. Splunk Enterprise Security Suite
B. Searching and Reporting
C. Reporting and Searching
D. Splunk apps for Security B
A. Index Forwarders (IF)
B. Universal Forwarders (UF)
C. Super Forwarder (SF)
D. Heavy Forwarders (HF) D
A. Forwarders
B. Indexer
C. Heavy Forwarders
D. Search head D
A. Once a search job begins, it cannot be stopped
B. A search job can only be paused when less than 50% of
events are returned
C. A search job can only be stopped when less than 50% of
events are returned
D. Once a search job begins, it can be stopped or paused at
any point in time D
A. "failed password"
B. "failed password"*
C. index=* "failed password"
D. index=security "failed password" D
A. top
B. stats
C. table
D. percent A
A. f*il
B. *fail
C. fail*
D. *fail* C
A. To sort field values in descending order.
B. To return only fields containing five of fewer values.
C. To find the least common values of a field in a dataset.
D. To find the fields with the fewest number of values across
a dataset. C
A. To differentiate between structured and unstructured
events in the data.
B. To sort the events returned by the search command in
chronological order.
C. To zoom in and zoom out, although this does not change
the scale of the chart.
D. To show peaks and/or valleys in the timeline, which can
indicate spikes in activity or downtime. D
A. user
B. source
C. location
D. sourceIp B
A. Any search can be saved as a report.
B. Only searches that generate visualizations.
C. Only searches containing a transforming command.
D. Only searches that generate statistics or visualizations. A
A. Indexer
B. Parsing
C. Heavy Forwarder
D. Input A
A. Parsing
B. Masking
C. Searching
D. Forwarding ABD
A. Parentheses
B. @ or # symbols
C. Quotation marks
D. Relational operators such as =, <, or > D
A. 3
B. 2
C. 4
D. 1 A
A. action+purchase
B. action=purchase
C. action | purchase
D. action equal purchase B
A. No
B. Yes B
A. True
B. False B
A. _raw
B. host
C. _host
D. index A
A. Only continuous monitoring.
B. Only One-time monitoring.
C. None of the above.
D. Both One-time and continuous monitoring. D
A. The owner of the report can edit permissions from the
Edit dropdown.
B. Only users with an Admin or Power User role can access
other users' reports.
C. Anyone can access any reports marked as public within a
shared Splunk deployment.
D. The owner of the report must clone the original report
and save it to their user account. A
A. Export the result to CSV format.
B. Add the Job results to a dashboard.
C. Schedule the Job to re-run in 10 minutes.
D. Change Job Lifetime from 10 minutes to 7 days. D
A. Automatically correlates related fields.
B. Converts field values into numerical values.
C. Calculates statistics on data that matches the search
criteria.
D. Analyzes numerical fields for their ability to predict
another discrete field. C
A. A field that appears in any event.
B. A field that appears in every event.
C. A field that appears in the top 10 events.
D. A field that appears in at least 20% of the events. D
A. count, sum, add
B. count, sum, less
C. sum, avg, values
D. sum, values, table C
A. A number to the right of the field name.
B. A # symbol to the left of the field name.
C. A lowercase n to the left of the field name.
D. A lowercase n to the right of the field name. B
A. Reports are best named using many numbers so they can
be more easily sorted.
B. Use a consistent naming convention so they are easily
separated by characteristics such as group and object.
C. Name reports as uniquely as possible with no overlap to
differentiate them from one another.
D. Any naming convention is fine as long as you keep an
external spreadsheet to keep track. B
A. False
B. True B
A. the_questionnaire _pedia
B. the_questionnaire pedia
C. the_questionnaire_pedia
D. the_questionnaire Pedia C
A. $SPLUNK_HOME/bin/scripts
B. $SPLUNK_HOME/etc/scripts
C. $SPLUNK_HOME/bin/etc/scripts
D. $SPLUNK_HOME/etc/scripts/bin A
A. OR
B. NOT
C. AND
D. XOR C
A. After saving the report, click Schedule.
B. After saving the report, click Event Type.
C. After saving the report, click Scheduling.
D. After saving the report, click Dashboard Panel. A
A. |
B. $
C. !
D. , D
A. h
B. day
C. mon
D. yr
E. y
F. w
G. week
H. d
I. s
J. m ACEFHIJ
A. | lookup products.csv
B. inputlookup products.csv
C. | inputlookup products.csv
D. | lookup_definition products.csv C
A. No
B. Yes B
A. Search term
B. Command
C. Pipe
D. Functions
E. Arguments
F. Clause ABCDEF
A. Props
B. CLI
C. Splunk Web
D. savedsearches.conf
E. Splunk apps and add-ons
F. indexes.conf
G. inputs.conf
H. metadata.conf BCEG
A. No
B. Yes B
A - ASCII Character order
B - Reverse chronological order
C - Alphanumeric order
D - Chronological order CD
A - inputlookup
B - lookup
C - outputlookup
D - csvlookup B
A - Drills down for that value
B - Highlights the field value across the chart
C - Adds the highlighted value to the search criteria
D - WTF is SEGMENT?? C
A - 1>2>3
B - 3>2>1
C - 2>3>1
D - 2>1>3 C
A - Dev
B - Stdev
C - Count deviation
D - By standarddev B
A - It returns the count and percent columns per row
B - It displays the output in table format
C - It returns the count and percent columns per column
D - It returns the top 10 results ABD
A - True
B - False B
A - Input field
B - At least five columns
C - Timestamp
D - Source type A
A - True
B - False A
A - count
B - distinct_count
C - dc
D - sum
E - avg
F - list
G - values ABCDEFG
A - Both of the answers
B - Returns the contents of a file named products.csv
C - Writes search results to a file named products.csv C
A - admin
B - power
C - user AB
A - True
B - False A
A - As
B - Rex
C - By
D - List B
A - Statistical values
B - A list of events
C - All of the answer stated here
D - Transactions A
A - search head
B - indexers
C - forwarders B
A - Fields(X)
B - Eval by (X)
C - Values(X)
D - Median(X) D
A - Sourcetype=access_* | max(bytes)
B - Sourcetype=access_* | stats max(bytes)
C - Sourcetype=access_* | avg(bytes)
D - Sourcetype=access_* | maximum totals by bytes B
A - Chronological
B - Alphabetical
C - Reverse chronological
D - ASCIE AB
field name is case sensitive not values
When using a panel from a report, you cannot
modify the search string in the panel, but you can
change and configure the visualization. If the
report search changes, the panel using that report
updates accordingly.
* earliest=-24h latest=now | stats count (searches
the default index only)
If you want the event count for specific search try
this:
[your splunk search] earliest=-24h latest=now|
stats count
The "Forward" option in Splunk is used to forward
data from a forwarder to an indexer or another
forwarder. The forwarder sends data over a
network connection to the indexer, which then
indexes the data and makes it available for search
and analysis.
5 What is Splunk?
A. Alerts are based on searches that are either run on a scheduled interval or
in real-time.
B. Alerts are based on searches and when triggered will only send an email
notification.
C. Alerts are based on searches and require cron to run on scheduled interval.
D. Alerts are based on searches that are run exclusively as real-time.
A. Hosts
B. Sourcetypes
C. Sources
D. Indexes
A. The percentage field will be displayed in the results.
B. The top three most common values in statusCode will be displayed for each
user.
C. The search will fail. The proper top command format is top limit=3 instead
of top 3.
D. Only the top three overall most common values in statusCode will be
displayed.
A. Real-time searches display results from a rolling time window, while relative
searches display results from a set length of time.
B. Real-time searches happen instantly, while relative searches happen at a
scheduled time.
C. Real-time represents events that have happened in a set time window, while
relative will display results from a rolling time window.
D. Real-time searches run constantly in the background, while relative
searches only run when certain criteria are met.
A. Add an output.
B. Export a dashboard panel.
C. Modify the chart type displayed in a dashboard panel.
D. Drag a dashboard panel to a different location on the dashboard.
A. Acceleration, schedule, permissions
B. The report's name, schedule, permissions
C. The report's name, acceleration, schedule
D. The report's name, acceleration, permissions
A. index=*
B. index=web OR index=s*
C. (index=web OR index=sales)
D. *index=sales AND index=web*
A. No
B. Yes
A. Not possible to specify time manually in Search query
B. end=
C. start=
D. earliest=
E. latest=
A. @
B. &
C. *
D. #
A. False
B. True
A. No
B. Yes
A. index
B. action
C. clientip
D. sourcetype
A. Events
B. Patterns
C. Statistics
D. Visualization
A. True
B. False
A. Select the time range always.
B. Try to specify index values.
C. Include as many search terms as possible.
D. Never select time range.
E. Try to use * with every search term.
F. Inclusion is generally better than exclusion.
G. Try to keep specific search terms.
A. Will return event where status field exist but value of that field is not 100.
B. Will return event where status field exist but value of that field is not 100
and all events where status field doesn't exist.
C. Will get different results depending on data.
A. True
B. False
A. True
B. False
A. Click field in field sidebar -> click YES on the pop-up dialog on upper right
side -> check now field should be visible in the list of selected fields.
B. Not possible.
C. Only CLI changes will enable it.
D. Click Settings -> Find field option -> Drop down select field -> enable
selected field -> check now field should be visible in the list of selected fields.
A. True
B. False
A. index=security sourcetype=linux_secure (invalid OR failed) | count as
"Potential Issues"
B. index=security sourcetype=linux_secure (invalid OR failed) | stats count as
"Potential Issues"
C. index=security sourcetype=linux_secure (invalid OR failed) | count stats as
"Potential Issues"
D. index=security sourcetype=linux_secure (invalid OR failed) | stats as
"Potential Issues"
A. Only data where the value of the field error does not equal an asterisk (*)
will be displayed.
B. Only data that does not contain the error field will be displayed.
C. Only data with a value in the field error will be displayed.
D. Only data where the error field is present and does not contain a value will
be displayed.
A. Correlated
B. Total
C. Segmented
D. File-based
A. All search jobs are saved for 10 days
B. All search jobs are saved for 10 hours
C. All search jobs are saved for 10 weeks
D. All search jobs are saved for 10 minutes
A. Splunk automatically discovers only numeric fields
B. Splunk automatically discovers only alphanumeric fields
C. Splunk automatically discovers only manually configured fields
D. Splunk automatically discovers only fields directly related to the search
results
A. Search head, GPU, streamer
B. Search head, indexer, forwarder
C. Search head, SQL database, forwarder
D. Search head, SSD, heavy weight agent
A. lookup command
B. inputlookup command
C. Settings > Lookups > Input
D. Settings > Lookups > Upload
A. Use earliest=-1d@d latest=@d
B. Set a real-time search over a 24-hour window
C. Use the time range picket to select "Yesterday"
D. Use the time range picker to select "Last 24 hours"
A. Before clauses. For example: stats sum(bytes) | by host
B. Before commands. For example: | stats sum(bytes) by host
C. Before arguments. For example: stats sum| (bytes) by host
D. Before functions. For example: stats |sum(bytes) by host
A. host
B. owner
C. bytes
D. action
A. | rare top=5
B. | top rare=5
C. | top limit=5
D. | rare limit=5
A. | rename action = CustomerAction
B. | rename Action as "Customer Action"
C. | rename Action to "Customer Action"
D. | rename action as "Customer Action"
A. latest=-2h
B. earliest=-2h
C. latest=-2hour@d
D. earliest=-2hour@d
A. Yes
B. No
A. Real-time
B. 10 Minutes
C. Overnight Download
D. 30 Minutes
A. No
B. Yes
A. It is only available to Admins.
B. Such feature does not exist in Splunk.
C. Shows options to complete the search string.
A. False
B. True
A. No
B. Yes
A. None of the above
B. Job
C. Search Only
A. Yes
B. No
A. False
B. True
A. True
B. False
A. index=* "failed password"
B. "failed password" index=*
C. (index=* OR index=security) "failed password"
D. index=security "failed password"
A. Alerting
B. Admin
C. Power
D. User
A. Date & Time Range
B. Advanced
C. Date Range
D. Presets
E. Relative
A. Cloned panel
B. Inline panel
C. Report panel
D. Prebuilt panel
A. Top values by time
B. Rare values by time
C. Events with top value fields
D. Events with rare value fields
A. New events based on the current time range picker
B. The same events based on the current time range picker
C. The same events from when the original search was executed
D. New events in addition to the same events from the original search
A. Only HTTP Event Collector (HEC) and TCP/UDP
B. None of the above
C. Only TCP/UDP
D. Only Scripts
E. Filed & Directories, HTTP Event Collector (HEC), TCP/UDP and Scripts
A. Splunk will re-run the search job in Verbose Mode to prioritize the new
Selected Field.
B. Splunk will highlight related fields as a suggestion to add them to the
Selected Fields list.
C. Custom selections will replace the Interesting Fields that Splunk populated
into the list at search time.
D. The selected field and its corresponding values will appear underneath the
events in the search results.
A. No
B. Yes
A. App, Owner, Severity, and Type
B. App, Owner, Priority, and Status
C. App, Dashboard, Severity, and Type
D. App, Time Window, Type, and Severity
A. lookup
B. csvlookup
C. inputlookup
D. outputlookup
A. action
B. clientip
C. categoryId
D. sourcetype
A. Can be accessed by Apps > Search & Reporting.
B. Provides default interface for searching and analyzing logs.
C. Enables the user to create knowledge object, reports, alerts and
dashboards.
D. It only gives us search functionality.
A. In chronological order.
B. Randomly by default.
C. In reverse chronological order.
D. Alphabetically according to field name.
A. Lookup fields cannot be used in searches.
B. Lookups contain static data available in the index.
C. Lookups add more fields to results returned by a search.
D. Lookups pull data at index time and add them to search results.
A. To group the results by one or more fields.
B. To compute numerical statistics on each field.
C. To specify how the values in a list are delimited.
D. To partition the input data based on the split-by fields.
A. True
B. False
A. False
B. True
A. Splunk only extracts the most interesting data from the last 24 hours.
B. Splunk only extracts fields users have manually specified in their data.
C. Splunk automatically extracts any fields that generate interesting
visualizations.
D. Splunk automatically discovers many fields based on sourcetype and
key/value pairs found in the data.
A. Yes
B. No
A. _time and host
B. _time and index
C. host and sourcetype
D. index and sourcetype
A. The value of the field
B. The number of values for the field
C. The number of unique values for the field
D. The numeric non-unique values of the field
A. Index
B. Search Head
C. Indexer
D. Forwarder
A. Yes
B. No
A. No
B. Yes
A. Indexing
B. Searching
C. Parsing
D. Settings
E. Input
A. Yes
B. No
A. True
B. False
A. False
B. True
A. Splunk User Behavior Analytics (UBA)
B. Splunk IT Service Intelligence (ITSI)
C. Splunk Enterprise Security (ES)
D. Splunk Analytics Security (AS)
A. True
B. False
A. False
B. True
A. False
B. True
A. =
B. >
C. !
D. *
A. ASCII Character order.
B. Reverse chronological order.
C. Alphanumeric order.
D. Chronological order.
A. Only A, B
B. Router and Switch Logs
C. Firewall and Web Server Logs
D. Only C
E. Database logs
F. All firewall, web server, database, router and switch logs
A. Splunk Enterprise Security Suite
B. Searching and Reporting
C. Reporting and Searching
D. Splunk apps for Security
A. Index Forwarders (IF)
B. Universal Forwarders (UF)
C. Super Forwarder (SF)
D. Heavy Forwarders (HF)
A. Forwarders
B. Indexer
C. Heavy Forwarders
D. Search head
A. h
B. day
C. mon
D. yr
E. y
F. w
G. week
H. d
I. s
J. m
A. | lookup products.csv
B. inputlookup products.csv
C. | inputlookup products.csv
D. | lookup_definition products.csv
A. No
B. Yes
A. Search term
B. Command
C. Pipe
D. Functions
E. Arguments
F. Clause
A. Props
B. CLI
C. Splunk Web
D. savedsearches.conf
E. Splunk apps and add-ons
F. indexes.conf
G. inputs.conf
H. metadata.conf
A. No
B. Yes
A - ASCII Character order
B - Reverse chronological order
C - Alphanumeric order
D - Chronological order
A - inputlookup
B - lookup
C - outputlookup
D - csvlookup
A - Drills down for that value
B - Highlights the field value across the chart
C - Adds the highlighted value to the search criteria
D - WTF is SEGMENT??
A - 1>2>3
B - 3>2>1
C - 2>3>1
D - 2>1>3
A - Dev
B - Stdev
C - Count deviation
D - By standarddev
A - It returns the count and percent columns per row
B - It displays the output in table format
C - It returns the count and percent columns per column
D - It returns the top 10 results
A - True
B - False
A - Input field
B - At least five columns
C - Timestamp
D - Source type
A - True
B - False
A - count
B - distinct_count
C - dc
D - sum
E - avg
F - list
G - values
A - Both of the answers
B - Returns the contents of a file named products.csv
C - Writes search results to a file named products.csv
A - admin
B - power
C - user
A - True
B - False
A - As
B - Rex
C - By
D - List
A - Statistical values
B - A list of events
C - All of the answer stated here
D - Transactions
A - search head
B - indexers
C - forwarders
A - Fields(X)
B - Eval by (X)
C - Values(X)
D - Median(X)
A - Sourcetype=access_* | max(bytes)
B - Sourcetype=access_* | stats max(bytes)
C - Sourcetype=access_* | avg(bytes)
D - Sourcetype=access_* | maximum totals by bytes
A - Chronological
B - Alphabetical
C - Reverse chronological
D - ASCIE
Enter your answer #DIV/0!