ExamGecko
Home Home / Splunk / SPLK-1005

Splunk SPLK-1005 Practice Test - Questions Answers, Page 7

Question list
Search
Search

Which of the following is a valid monitor stanza for inputs.conf?

A.

[monitor:///var/log/*.log] index = linux sourcetype = access_combined host = 489307057

A.

[monitor:///var/log/*.log] index = linux sourcetype = access_combined host = 489307057

Answers
B.

[monitor:\\\var\log\httpd-[0-9].log] index = linux sourcetype = access_combined host = 489307057

B.

[monitor:\\\var\log\httpd-[0-9].log] index = linux sourcetype = access_combined host = 489307057

Answers
C.

[monitor:///var/log/httpd-[0-9].log] index = linux sourcetype = access_combined host = 489307057

C.

[monitor:///var/log/httpd-[0-9].log] index = linux sourcetype = access_combined host = 489307057

Answers
D.

[monitor:\\\var\log\*.log] index = linux sourcetype = access_combined host = 489307057

D.

[monitor:\\\var\log\*.log] index = linux sourcetype = access_combined host = 489307057

Answers
Suggested answer: C

Explanation:

[monitor:///var/log/httpd-[0-9].log] is a valid path and syntax for inputs.conf to monitor files ending in .log under /var/log, with other correct index, sourcetype, and host settings specified. [Reference: Splunk Docs on monitor stanzas]

What is the default port for sending data via HTTP Event Collector to Splunk Cloud?

A.

443

A.

443

Answers
B.

8088

B.

8088

Answers
C.

9997

C.

9997

Answers
D.

8000

D.

8000

Answers
Suggested answer: B

Explanation:

The default port for HTTP Event Collector (HEC) in Splunk Cloud is 8088, which is used for data ingestion via HEC. [Reference: Splunk Docs on HTTP Event Collector settings]

In Splunk Cloud, which of the following statements regarding REST API is true?

A.

REST API and Splunk HEC are on the same port.

A.

REST API and Splunk HEC are on the same port.

Answers
B.

All REST API endpoints are open and available by default.

B.

All REST API endpoints are open and available by default.

Answers
C.

REST API is not available in Splunk Cloud.

C.

REST API is not available in Splunk Cloud.

Answers
D.

A subset of REST API endpoints are enabled for customers to manage Splunk.

D.

A subset of REST API endpoints are enabled for customers to manage Splunk.

Answers
Suggested answer: D

Explanation:

Splunk Cloud enables only a subset of REST API endpoints for customer use to ensure security and control over the environment, allowing essential functionality while maintaining a secure setup. [Reference: Splunk Docs on REST API access in Splunk Cloud]


Which configuration shown is used to enable a forwarder as a deployment client of the server 10.1.2.3?

A.

[target-broker:deploymentServer] targetUri = 10.1.2.3:9997

A.

[target-broker:deploymentServer] targetUri = 10.1.2.3:9997

Answers
B.

[target-broker:deploymentserver] targetUri = 10.1.2.3:8089

B.

[target-broker:deploymentserver] targetUri = 10.1.2.3:8089

Answers
C.

[target-broker:deploymentserver] deploymentserver = 10.1.2.3:9997

C.

[target-broker:deploymentserver] deploymentserver = 10.1.2.3:9997

Answers
D.

[target-broker:deploymentserver] deploymentserver = 10.1.2.3:8089

D.

[target-broker:deploymentserver] deploymentserver = 10.1.2.3:8089

Answers
Suggested answer: B

Explanation:

For setting up a deployment client, the correct stanza syntax in inputs.conf includes specifying targetUri with the port 8089, which is the management port for Splunk instances, not the data port 9997. [Reference: Splunk Docs on deployment server configurations]

Which of the following would always require raising a support ticket?

A.

Capacity or configuration changes in Splunk Cloud.

A.

Capacity or configuration changes in Splunk Cloud.

Answers
B.

Search does not return expected results in Splunk Cloud.

B.

Search does not return expected results in Splunk Cloud.

Answers
C.

A user is unable to log into Splunk Cloud.

C.

A user is unable to log into Splunk Cloud.

Answers
D.

Data is not indexed in Splunk Cloud.

D.

Data is not indexed in Splunk Cloud.

Answers
Suggested answer: A

Explanation:

Any modifications in capacity or configurations within Splunk Cloud require an official support ticket, as they are managed by Splunk Cloud support teams to ensure consistent and secure changes. [Reference: Splunk Docs on Splunk Cloud support requests]

How is the forwarder configuration app for Splunk Cloud obtained?

A.

Use the wget URL presented when an sc_admin user logs in for the first time.

A.

Use the wget URL presented when an sc_admin user logs in for the first time.

Answers
B.

Download from the email sent to the person listed in the SHIP TO: field when the customer licensed Splunk Cloud.

B.

Download from the email sent to the person listed in the SHIP TO: field when the customer licensed Splunk Cloud.

Answers
C.

Download from the Splunk Cloud UI under the Universal Forwarder app.

C.

Download from the Splunk Cloud UI under the Universal Forwarder app.

Answers
D.

Download from Splunkbase using splunk.com credentials.

D.

Download from Splunkbase using splunk.com credentials.

Answers
Suggested answer: C

Explanation:

The forwarder configuration app can be accessed directly through the Splunk Cloud UI in the Universal Forwarder app, which simplifies the deployment process by allowing secure, direct download from the cloud instance. [Reference: Splunk Docs on forwarder setup for Splunk Cloud]

What is the name of the Splunk index that contains the most valuable information for troubleshooting a Splunk issue?

A.

_internal

A.

_internal

Answers
B.

lastchanceindex

B.

lastchanceindex

Answers
C.

_monitoring

C.

_monitoring

Answers
D.

defaultdb

D.

defaultdb

Answers
Suggested answer: A

Explanation:

The _internal index stores logs that are valuable for troubleshooting, including information about system operations, indexers, and search head logs. This index provides insights necessary to diagnose many common issues. [Reference: Splunk Docs on indexes]

A log file is being ingested into Splunk, and a few events have no date stamp. How would Splunk first try to determine the missing date of the events?

A.

Splunk will take the date of a previous event within the log file.

A.

Splunk will take the date of a previous event within the log file.

Answers
B.

Splunk will use the current system time of the Indexer for the date.

B.

Splunk will use the current system time of the Indexer for the date.

Answers
C.

Splunk will use the date of when the file monitor was created.

C.

Splunk will use the date of when the file monitor was created.

Answers
D.

Splunk will take the date from the file modification time.

D.

Splunk will take the date from the file modification time.

Answers
Suggested answer: D

Explanation:

When events lack a timestamp, Splunk defaults to using the file modification time, which is accessible metadata for parsing time information if no timestamp is present in the log entry. [Reference: Splunk Docs on timestamp recognition]

Which of the following are default Splunk Cloud user roles?

A.

must_delete, power, sc_admin

A.

must_delete, power, sc_admin

Answers
B.

power, user, admin

B.

power, user, admin

Answers
C.

apps, power, sc_admin

C.

apps, power, sc_admin

Answers
D.

can delete, users, admin

D.

can delete, users, admin

Answers
Suggested answer: B

Explanation:

Default Splunk Cloud roles include power, user, and admin, each with unique permissions suitable for common operational and administrative functions. [Reference: Splunk Docs on user roles in Splunk Cloud]

A customer has worked with their LDAP administrator to configure an LDAP strategy in Splunk. The configuration works, and user Mia can log into Splunk using her LDAP Account. After some time, the Splunk Cloud administrator needs to move Mia from the user role to the power role. How should they accomplish this?

A.

Ask the LDAP administrator to move Mia's account to an appropriately mapped LDAP group.

A.

Ask the LDAP administrator to move Mia's account to an appropriately mapped LDAP group.

Answers
B.

Have Mia log into Splunk, then update her own role in user settings.

B.

Have Mia log into Splunk, then update her own role in user settings.

Answers
C.

Create a role named Power in Splunk, then map Mia's account to that role.

C.

Create a role named Power in Splunk, then map Mia's account to that role.

Answers
D.

Use the Cloud Monitoring Console app as an administrator to map Mia's account to the power role.

D.

Use the Cloud Monitoring Console app as an administrator to map Mia's account to the power role.

Answers
Suggested answer: A

Explanation:

In Splunk Cloud, role-based access controls are managed by mapping LDAP groups to Splunk roles. Therefore, any change in roles should be managed by the LDAP administrator, who can adjust Mia's group to an LDAP group mapped to the power role. [Reference: Splunk Docs on LDAP integration in Splunk Cloud]

Total 80 questions
Go to page: of 8