ExamGecko
Home Home / Splunk / SPLK-1001

Splunk SPLK-1001 Practice Test - Questions Answers, Page 24

Question list
Search
Search

When using the top command in the following search, which of the following will be true about the results?

index="main" sourcetype="access_*" action="purchase" | top 3 statusCode by user showperc=f countfield=status_code_count

A.
The search will fail. The proper top command format is top limit=3 instead of top 3.
A.
The search will fail. The proper top command format is top limit=3 instead of top 3.
Answers
B.
The top three most common values in statusCode will be displayed for each user.
B.
The top three most common values in statusCode will be displayed for each user.
Answers
C.
Only the top three overall most common values in statusCode will be displayed.
C.
Only the top three overall most common values in statusCode will be displayed.
Answers
D.
The percentage field will be displayed in the results.
D.
The percentage field will be displayed in the results.
Answers
Suggested answer: B

Explanation:

The top command returns the most common values of a field and their count. By using the by clause, you can group the results by another field. In this case, the top command will return the top three most common values in statusCode for each user. The showperc=f option will suppress the percentage column in the output. The countfield option will rename the count column to status_code_count2.

By default, which role contains the minimum permissions required to have write access to Splunk alerts?

A.
User
A.
User
Answers
B.
Alerting
B.
Alerting
Answers
C.
Power
C.
Power
Answers
D.
Admin
D.
Admin
Answers
Suggested answer: C

Explanation:

The Power role contains the minimum permissions required to have write access to Splunk alerts.

The User role can only view alerts created by others, but cannot create or modify them. The Alerting role is not a default role in Splunk, but a custom one that can be created by an administrator. The Admin role has write access to Splunk alerts, but also has many other permissions that are not necessary for alerting3.

In the Search and Reporting app, which is a default selected field?

A.
index
A.
index
Answers
B.
action
B.
action
Answers
C.
_time
C.
_time
Answers
D.
host
D.
host
Answers
Suggested answer: C

Explanation:

In the Search and Reporting app, _time is a default selected field. This means that it is always displayed in the events list and table views, unless explicitly deselected. Other default selected fields are host, source, and sourcetype. Index and action are not default selected fields, but they can be added to the list of selected fields by clicking on All Fields4.

Which of the following is an accurate definition of fields within Splunk?

A.
Inherent entities that exist in event data.
A.
Inherent entities that exist in event data.
Answers
B.
A searchable key/value pair in event data.
B.
A searchable key/value pair in event data.
Answers
C.
Values pulled exclusively from lookup tables.
C.
Values pulled exclusively from lookup tables.
Answers
D.
A non-searchable name/value pair used while indexing data.
D.
A non-searchable name/value pair used while indexing data.
Answers
Suggested answer: A

Explanation:

Fields are searchable key/value pairs in event data. They allow you to specify criteria for your searches and filter out unwanted events. Fields can be extracted automatically by Splunk software during indexing or searching, or manually by users using various methods. Fields are not inherent entities that exist in event data, but rather interpretations of data by Splunk software or users. Fields are not values pulled exclusively from lookup tables, although lookup tables can be used to add fields to events based on existing fields. Fields are not non-searchable name/value pairs used while indexing data, but rather searchable attributes that can be used to refine searches5.

The four types of Lookups that Splunk provides out-of-the-box are External, KV Store, Geospatial and which of the following?

A.
Correlated
A.
Correlated
Answers
B.
File-based
B.
File-based
Answers
C.
Total
C.
Total
Answers
D.
Segmented
D.
Segmented
Answers
Suggested answer: B

Explanation:

The four types of lookups that Splunk provides out-of-the-box are file-based, external, KV Store, and geospatial. File-based lookups use CSV files to map fields from your data to fields in the external table. External lookups use Python scripts or binary executables to populate your events with field values from an external source. KV Store lookups use a key-value store to map fields from your data to fields in the external table. Geospatial lookups use KMZ or KML files to match location coordinates in your events to geographic feature collections1.

When refining search results, what is the difference in the time picker between real-time and relative time ranges?

A.
Real-time searches happen instantly, while relative searches happen at a scheduled time.
A.
Real-time searches happen instantly, while relative searches happen at a scheduled time.
Answers
B.
Real-time searches display results from a rolling time window, while relative searches display results from a set length of time.
B.
Real-time searches display results from a rolling time window, while relative searches display results from a set length of time.
Answers
C.
Real-time searches run constantly in the background, while relative searches only run when certain criteria are met.
C.
Real-time searches run constantly in the background, while relative searches only run when certain criteria are met.
Answers
D.
Real-time represents events that have happened in a set time window, while relative will display results from a rolling time window.
D.
Real-time represents events that have happened in a set time window, while relative will display results from a rolling time window.
Answers
Suggested answer: B

Explanation:

The difference between real-time and relative time ranges in the time picker is that real-time searches display results from a rolling time window, such as the last 15 minutes, while relative searches display results from a set length of time, such as yesterday or last week. Real-time searches do not happen instantly, but rather update periodically based on the refresh interval. Relative searches do not happen at a scheduled time, but rather when the user runs them. Real-time searches do not run constantly in the background, but rather when the user starts them. Real-time searches do not represent events that have happened in a set time window, but rather events that are happening now.

Which of the following is the best description of Splunk Apps?

A.
Built only by Splunk employees.
A.
Built only by Splunk employees.
Answers
B.
A collection of files.
B.
A collection of files.
Answers
C.
Only available for download on Splunkbase.
C.
Only available for download on Splunkbase.
Answers
D.
Available on iOS and Android.
D.
Available on iOS and Android.
Answers
Suggested answer: B

Explanation:

The best description of Splunk Apps is a collection of files that provide specific functionality or views of your data. Splunk Apps can be built by anyone, not only by Splunk employees. Splunk Apps are not only available for download on Splunkbase, but also can be created or customized by users. Splunk Apps are not available on iOS and Android, but rather on Splunk Enterprise or Splunk Cloud platforms.


What is the proper SPL terminology for specifying a particular index in a search?

A.
indexer---index_name
A.
indexer---index_name
Answers
B.
indexer name---index_name
B.
indexer name---index_name
Answers
C.
index=index_name
C.
index=index_name
Answers
D.
index name=index_name
D.
index name=index_name
Answers
Suggested answer: C

Explanation:

This means that you can use the index field to filter your search results by the name of the index that contains the events you want to see.

For example, if you want to search for events in the index named ''gcp_logs'', you can use the following SPL:

index=gcp_logs

You can also specify multiple indexes by using the OR operator, such as:

index=gcp_logs OR index=oswin

Which of the following is the appropriately formatted SPL search?

A.
index=security sourcetype=linux secure (invalid OR failed) | stats count as 'Potential Issues'
A.
index=security sourcetype=linux secure (invalid OR failed) | stats count as 'Potential Issues'
Answers
B.
index=security sourcetype=linux secure (invalid OR failed) | stats as 'Potential Issues'
B.
index=security sourcetype=linux secure (invalid OR failed) | stats as 'Potential Issues'
Answers
C.
index---security sourcetype=linux secure (invalid OR failed) | count stats as 'Potential Issues'
C.
index---security sourcetype=linux secure (invalid OR failed) | count stats as 'Potential Issues'
Answers
D.
index---security sourcetype=linux secure (invalid OR failed) | count as 'Potential Issues'
D.
index---security sourcetype=linux secure (invalid OR failed) | count as 'Potential Issues'
Answers
Suggested answer: A

Explanation:

This is the appropriately formatted SPL search because it follows the SPL syntax rules12, such as:

Using the=operator to specify field-value pairs, such asindex=securityandsourcetype=linux.

Using theORoperator to combine multiple values for the same field, such as(invalid OR failed).

Using the|character to separate commands, such asstats count as 'Potential Issues'.

Using theaskeyword to rename fields, such ascount as 'Potential Issues'.

How are the results of the following search sorted?

... | sort action, ---file, +bytes

A.
In descending order by action, then descending order by file, and lastly by ascending order of bytes.
A.
In descending order by action, then descending order by file, and lastly by ascending order of bytes.
Answers
B.
In ascending order by action, then descending order by file, and lastly by ascending order of bytes.
B.
In ascending order by action, then descending order by file, and lastly by ascending order of bytes.
Answers
C.
In descending order by action if it exists. If not, then in descending order by file, and if both action and file do not exist, by ascending order of bytes.
C.
In descending order by action if it exists. If not, then in descending order by file, and if both action and file do not exist, by ascending order of bytes.
Answers
D.
In ascending order by action if it exists. If not, then in descending order by file, and if both action and file do not exist, by ascending order of bytes.
D.
In ascending order by action if it exists. If not, then in descending order by file, and if both action and file do not exist, by ascending order of bytes.
Answers
Suggested answer: B

Explanation:

Using a minus sign (-) for descending order and a plus sign (+) for ascending order. If no sign is specified, the default order is ascending.

Sorting by multiple fields in the order they are specified. If there are duplicate values in one field, the next field is used to break the tie.

Sorting by field values according to their types. If the field type is not specified, the sort command tries to automatically determine it.

Total 246 questions
Go to page: of 25