Splunk qualification test #1

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/64

flashcard set

Earn XP

Description and Tags

Combo of gdrive quizzes

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

65 Terms

1
New cards

Which of the following searches would return events with failure in index netfw or warn or critical in index netops?

(index=netfw failure) OR (index=netops (warn OR critical))

2
New cards

What is a primary function of a scheduled report?

Auto-generated PDF reports of overall data trends

3
New cards

Clicking a SEGMENT on a chart does what?

Drills down for that value

4
New cards

What is the main requirement for creating visualizations using the Splunk UI?

Your search must transform event data into statistical data tables first

5
New cards

What must be done in order to use a lookup table in Splunk?

The lookup file must be uploaded to Splunk and a lookup definition must be created

6
New cards

When looking at a dashboard panel based on a report, which is true?

You cannot modify the search string in the panel, but you can change and configure the visualization

7
New cards

The stats command will create a _ by default

Table

8
New cards

What happens when a field is added to the Selected Fields list?

The selected field and its corresponding values will appear underneath the events in the search results

9
New cards

How are events displayed after a search is executed?

In reverse chronological order

10
New cards

Which stats command functions provide a count of how many unique values exist for a given field?

dc(field) and distinct-count(field)

11
New cards

Which of the following searches will show the number of categoryID used by each host?

sourcetype=access_* | stats sum(categoryID) by host

12
New cards

Which command is used to validate a lookup file?

| inputlookup products.csv

13
New cards

What type of search can be saved as a report?

Any search can be saved as a report

14
New cards

Can lookups be private for a user?

True

15
New cards

Select the answer that displays the accurate placing of the pipe in a search string

index=security sourcetype=access_* status=200 | stats count by price

16
New cards

By default, how long does Splunk retain a search job?

10 Minutes

17
New cards

Which Boolean operator is implied between search terms?

AND

18
New cards

These users can create global knowledge objects

administrators

19
New cards

What is sourcetype in Splunk?

This is what Splunk uses to categorize the data that is being indexed

20
New cards

When viewing search results, what is an Interesting Field?

A field that appears in at least 20% of the events

21
New cards

Which command enables using lookup fields in a search?

lookup

22
New cards

What is the purpose of using a by clause with the stats command?

To group the results by one or more fields

23
New cards

Which Splunk components are responsible for parsing incoming data and storing data on disc?

indexers

24
New cards

What does the stats command do?

Calculates statistics on data that matches the search criteria

25
New cards

Will -30m@h at 03:35:08 look back to 03:00:00?

Yes

26
New cards

Which is a metadata field assigned to every event in Splunk?

host

27
New cards

When is the pipe character used in search strings?

Before commands. For example: | stats sum(bytes) by host

28
New cards

What is the default lifetime of every Splunk search job?

All search jobs are saved for 10 minutes

29
New cards

Search query for multiple indexes

(index=a OR index=b)

30
New cards

Three different search modes in Splunk

Fast, Smart, and Verbose

31
New cards

Data Summary button information

Sourcetypes, Hosts, and Sources

32
New cards

Main user roles in Splunk

3

33
New cards

Field name number in Fields sidebar

The number of unique values for the field

34
New cards

Most efficient search

index=security "failed password"

35
New cards

Options after selecting timeline

Zoom to selection, Format Timeline, Zoom Out, Deselect

36
New cards

Rare command function

Returns the least common field values of a given field in the results

37
New cards

Search Assistant in SPL editor

Yes

38
New cards

Component responsible for saving data

Indexer

39
New cards

Numeric field indicator in Fields sidebar

A # symbol to the left of the field name

40
New cards

Definition of Splunk

Splunk is a software platform to search, analyze and visualize machine-generated data

41
New cards

Default app for Splunk Enterprise

Searching and Reporting

42
New cards

Three basic components of Splunk

Search Head, Forwarder, and Indexer

43
New cards

Component for writing SPL query

Search head

44
New cards

Licensing meter location

Indexer

45
New cards

Creating an inline panel

When saving a search directly to a dashboard panel instead of saving as a report first

46
New cards

Search job results display

The same events from when the original search was executed

47
New cards

Field for timestamp value at index time

_time

48
New cards

Not a comparison operator in Splunk

?=

49
New cards

Search string for host WWW3

host=WWW3

50
New cards

Difference between != and NOT operators

!= returns results where a field is not equal to a value, while NOT negates an entire condition

51
New cards

Monitor option in Add Data

Both One-time and continuous monitoring

52
New cards

Phase involving data sources being opened

Input Phase

53
New cards

Events segregation in Splunk

Yes

54
New cards

Stopping a search job

Once a search job begins, it can be stopped or paused at any point in time

55
New cards

Median function of stats command

Median(X)

56
New cards

Default WRITE permission for users

False

57
New cards

Time range earliest=-72h@h latest=@d

Look back 72 hours, up to the end of today

58
New cards

Single instance of Splunk managing data

True

59
New cards

Field names case sensitivity

True

60
New cards

Prefix wildcards recommendation

No, they might cause performance issues

61
New cards

Denotation of Splunk internal fields

True

62
New cards

Command to rename a field

| rename action as "Customer Action"

63
New cards

Portal for Splunk apps URL

www.splunkbase.com

64
New cards

Documentation for Splunk URL

docs.splunk.com

65
New cards

Parsing action performed by Splunk

Parses data into individual events, extracts time, and assigns metadata