ExamGecko
Home Home / Splunk / SPLK-1001

Splunk SPLK-1001 Practice Test - Questions Answers, Page 12

Question list
Search
Search

How does Splunk determine which fields to extract from data?

A.
Splunk only extracts the most interesting data from the last 24 hours.
A.
Splunk only extracts the most interesting data from the last 24 hours.
Answers
B.
Splunk only extracts fields users have manually specified in their data.
B.
Splunk only extracts fields users have manually specified in their data.
Answers
C.
Splunk automatically extracts any fields that generate interesting visualizations.
C.
Splunk automatically extracts any fields that generate interesting visualizations.
Answers
D.
Splunk automatically discovers many fields based on sourcetype and key/value pairs found in the data.
D.
Splunk automatically discovers many fields based on sourcetype and key/value pairs found in the data.
Answers
Suggested answer: D

Which of the following file types is an option for exporting Splunk search results?

A.
PDF
A.
PDF
Answers
B.
JSON
B.
JSON
Answers
C.
XLS
C.
XLS
Answers
D.
RTF
D.
RTF
Answers
Suggested answer: B

Which search string returns a filed containing the number of matching events and names that field Event Count?

A.
index=security failure | stats sum as "Event Count"
A.
index=security failure | stats sum as "Event Count"
Answers
B.
index=security failure | stats count as "Event Count"
B.
index=security failure | stats count as "Event Count"
Answers
C.
index=security failure | stats count by "Event Count"
C.
index=security failure | stats count by "Event Count"
Answers
D.
index=security failure | stats dc(count) as "Event Count"
D.
index=security failure | stats dc(count) as "Event Count"
Answers
Suggested answer: B

Which search would return events from the access_combined sourcetype?

A.
Sourcetype=access_combined
A.
Sourcetype=access_combined
Answers
B.
Sourcetype=Access_Combined
B.
Sourcetype=Access_Combined
Answers
C.
sourcetype=Access_Combined
C.
sourcetype=Access_Combined
Answers
D.
SOURCETYPE=access_combined
D.
SOURCETYPE=access_combined
Answers
Suggested answer: A

Explanation:

The search query sourcetype=access_combined would return events from the access_combined sourcetype, which is a predefined sourcetype in Splunk that matches the access-common or access-combined Apache logging formats1.The sourcetype field is case-sensitive, so using different capitalization such as Access_Combined or ACCESS_COMBINED would not match the exact sourcetype name2.The sourcetype field is also a default field that is added by the indexer when it indexes the data, so it does not need to be enclosed in quotation marks3.


When looking at a statistics table, what is one way to drill down to see the underlying events?

A.
Creating a pivot table.
A.
Creating a pivot table.
Answers
B.
Clicking on the visualizations tab.
B.
Clicking on the visualizations tab.
Answers
C.
Viewing your report in a dashboard.
C.
Viewing your report in a dashboard.
Answers
D.
Clicking on any field value in the table.
D.
Clicking on any field value in the table.
Answers
Suggested answer: B

In the fields sidebar, what indicates that a field is numeric?

A.
A number to the right of the field name.
A.
A number to the right of the field name.
Answers
B.
A # symbol to the left of the field name.
B.
A # symbol to the left of the field name.
Answers
C.
A lowercase n to the left of the field name.
C.
A lowercase n to the left of the field name.
Answers
D.
A lowercase n to the right of the field name.
D.
A lowercase n to the right of the field name.
Answers
Suggested answer: B

What is the primary use for the rare command?

A.
To sort field values in descending order.
A.
To sort field values in descending order.
Answers
B.
To return only fields containing five of fewer values.
B.
To return only fields containing five of fewer values.
Answers
C.
To find the least common values of a field in a dataset.
C.
To find the least common values of a field in a dataset.
Answers
D.
To find the fields with the fewest number of values across a dataset.
D.
To find the fields with the fewest number of values across a dataset.
Answers
Suggested answer: C

_______________ transforms raw data into events and distributes the results into an index.

A.
Index
A.
Index
Answers
B.
Search Head
B.
Search Head
Answers
C.
Indexer
C.
Indexer
Answers
D.
Forwarder
D.
Forwarder
Answers
Suggested answer: C

Documentations for Splunk can be found at docs.splunk.com

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A

Which component of Splunk is primarily responsible for saving data?

A.
Search Head
A.
Search Head
Answers
B.
Heavy Forwarder
B.
Heavy Forwarder
Answers
C.
Indexer
C.
Indexer
Answers
D.
Universal Forwarder
D.
Universal Forwarder
Answers
Suggested answer: C
Total 246 questions
Go to page: of 25