Uploaded by yaru sun

Excellent Splunk SPLK-1002 Dumps (V14.02) to Obtain 100% Achievement - DumpsBase

advertisement
DUMPS
BASE
EXAM DUMPS
SPLUNK
SPLK-1002
28% OFF Automatically For You
Splunk Core Certified Power User
-D
um
ps
B
as
e
1.Which of the following Statements about macros is true? (select all that apply)
A. Arguments are defined at execution time.
B. Arguments are defined when the macro is created.
C. Argument values are used to resolve the search string at execution time.
D. Argument values are used to resolve the search string when the macro is created.
Answer: B, C
Explanation:
A macro is a way to save a commonly used search string as a variable that you can
reuse in other searches1. When you create a macro, you can define arguments that
are placeholders for values that you specify at execution time1. The argument values
are used to resolve the search string when the macro is invoked, not when it is
created1. Therefore, statements B and C are true, while statements A and D are
false.
nk
S
P
LK
-1
00
2
D
um
ps
(V
14
.0
2)
to
O
bt
ai
n
10
0%
A
ch
ie
ve
m
en
t
2.What is required for a macro to accept three arguments?
A. The macro's name ends with (3).
B. The macro's name starts with (3).
C. The macro's argument count setting is 3 or more.
D. Nothing, all macros can accept any number of arguments.
Answer: A
Explanation:
To create a macro that accepts arguments, you must include the number of
arguments in parentheses at the end of the macro name1. For example, my_macro(3)
is a macro that accepts three arguments. The number of arguments in the macro
name must match the number of arguments in the definition1. Therefore, option A is
correct, while options B, C and D are incorrect.
E
xc
el
le
nt
S
pl
u
3.Which of the following statements describes POST workflow actions?
A. POST workflow actions are always encrypted.
B. POST workflow actions cannot use field values in their URI.
C. POST workflow actions cannot be created on custom sourcetypes.
D. POST workflow actions can open a web page in either the same window or a new.
Answer: D
Explanation:
A workflow action is a link that appears when you click an event field value in your
search results1. A workflow action can open a web page or run another search based
on the field value1. There are two types of workflow actions: GET and POST1. A GET
workflow action appends the field value to the end of a URI and opens it in a web
browser1. A POST workflow action sends the field value as part of an HTTP request
to a web server1. You can configure a workflow action to open a web page in either
the same window or a new window1. Therefore, option D is correct, while options A, B
and C are incorrect.
(V
14
.0
2)
to
O
bt
ai
n
10
0%
A
ch
ie
ve
m
en
t
-D
um
ps
B
as
e
4.Which of the following searches show a valid use of macro? (Select all that apply)
A. index=main source=mySource oldField=* |'makeMyField(oldField)'| table _time
newField
B. index=main source=mySource oldField=* | stats if('makeMyField(oldField)') | table
_time newField
C. index=main source=mySource oldField=* | eval newField='makeMyField(oldField)'|
table _time newField
D. index=main source=mySource oldField=* | "'newField('makeMyField(oldField)')'" |
table _time newField
Answer: A, C
Explanation:
Reference: https://answers.splunk.com/answers/574643/field-showing-an-additionaland-not-visible-value-1.html
To use a macro in a search, you must enclose the macro name and any arguments in
single quotation marks1. For example, 'my_macro(arg1,arg2)' is a valid way to use a
macro with two arguments. You can use macros anywhere in your search string
where you would normally use a search command or expression1. Therefore, options
A and C are valid searches that use macros, while options B and D are invalid
because they do not enclose the macros in single quotation marks.
E
xc
el
le
nt
S
pl
u
nk
S
P
LK
-1
00
2
D
um
ps
5.Which of the following workflow actions can be executed from search results?
(select all that apply)
A. GET
B. POST
C. LOOKUP
D. Search
Answer: A, B, D
Explanation:
As mentioned before, there are two types of workflow actions: GET and POST1. Both
types of workflow actions can be executed from search results by clicking on an event
field value that has a workflow action configured for it1. Another type of workflow
action is Search, which runs another search based on the field value1. Therefore,
options A, B and D are correct, while option C is incorrect because LOOKUP is not a
type of workflow action.
6.Which of the following is the correct way to use the data model command to search
field in the data model within the web dataset?
A. | datamodel web search | filed web *
ps
B
as
e
B. | Search datamodel web web | filed web*
C. | datamodel web web field | search web*
D. Datamodel=web | search web | filed web*
Answer: A
Explanation:
The data model command allows you to run searches on data models that have been
accelerated1. The syntax for using the data model command is | datamodel
<model_name> <dataset_name> [search <search_string>]1. Therefore, option A is
the correct way to use the data model command to search fields in the data model
within the web dataset. Options B and C are incorrect because they do not follow the
syntax for the data model command. Option D is incorrect because it does not use the
data model command at all.
E
xc
el
le
nt
S
pl
u
nk
S
P
LK
-1
00
2
D
um
ps
(V
14
.0
2)
to
O
bt
ai
n
10
0%
A
ch
ie
ve
m
en
t
-D
um
7.Which of the following searches will return events contains a tag name Privileged?
A. Tag= Priv
B. Tag= Pri*
C. Tag= Priv*
D. Tag= Privileged
Answer: B
Explanation:
Reference:
https://docs.splunk.com/Documentation/PCI/4.1.0/Install/PrivilegedUserActivity
A tag is a descriptive label that you can apply to one or more fields or field values in
your events1. You can use tags to simplify your searches by replacing long or
complex field names or values with short and simple tags1. To search for events that
contain a tag name, you can use the tag keyword followed by an equal sign and the
tag name1. You can also use wildcards (*) to match partial tag names1. Therefore,
option B is correct because it will return events that contain a tag name that starts
with Pri. Options A and D are incorrect because they will only return events that
contain an exact tag name match. Option C is incorrect because it will return events
that contain a tag name that starts with Priv, not Privileged.
8.Which of the following statements describes this search?
sourcetype=access_combined I transaction JSESSIONID | timechart avg (duration)
A. This is a valid search and will display a timechart of the average duration, of each
transaction event.
B. This is a valid search and will display a stats table showing the maximum pause
among transactions.
C. No results will be returned because the transaction command must include the
startswith and endswith options.
D. No results will be returned because the transaction command must be the last
ve
m
en
t
-D
um
ps
B
as
e
command used in the search pipeline.
Answer: A
Explanation:
This search uses the transaction command to group events that share a common
value for JSESSIONID into transactions1. The transaction command assigns a
duration field to each transaction, which is the difference between the latest and
earliest timestamps of the events in the transaction1. The search then uses the
timechart command to create a time-series chart of the average duration of each
transaction1. Therefore, option A is correct because it describes the search
accurately. Option B is incorrect because the search does not use the stats command
or the pause field. Option C is incorrect because the transaction command does not
require the startswith and endswith options, although they can be used to specify how
to identify the beginning and end of a transaction1. Option D is incorrect because the
transaction command does not have to be the last command in the search pipeline,
although it is often used near the end of a search1.
E
xc
el
le
nt
S
pl
u
nk
S
P
LK
-1
00
2
D
um
ps
(V
14
.0
2)
to
O
bt
ai
n
10
0%
A
ch
ie
9.Calculated fields can be based on which of the following?
A. Tags
B. Extracted fields
C. Output fields for a lookup
D. Fields generated from a search string
Answer: B
Explanation:
Reference:
https://docs.splunk.com/Documentation/Splunk/8.0.3/Knowledge/definecalcfields
A calculated field is a field that you create based on the value of another field or
fields1. You can use calculated fields to enrich your data with additional information or
to transform your data into a more useful format1. Calculated fields can be based on
extracted fields, which are fields that are extracted from your raw data using various
methods such as regular expressions, delimiters, or key-value pairs1. Therefore,
option B is correct, while options A, C and D are incorrect because tags, output fields
for a lookup, and fields generated from a search string are not types of extracted
fields.
10.Based on the macro definition shown below, what is the correct way to execute the
macro in a search string?
e
as
B
ps
um
-D
t
en
ve
m
ie
ch
A
10
0%
E
xc
el
le
nt
S
pl
u
nk
S
P
LK
-1
00
2
D
um
ps
(V
14
.0
2)
to
O
bt
ai
n
A. Convert_sales (euro, , 79)”
B. Convert_sales (euro, , .79)
C. Convert_sales ($euro,$$,s79$
D. Convert_sales ($euro, $$,S,79$)
Answer: B
Explanation:
Reference:
https://docs.splunk.com/Documentation/Splunk/8.0.3/Knowledge/Usesearchmacros
The correct way to execute the macro in a search string is to use the format
macro_name($arg1$, $arg2$, ...) where $arg1$, $arg2$, etc. are the arguments for
the macro. In this case, the macro name is convert_sales and it takes three
arguments: currency, symbol, and rate. The arguments are enclosed in dollar signs
and separated by commas. Therefore, the correct way to execute the macro is
convert_sales($euro$, $$, .79).
11.When multiple event types with different color values are assigned to the same
event, what determines the color displayed for the events?
A. Rank
B. Weight
C. Priority
D. Precedence
Answer: C
Explanation:
Reference: https://docs.splunk.com/Documentation/SplunkCloud/8.0.2003/Knowledge
/Defineeventtypes When multiple event types with different color values are assigned
to the same event, the color displayed for the events is determined by the priority of
the event types. The priority is a numerical value that indicates how important an
event type is. The higher the priority, the more important the event type. The event
type with the highest priority will determine the color of the event.
nk
S
P
LK
-1
00
2
D
um
ps
(V
14
.0
2)
to
O
bt
ai
n
10
0%
A
ch
ie
ve
m
en
t
-D
um
ps
B
as
e
12.Which of the following statements describes the command below (select all that
apply)
Sourcetype=access_combined | transaction JSESSIONID
A. An additional filed named maxspan is created.
B. An additional field named duration is created.
C. An additional field named eventcount is created.
D. Events with the same JSESSIONID will be grouped together into a single event.
Answer: B, C, D
Explanation:
The command sourcetype=access_combined | transaction JSESSIONID does three
things:
It filters the events by the sourcetype access_combined, which is a predefined
sourcetype for Apache web server logs.
It groups the events by the field JSESSIONID, which is a unique identifier for each
user session.
It creates a single event from each group of events that share the same JSESSIONID
value. This single event will have some additional fields created by the transaction
command, such as duration, eventcount, and startime.
Therefore, the statements B, C, and D are true.
E
xc
el
le
nt
S
pl
u
13.Which of the following can be used with the eval command tostring function (select
all that apply)
A. ‘’hex’’
B. ‘’commas’’
C. ‘’Decimal’’
D. ‘’duration’’
Answer: A, B, D
Explanation:
https://docs.splunk.com/Documentation/Splunk/8.1.0/SearchReference/ConversionFu
nctions#tostri ng.28X.2CY.29
The tostring function in the eval command converts a numeric value to a string value.
It can take an optional second argument that specifies the format of the string value.
Some of the possible formats are:
hex: converts the numeric value to a hexadecimal string.
commas: adds commas to separate thousands in the numeric value.
duration: converts the numeric value to a human-readable duration string, such as
“2h 3m 4s”.
Therefore, the formats A, B, and D can be used with the tostring function.
.0
2)
to
O
bt
ai
n
10
0%
A
ch
ie
ve
m
en
t
-D
um
ps
B
as
e
14.Which of the following statements about tags is true?
A. Tags are case insensitive.
B. Tags are created at index time.
C. Tags can make your data more understandable.
D. Tags are searched by using the syntax tag:: <fieldneme>
Answer: C
Explanation:
Tags are aliases or alternative names for field values in Splunk. They can make your
data more understandable by using common or descriptive terms instead of cryptic or
technical terms. For example, you can tag a field value such as “200” with “OK” or
“success” to indicate that it is a HTTP status code for a successful request. Tags are
case sensitive, meaning that “OK” and “ok” are different tags. Tags are created at
search time, meaning that they are applied when you run a search on your data. Tags
are searched by using the syntax tag::<tagname>, where <tagname> is the name of
the tag you want to search for.
E
xc
el
le
nt
S
pl
u
nk
S
P
LK
-1
00
2
D
um
ps
(V
14
15.Which of the following statements about data models and pivot are true? (select all
that apply)
A. They are both knowledge objects.
B. Data models are created out of datasets called pivots.
C. Pivot requires users to input SPL searches on data models.
D. Pivot allows the creation of data visualizations that present different aspects of a
data model.
Answer: D
Explanation:
Data models and pivot are both knowledge objects in Splunk that allow you to analyze
and visualize your data in different ways. Data models are collections of datasets that
represent your data in a structured and hierarchical way. Data models define how
your data is organized into objects and fields. Pivot is a user interface that allows you
to create data visualizations that present different aspects of a data model. Pivot does
not require users to input SPL searches on data models, but rather lets them select
options from menus and forms. Data models are not created out of datasets called
pivots, but rather pivots are created from datasets in data models.
16.When using the Field Extractor (FX), which of the following delimiters will work?
bt
ai
n
10
0%
A
ch
ie
ve
m
en
t
-D
um
ps
B
as
e
(select all that apply)
A. Tabs
B. Pipes
C. Colons
D. Spaces
Answer: A, B, D
Explanation:
Reference:
https://docs.splunk.com/Documentation/Splunk/8.0.3/Knowledge/FXSelectMethodste
p https://community.splunk.com/t5/Splunk-Search/Field-Extraction-Separate-onColon/m-p/29751
The Field Extractor (FX) is a tool that helps you extract fields from your data using
delimiters or regular expressions. Delimiters are characters or strings that separate
fields in your data.
Some of the delimiters that will work with FX are:
Tabs: horizontal spaces that align text in columns.
Pipes: vertical bars that often indicate logical OR operations.
Spaces: blank characters that separate words or symbols.
Therefore, the delimiters A, B, and D will work with FX.
E
xc
el
le
nt
S
pl
u
nk
S
P
LK
-1
00
2
D
um
ps
(V
14
.0
2)
to
O
17.Which of the following describes the Splunk Common Information Model (CIM) addon?
A. The CIM add-on uses machine learning to normalize data.
B. The CIM add-on contains dashboards that show how to map data.
C. The CIM add-on contains data models to help you normalize data.
D. The CIM add-on is automatically installed in a Splunk environment.
Answer: C
Explanation:
The Splunk Common Information Model (CIM) add-on is a Splunk app that contains
data models to help you normalize data from different sources and formats. The CIM
add-on defines a common and consistent way of naming and categorizing fields and
events in Splunk. This makes it easier to correlate and analyze data across different
domains, such as network, security, web, etc. The CIM add-on does not use machine
learning to normalize data, but rather relies on predefined field names and values.
The CIM add-on does not contain dashboards that show how to map data, but rather
provides documentation and examples on how to use the data models. The CIM addon is not automatically installed in a Splunk environment, but rather needs to be
downloaded and installed from Splunkbase.
18.What does the transaction command do?
A. Groups a set of transactions based on time.
ve
m
en
t
-D
um
ps
B
as
e
B. Creates a single event from a group of events.
C. Separates two events based on one or more values.
D. Returns the number of credit card transactions found in the event logs.
Answer: B
Explanation:
The transaction command is a search command that creates a single event from a
group of events that share some common characteristics. The transaction command
can group events based on fields, time, or both. The transaction command can also
create some additional fields for each transaction, such as duration, eventcount,
startime, etc. The transaction command does not group a set of transactions based
on time, but rather groups a set of events into a transaction based on time. The
transaction command does not separate two events based on one or more values,
but rather joins multiple events based on one or more values. The transaction
command does not return the number of credit card transactions found in the event
logs, but rather creates transactions from the events that match the search criteria.
E
xc
el
le
nt
S
pl
u
nk
S
P
LK
-1
00
2
D
um
ps
(V
14
.0
2)
to
O
bt
ai
n
10
0%
A
ch
ie
19.Which of the following statements describe data model acceleration? (select all
that apply)
A. Root events cannot be accelerated.
B. Accelerated data models cannot be edited.
C. Private data models cannot be accelerated.
D. You must have administrative permissions or the accelerate_dacamodel capability
to accelerate a data model.
Answer: B, C, D
Explanation:
Data model acceleration is a feature that speeds up searches on data models by
creating and storing summaries of the data model datasets1. To enable data model
acceleration, you must have administrative permissions or the accelerate_datamodel
capability1. Therefore, option D is correct. Accelerated data models cannot be edited
unless you disable the acceleration first1. Therefore, option B is correct. Private data
models cannot be accelerated because they are not visible to other users1.
Therefore, option C is correct. Root events can be accelerated as long as they are not
based on a search string1. Therefore, option A is incorrect.
20.A user wants to convert numeric field values to strings and also to sort on those
values.
Which command should be used first, the eval or the sort?
A. It doesn't matter whether eval or sort is used first.
B. Convert the numeric to a string with eval first, then sort.
C. Use sort first, then convert the numeric to a string with eval.
D. You cannot use the sort command and the eval command on the same field.
Answer: C
Explanation:
The eval command is used to create new fields or modify existing fields based on an
expression2. The sort command is used to sort the results by one or more fields in
ascending or descending order2. If you want to convert numeric field values to strings
and also sort on those values, you should use the sort command first, then use the
eval command to convert the values to strings2. This way, the sort command will use
the original numeric values for sorting, rather than the converted string values which
may not sort correctly. Therefore, option C is correct, while options A, B and D are
incorrect.
E
xc
el
le
nt
S
pl
u
nk
S
P
LK
-1
00
2
D
um
ps
(V
14
.0
2)
to
O
bt
ai
n
10
0%
A
ch
ie
ve
m
en
t
-D
um
ps
B
as
e
21.The Field Extractor (FX) is used to extract a custom field. A report can be created
using this custom field. The created report can then be shared with other people in
the organization.
If another person in the organization runs the shared report and no results are
returned, why might this be? (select all that apply)
A. Fast mode is enabled.
B. The dashboard is private.
C. The extraction is privateD. The person in the organization running the report does not have access to the
index.
Answer: C, D
Explanation:
The Field Extractor (FX) is a tool that helps you extract fields from your events using a
graphical interface2. You can create a report using a custom field extracted by the FX
and share it with other users in your organization2. However, if another user runs the
shared report and no results are returned, there could be two possible reasons. One
reason is that the extraction is private, which means that only you can see and use
the extracted field2. To make the extraction available to other users, you need to
make it global or app-level2. Therefore, option C is correct. Another reason is that the
other user does not have access to the index where the events are stored2. To fix this
issue, you need to grant the appropriate permissions to the other user for the index2.
Therefore, option D is correct. Options A and B are incorrect because they are not
related to the field extraction or the report.
22.Which of the following data model are included In the Splunk Common Information
Model (CIM) add-on? (select all that apply)
A. Alerts
B. Email
C. Database
D. User permissions
Answer: A, B, C
Explanation:
Reference: https://docs.splunk.com/Documentation/CIM/4.15.0/User/Overview
The Splunk Common Information Model (CIM) add-on is a collection of pre-built data
models and knowledge objects that help you normalize your data from different
sources and make it easier to analyze and report on it3. The CIM add-on includes
several data models that cover various domains such as Alerts, Email, Database,
Network Traffic, Web and more3. Therefore, options A, B and C are correct because
they are names of some of the data models included in the CIM add-on. Option D is
incorrect because User permissions is not a name of a data model in the CIM add-on.
E
xc
el
le
nt
S
pl
u
nk
S
P
LK
-1
00
2
D
um
ps
(V
14
.0
2)
to
O
bt
ai
n
10
0%
A
ch
ie
ve
m
en
t
-D
um
ps
B
as
e
23.A field alias has been created based on an original field. A search without any
transforming commands is then executed in Smart Mode.
Which field name appears in the results?
A. Both will appear in the All Fields list, but only if the alias is specified in the search.
B. Both will appear in the Interesting Fields list, but only if they appear in at least 20
percent of events.
C. The original field only appears in All Fields list and the alias only appears in the
Interesting Fields list.
D. The alias only appears in the All Fields list and the original field only appears in the
Interesting Fields list.
Answer: B
Explanation:
A field alias is a way to assign an alternative name to an existing field without
changing the original field name or value2. You can use field aliases to make your
field names more consistent or descriptive across different sources or sourcetypes2.
When you run a search without any transforming commands in Smart Mode, Splunk
automatically identifies and displays interesting fields in your results2. Interesting
fields are fields that appear in at least 20 percent of events or have high variability
among values2. If you have created a field alias based on an original field, both the
original field name and the alias name will appear in the Interesting Fields list if they
meet these criteria2. However, only one of them will appear in each event depending
on which one you have specified in your search string2. Therefore, option B is correct,
while options A, C and D are incorrect.
24.When performing a regular expression (regex) field extraction using the Field
Extractor (FX), what happens when the require option is used?
A. The regex can no longer be edited.
B. The field being extracted will be required for all future events.
C. The events without the required field will not display in searches.
D. Only events with the required string will be included in the extraction.
Answer: D
Explanation:
The Field Extractor (FX) allows you to use regular expressions (regex) to extract
fields from your events using a graphical interface or by manually editing the regex2.
When you use the FX to perform a regex field extraction, you can use the require
option to specify a string that must be present in an event for it to be included in the
extraction2. This way, you can filter out events that do not contain the required string
and focus on the events that are relevant for your extraction2. Therefore, option D is
correct, while options A, B and C are incorrect.
nk
S
P
LK
-1
00
2
D
um
ps
(V
14
.0
2)
to
O
bt
ai
n
10
0%
A
ch
ie
ve
m
en
t
-D
um
ps
B
as
e
25.Which group of users would most likely use pivots?
A. Users
B. Architects
C. Administrators
D. Knowledge Managers
Answer: A
Explanation:
Reference:
https://docs.splunk.com/Documentation/Splunk/8.0.3/Pivot/IntroductiontoPivot
A pivot is a tool that allows you to create reports and dashboards using data models
without writing any SPL commands2. You can use pivots to explore, filter, split and
visualize your data using a graphical interface2. Pivots are designed for users who
want to analyze and report on their data without having to learn the SPL syntax or the
underlying structure of the data2. Therefore, option A is correct, while options B, C
and D are incorrect because they are not the typical group of users who would use
pivots.
E
xc
el
le
nt
S
pl
u
26.When using timechart, how many fields can be listed after a by clause?
A. because timechart doesn't support using a by clause.
B. because _time is already implied as the x-axis.
C. because one field would represent the x-axis and the other would represent the yaxis.
D. There is no limit specific to timechart.
Answer: B
Explanation:
The timechart command is used to create a time-series chart of statistical values
based on your search results2. You can use the timechart command with a by clause
to split the results by one or more fields and create multiple series in the chart2.
However, you can only list one field after the by clause when using the timechart
command because _time is already implied as the x-axis of the chart2. Therefore,
option B is correct, while options A, C and D are incorrect.
to
O
bt
ai
n
10
0%
A
ch
ie
ve
m
en
t
-D
um
ps
B
as
e
27.What is the correct syntax to search for a tag associated with a value on a specific
fields?
A. Tag-<field?
B. Tag<filed(tagname.)
C. Tag=<filed>::<tagname>
D. Tag::<filed>=<tagname>
Answer: D
Explanation:
Reference: https://docs.splunk.com/Documentation/Splunk/8.0.3/Knowledge/Taganda
liasfieldvaluesinSplunkW eb
A tag is a descriptive label that you can apply to one or more fields or field values in
your events2. You can use tags to simplify your searches by replacing long or
complex field names or values with short and simple tags2. To search for a tag
associated with a value on a specific field, you can use the following syntax:
tag::<field>=<tagname>2. For example, tag::status=error will search for events where
the status field has a tag named error. Therefore, option D is correct, while options A,
B and C are incorrect because they do not follow the correct syntax for searching
tags.
E
xc
el
le
nt
S
pl
u
nk
S
P
LK
-1
00
2
D
um
ps
(V
14
.0
2)
28.What functionality does the Splunk Common Information Model (CIM) rely on to
normalize fields with different names?
A. Macros.
B. Field aliases.
C. The rename command.
D. CIM does not work with different names for the same field.
Answer: B
Explanation:
The Splunk Common Information Model (CIM) add-on helps you normalize your data
from different sources and make it easier to analyze and report on it3. One of the
functionalities that the CIM add-on relies on to normalize fields with different names is
field aliases3. Field aliases allow you to assign an alternative name to an existing field
without changing the original field name or value2. By using field aliases, you can
map different field names from different sources or sourcetypes to a common field
name that conforms to the CIM standard3. Therefore, option B is correct, while
options A, C and D are incorrect.
29.When should you use the transaction command instead of the scats command?
A. When you need to group on multiple values.
B. When duration is irrelevant in search results..
-D
um
ps
B
as
e
C. When you have over 1000 events in a transaction.
D. When you need to group based on start and end constraints.
Answer: D
Explanation:
The transaction command is used to group events into transactions based on some
common characteristics, such as fields, time, or both. The transaction command can
also specify start and end constraints for the transactions, such as a field value that
indicates the beginning or the end of a transaction. The stats command is used to
calculate summary statistics on the events, such as count, sum, average, etc. The
stats command cannot group events based on start and end constraints, but only on
fields or time buckets. Therefore, the transaction command should be used instead of
the stats command when you need to group events based on start and end
constraints.
E
xc
el
le
nt
S
pl
u
nk
S
P
LK
-1
00
2
D
um
ps
(V
14
.0
2)
to
O
bt
ai
n
10
0%
A
ch
ie
ve
m
en
t
30.Which of the following statements describes field aliases?
A. Field alias names replace the original field name.
B. Field aliases can be used in lookup file definitions.
C. Field aliases only normalize data across sources and sourcetypes.
D. Field alias names are not case sensitive when used as part of a search.
Answer: B
Explanation:
Field aliases are alternative names for fields in Splunk. Field aliases can be used to
normalize data across different sources and sourcetypes that have different field
names for the same concept. For example, you can create a field alias for src_ip that
maps to clientip, source_address, or any other field name that represents the source
IP address in different sourcetypes. Field aliases can also be used in lookup file
definitions to map fields in your data to fields in the lookup file. For example, you can
use a field alias for src_ip to map it to ip_address in a lookup file that contains
geolocation information for IP addresses. Field alias names do not replace the original
field name, but rather create a copy of the field with a different name. Field alias
names are case sensitive when used as part of a search, meaning that src_ip and
SRC_IP are different fields.
31.What does the following search do?
A. Creates a table of the total count of users and split by corndogs.
B. Creates a table of the total count of mysterymeat corndogs split by user.
C. Creates a table with the count of all types of corndogs eaten split by user.
D. Creates a table that groups the total number of users by vegetarian corndogs.
as
e
Answer: B
Explanation:
The search string below creates a table of the total count of mysterymeat corndogs
split by user. | stats count by user | where corndog=mysterymeat.
The search string does the following:
It uses the stats command to calculate the count of events for each value of the user
field. The stats command creates a table with two columns: user and count.
It uses the where command to filter the results by the value of the corndog field. The
where command only keeps the rows where corndog equals mysterymeat.
Therefore, the search string creates a table of the total count of mysterymeat
corndogs split by user.
E
xc
el
le
nt
S
pl
u
nk
S
P
LK
-1
00
2
D
um
ps
(V
14
.0
2)
to
O
bt
ai
n
10
0%
A
ch
ie
ve
m
en
t
-D
um
ps
B
32.Which of the following statements describes Search workflow actions?
A. By default. Search workflow actions will run as a real-time search.
B. Search workflow actions can be configured as scheduled searches,
C. The user can define the time range of the search when created the workflow
action.
D. Search workflow actions cannot be configured with a search string that includes
the transaction command
Answer: C
Explanation:
Search workflow actions are custom actions that run a search when you click on a
field value in your search results. Search workflow actions can be configured with
various options, such as label name, search string, time range, app context, etc. One
of the options is to define the time range of the search when creating the workflow
action. You can choose from predefined time ranges, such as Last 24 hours, Last 7
days, etc., or specify a custom time range using relative or absolute time modifiers.
Search workflow actions do not run as real-time searches by default, but rather use
the same time range as the original search unless specified otherwise. Search
workflow actions cannot be configured as scheduled searches, as they are only
triggered by user interaction. Search workflow actions can be configured with any
valid search string that includes any search command, such as transaction.
33.What do events in a transaction have In common?
A. All events In a transaction must have the same timestamp.
B. All events in a transaction must have the same sourcetype.
C. All events in a transaction must have the exact same set of fields.
D. All events in a transaction must be related by one or more fields.
Answer: D
Explanation:
Reference:
https://docs.splunk.com/Documentation/Splunk/8.0.3/Knowledge/Abouttransactions
A transaction is a group of events that share some common characteristics, such as
fields, time, or both. A transaction can be created by using the transaction command
or by defining an event type with transactiontype=true in props.conf. Events in a
transaction have one or more fields in common that relate them to each other. For
example, you can create a transaction based on JSESSIONID, which is a unique
identifier for each user session in web logs. Events in a transaction do not have to
have the same timestamp, sourcetype, or exact same set of fields. They only have to
share one or more fields that define the transaction.
E
xc
el
le
nt
S
pl
u
nk
S
P
LK
-1
00
2
D
um
ps
(V
14
.0
2)
to
O
bt
ai
n
10
0%
A
ch
ie
ve
m
en
t
-D
um
ps
B
as
e
34.Which of the following statements describe GET workflow actions?
A. GET workflow actions must be configured with POST arguments.
B. Configuration of GET workflow actions includes choosing a sourcetype.
C. Label names for GET workflow actions must include a field name surrounded by
dollar signs.
D. GET workflow actions can be configured to open the URT link in the current
window or in a new window
Answer: D
Explanation:
GET workflow actions are custom actions that open a URL link when you click on a
field value in your search results. GET workflow actions can be configured with
various options, such as label name, base URL, URI parameters, app context, etc.
One of the options is to choose whether to open the URL link in the current window or
in a new window. GET workflow actions do not have to be configured with POST
arguments, as they use GET method to send requests to web servers. Configuration
of GET workflow actions does not include choosing a sourcetype, as they do not
generate any data in Splunk. Label names for GET workflow actions must include a
field name surrounded by dollar signs, as this indicates the field value that will be
used to replace the variable in the URL link.
35.Data model are composed of one or more of which of the following datasets?
(Select all that apply.)
A. Events datasets
B. Search datasets
C. Transaction datasets
D. Any child of event, transaction, and search datasets
Answer: A, B, C
Explanation:
Reference:
https://docs.splunk.com/Documentation/Splunk/8.0.3/Knowledge/Aboutdatamodels
Data models are collections of datasets that represent your data in a structured and
ps
B
as
e
hierarchical way. Data models define how your data is organized into objects and
fields.
Data models can be composed of one or more of the following datasets:
Events datasets: These are the base datasets that represent raw events in Splunk.
Events datasets can be filtered by constraints, such as search terms, sourcetypes,
indexes, etc.
Search datasets: These are derived datasets that represent the results of a search on
events or other datasets. Search datasets can use any search command, such as
stats, eval, rex, etc., to transform the data.
Transaction datasets: These are derived datasets that represent groups of events that
are related by fields, time, or both. Transaction datasets can use the transaction
command or event types with transaction type=true to create transactions.
E
xc
el
le
nt
S
pl
u
nk
S
P
LK
-1
00
2
D
um
ps
(V
14
.0
2)
to
O
bt
ai
n
10
0%
A
ch
ie
ve
m
en
t
-D
um
36.Which are valid ways to create an event type? (select all that apply)
A. By using the searchtypes command in the search bar.
B. By editing the event_type stanza in the props.conf file.
C. By going to the Settings menu and clicking Event Types > New.
D. By selecting an event in search results and clicking Event Actions > Build Event
Type.
Answer: C, D
Explanation:
Event types are custom categories of events that are based on search criteria. Event
types can be used to label events with meaningful names, such as error, success,
login, logout, etc. Event types can also be used to create transactions, alerts, reports,
dashboards, etc. Event types can be created in two ways:
By going to the Settings menu and clicking Event Types > New. This will open a form
where you can enter the name, description, search string, app context, and tags for
the event type.
By selecting an event in search results and clicking Event Actions > Build Event Type.
This will open a dialog box where you can enter the name and description for the
event type. The search string will be automatically populated based on the selected
event.
Event types cannot be created by using the searchtypes command in the search bar,
as this command does not exist in Splunk. Event types can also be created by editing
the event_type stanza in the transforms.conf file, not the props.conf file.
37.Which of the following statements describe the search string below?
| datamodel Application_State All_Application_State search
A. Evenrches would return a report of sales by state.
B. Events will be returned from the data model named Application_State.
C. Events will be returned from the data model named All_Application_state.
bt
ai
n
10
0%
A
ch
ie
ve
m
en
t
-D
um
ps
B
as
e
D. No events will be returned because the pipe should occur after the datamodel
command
Answer: B
Explanation:
The search string below returns events from the data model named
Application_State.
| datamodel Application_State All_Application_State search
The search string does the following:
It uses the datamodel command to access a data model in Splunk. The datamodel
command takes two arguments: the name of the data model and the name of the
dataset within the data model. It specifies the name of the data model as
Application_State. This is a predefined data model in Splunk that contains information
about web applications.
It specifies the name of the dataset as All_Application_State. This is a root dataset in
the data model that contains all events from all child datasets.
It uses the search command to filter and transform the events from the dataset. The
search command can use any search criteria or command to modify the results.
Therefore, the search string returns events from the data model named
Application_State.
E
xc
el
le
nt
S
pl
u
nk
S
P
LK
-1
00
2
D
um
ps
(V
14
.0
2)
to
O
38.What is the relationship between data models and pivots?
A. Data models provide the datasets for pivots.
B. Pivots and data models have no relationship.
C. Pivots and data models are the same thing.
D. Pivots provide the datasets for data models.
Answer: A
Explanation:
The relationship between data models and pivots is that data models provide the
datasets for pivots. Data models are collections of datasets that represent your data
in a structured and hierarchical way. Data models define how your data is organized
into objects and fields. Pivots are user interfaces that allow you to create data
visualizations that present different aspects of a data model. Pivots let you select
options from menus and forms to create charts, tables, maps, etc., without writing any
SPL code. Pivots use datasets from data models as their source of data. Pivots and
data models are not the same thing, as pivots are tools for visualizing data models.
Pivots do not provide datasets for data models, but rather use them as inputs.
Therefore, only statement A is true about the relationship between data models and
pivots.
39.What are the two parts of a root event dataset?
A. Fields and variables.
-D
um
ps
B
as
e
B. Fields and attributes.
C. Constraints and fields.
D. Constraints and lookups.
Answer: C
Explanation:
Reference: https://docs.splunk.com/Documentation/SplunkLight/7.3.5/GettingStarted/
Designdatamodelobjects
A root event dataset is the base dataset for a data model that defines the source or
sources of the data and the constraints and fields that apply to the data1. A root event
dataset has two parts: constraints and fields1. Constraints are filters that limit the data
to a specific index, source, sourcetype, host or search string1. Fields are the
attributes that describe the data and can be extracted, calculated or looked up1.
Therefore, option C is correct, while options A, B and D are incorrect.
E
xc
el
le
nt
S
pl
u
nk
S
P
LK
-1
00
2
D
um
ps
(V
14
.0
2)
to
O
bt
ai
n
10
0%
A
ch
ie
ve
m
en
t
40.In which of the following scenarios is an event type more effective than a saved
search?
A. When a search should always include the same time range.
B. When a search needs to be added to other users' dashboards.
C. When the search string needs to be used in future searches.
D. When formatting needs to be included with the search string.
Answer: C
Explanation:
Reference: https://answers.splunk.com/answers/4993/eventtype-vs-savedsearch.html
An event type is a way to categorize events based on a search string that matches
the events2. You can use event types to simplify your searches by replacing long or
complex search strings with short and simple event type names2. An event type is
more effective than a saved search when the search string needs to be used in future
searches because it allows you to reuse the search string without having to remember
or type it again2. Therefore, option C is correct, while options A, B and D are incorrect
because they are not scenarios where an event type is more effective than a saved
search.
41.How does a user display a chart in stack mode?
A. By using the stack command.
B. By turning on the Use Trellis Layout option.
C. By changing Stack Mode in the Format menu.
D. You cannot display a chart in stack mode, only a timechart.
Answer: C
Explanation:
A chart is a graphical representation of your search results that shows the relationship
between two or more fields2. You can display a chart in stack mode by changing the
Stack Mode option in the Format menu2. Stack mode allows you to stack multiple
series on top of each other in a chart to show the cumulative values of each series2.
Therefore, option C is correct, while options A, B and D are incorrect because they
are not ways to display a chart in stack mode.
nk
S
P
LK
-1
00
2
D
um
ps
(V
14
.0
2)
to
O
bt
ai
n
10
0%
A
ch
ie
ve
m
en
t
-D
um
ps
B
as
e
42.Which of the following statements about event types is true? (select all that apply)
A. Event types can be tagged.
B. Event types must include a time range,
C. Event types categorize events based on a search.
D. Event types can be a useful method for capturing and sharing knowledge.
Answer: A, C, D
Explanation:
Reference: https://www.edureka.co/blog/splunk-events-event-types-and-tags/
As mentioned before, an event type is a way to categorize events based on a search
string that matches the events2. Event types can be tagged, which means that you
can apply descriptive labels to event types and use them in your searches2.
Therefore, option A is correct. Event types categorize events based on a search
string, which means that you can define an event type by specifying a search string
that matches the events you want to include in the event type2. Therefore, option C is
correct. Event types can be a useful method for capturing and sharing knowledge,
which means that you can use event types to organize your data into meaningful
categories and share them with other users in your organization2. Therefore, option D
is correct. Event types do not have to include a time range, which means that you can
create an event type without specifying a time range for the events2. Therefore,
option B is incorrect.
E
xc
el
le
nt
S
pl
u
43.In what order arc the following knowledge objects/configurations applied?
A. Field Aliases, Field Extractions, Lookups
B. Field Extractions, Field Aliases, Lookups
C. Field Extractions, Lookups, Field Aliases
D. Lookups, Field Aliases, Field Extractions
Answer: B
Explanation:
Reference: https://docs.splunk.com/Documentation/Splunk/8.0.3/Knowledge/WhatisS
plunkknowledge
Knowledge objects are entities that you create to add knowledge to your data and
make it easier to search and analyze2. Some examples of knowledge objects are field
extractions, field aliases and lookups2. Field extractions are methods that extract
fields from your raw data using various techniques such as regular expressions,
delimiters or key-value pairs2. Field aliases are ways to assign alternative names to
existing fields without changing the original field names or values2. Lookups are ways
to enrich your data with additional information from external sources such as CSV
files or databases2. The order in which these knowledge objects/configurations are
applied is as follows: field extractions, field aliases and then lookups2. This means
that Splunk first extracts fields from your raw data, then applies any aliases to the
extracted fields and then performs any lookups on the aliased fields2. Therefore,
option B is correct, while options A, C and D are incorrect.
-1
00
2
D
um
ps
(V
14
.0
2)
to
O
bt
ai
n
10
0%
A
ch
ie
ve
m
en
t
-D
um
ps
B
as
e
44.Which of the following knowledge objects represents the output of an eval
expression?
A. Eval fields
B. Calculated fields
C. Field extractions
D. Calculated lookups
Answer: B
Explanation:
Reference: https://docs.splunk.com/Splexicon:Calculatedfield
The eval command is used to create new fields or modify existing fields based on an
expression2. The output of an eval expression is a calculated field, which is a field
that you create based on the value of another field or fields2. You can use calculated
fields to enrich your data with additional information or to transform your data into a
more useful format2. Therefore, option B is correct, while options A, C and D are
incorrect because they are not names of knowledge objects that represent the output
of an eval expression.
E
xc
el
le
nt
S
pl
u
nk
S
P
LK
45.A calculated field maybe based on which of the following?
A. Lookup tables
B. Extracted fields
C. Regular expressions
D. Fields generated within a search string
Answer: B
Explanation:
As mentioned before, a calculated field is a field that you create based on the value of
another field or fields2. A calculated field can be based on extracted fields, which are
fields that are extracted from your raw data using various methods such as regular
expressions, delimiters or key-value pairs2. Therefore, option B is correct, while
options A, C and D are incorrect because they are not types of fields that a calculated
field can be based on.
46.Which of the following eval command function is valid?
as
e
A. Int ()
B. Count ( )
C. Print ()
D. Tostring ()
Answer: D
Explanation:
The eval command supports a number of functions that you can use in your
expressions to perform calculations, conversions, string manipulations and more2.
One of the eval command functions is tostring(), which converts a numeric value to a
string value2. Therefore, option D is correct, while options A, B and C are incorrect
because they are not valid eval command functions.
S
pl
u
nk
S
P
LK
-1
00
2
D
um
ps
(V
14
.0
2)
to
O
bt
ai
n
10
0%
A
ch
ie
ve
m
en
t
-D
um
ps
B
47.Which one of the following statements about the search command is true?
A. It does not allow the use of wildcards.
B. It treats field values in a case-sensitive manner.
C. It can only be used at the beginning of the search pipeline.
D. It behaves exactly like search strings before the first pipe.
Answer: D
Explanation:
Reference: https://docs.splunk.com/Documentation/SplunkCloud/8.0.2003/Search/Us
ethesearchcommand
The search command is used to filter or refine your search results based on a search
string that matches the events2. The search command behaves exactly like search
strings before the first pipe, which means that you can use the same syntax and
operators as you would use in the initial part of your search2. Therefore, option D is
correct, while options A, B and C are incorrect because they are not true statements
about the search command.
E
xc
el
le
nt
48.What does the Splunk Common Information Model (CIM) add-on include? (select
all that apply)
A. Custom visualizations
B. Pre-configured data models
C. Fields and event category tags
D. Automatic data model acceleration
Answer: BC
Explanation:
The Splunk Common Information Model (CIM) add-on is a collection of pre-built data
models and knowledge objects that help you normalize your data from different
sources and make it easier to analyze and report on it3. The CIM add-on includes preconfigured data models that cover various domains such as Alerts, Email, Database,
Network Traffic, Web and more3. Therefore, option B is correct. The CIM add-on also
includes fields and event category tags that define the common attributes and labels
for the data models3. Therefore, option C is correct. The CIM add-on does not include
custom visualizations or automatic data model acceleration. Therefore, options A and
D are incorrect.
.0
2)
to
O
bt
ai
n
10
0%
A
ch
ie
ve
m
en
t
-D
um
ps
B
as
e
49.Which of the following file formats can be extracted using a delimiter field
extraction?
A. CSV
B. PDF
C. XML
D. JSON
Answer: A
Explanation:
A delimiter field extraction is a method of extracting fields from data that uses a
character or a string to separate fields in each event. A delimiter field extraction can
be performed by using the Field Extractor (FX) tool or by editing the props.conf file. A
delimiter field extraction can be applied to any file format that uses a delimiter to
separate fields, such as CSV, TSV, PSV, etc. A CSV file is a comma-separated
values file that uses commas as delimiters. Therefore, a CSV file can be extracted
using a delimiter field extraction.
E
xc
el
le
nt
S
pl
u
nk
S
P
LK
-1
00
2
D
um
ps
(V
14
50.Which of the following statements describes macros?
A. A macro is a reusable search string that must contain the full search.
B. A macro is a reusable search string that must have a fixed time range.
C. A macro Is a reusable search string that may have a flexible time range.
D. A macro Is a reusable search string that must contain only a portion of the search.
Answer: C
Explanation:
Reference:
https://docs.splunk.com/Documentation/Splunk/8.0.3/Knowledge/Definesearchmacros
A macro is a reusable search string that can contain any part of a search, such as
search terms, commands, arguments, etc. A macro can have a flexible time range
that can be specified when the macro is executed. A macro can also have arguments
that can be passed to the macro when it is executed. A macro can be created by
using the Settings menu or by editing the macros.conf file. A macro does not have to
contain the full search, but only the part that needs to be reused. A macro does not
have to have a fixed time range, but can use a relative or absolute time range
modifier. A macro does not have to contain only a portion of the search, but can
contain multiple parts of the search.
bt
ai
n
10
0%
A
ch
ie
ve
m
en
t
-D
um
ps
B
as
e
51.Which of the following statements describe calculated fields? (select all that apply)
A. Calculated fields can be used in the search bar.
B. Calculated fields can be based on an extracted field.
C. Calculated fields can only be applied to host and sourcetype.
D. Calculated fields are shortcuts for performing calculations using the eval
command.
Answer: A, B, D
Explanation:
Reference:
https://docs.splunk.com/Documentation/Splunk/8.0.3/Knowledge/definecalcfields
Calculated fields are fields that are created by performing calculations on existing
fields using the eval command. Calculated fields can be used in the search bar to
filter and transform events based on the calculated values. Calculated fields can also
be based on an extracted field, which is a field that is extracted from raw data using
various methods, such as regex, delimiters, lookups, etc. Calculated fields are not
shortcuts for performing calculations using the eval command, but rather results of
performing calculations using the eval command. Calculated fields can be applied to
any field in Splunk, not only host and sourcetype.
Therefore, statements A, B, and D are true about calculated fields.
E
xc
el
le
nt
S
pl
u
nk
S
P
LK
-1
00
2
D
um
ps
(V
14
.0
2)
to
O
52.Which delimiters can the Field Extractor (FX) detect? (select all that apply)
A. Tabs
B. Pipes
C. Spaces
D. Commas
Answer: B, C, D
Explanation:
Reference:
https://docs.splunk.com/Documentation/Splunk/8.0.3/Knowledge/FXSelectMethodste
p
The Field Extractor (FX) is a tool that helps you extract fields from your data using
delimiters or regular expressions. Delimiters are characters or strings that separate
fields in your data. The FX can detect some common delimiters automatically, such
as pipes (|), spaces ( ), commas (,), semicolons (;), etc. The FX cannot detect tabs (\t)
as delimiters automatically, but you can specify them manually in the FX interface.
53.Which of the following statements is true, especially in large environments?
A. Use the scats command when you next to group events by two or more fields.
B. The stats command is faster and more efficient than the transaction command
C. The transaction command is faster and more efficient than the stats command.
D. Use the transaction command when you want to see the results of a calculation.
ch
ie
ve
m
en
t
-D
um
ps
B
as
e
Answer: B
Explanation:
Reference: https://answers.splunk.com/answers/103/transaction-vs-statscommands.html
The stats command is faster and more efficient than the transaction command,
especially in large environments. The stats command is used to calculate summary
statistics on the events, such as count, sum, average, etc. The stats command can
group events by one or more fields or by time buckets. The stats command does not
create new events from groups of events, but rather creates new fields with statistical
values. The transaction command is used to group events into transactions based on
some common characteristics, such as fields, time, or both. The transaction
command creates new events from groups of events that share one or more fields.
The transaction command also creates some additional fields for each transaction,
such as duration, eventcount, startime, etc. The transaction command is slower and
more resource-intensive than the stats command because it has to process more
data and create more events and fields.
E
xc
el
le
nt
S
pl
u
nk
S
P
LK
-1
00
2
D
um
ps
(V
14
.0
2)
to
O
bt
ai
n
10
0%
A
54.Which of the following are required to create a POST workflow action?
A. Label, URI, search string.
B. XMI attributes, URI, name.
C. Label, URI, post arguments.
D. URI, search string, time range picker.
Answer: C
Explanation:
POST workflow actions are custom actions that send a POST request to a web server
when you click on a field value in your search results. POST workflow actions can be
configured with various options, such as label name, base URL, URI parameters, post
arguments, app context, etc. One of the options that are required to create a POST
workflow action is post arguments. Post arguments are key-value pairs that are sent
in the body of the POST request to provide additional information to the web server.
Post arguments can include field values from your data by using dollar signs around
the field names.
55.Which of the following statements describe the search below? (select all that
apply)
Index=main I transaction clientip host maxspan=30s maxpause=5s
A. Events in the transaction occurred within 5 seconds.
B. It groups events that share the same clientip and host.
C. The first and last events are no more than 5 seconds apart.
D. The first and last events are no more than 30 seconds apart.
Answer: ABD
.0
2)
to
O
bt
ai
n
10
0%
A
ch
ie
ve
m
en
t
-D
um
ps
B
as
e
Explanation:
The search below groups events by two or more fields (clientip and host), creates
transactions with start and end constraints (maxspan=30s and maxpause=5s), and
calculates the duration of each transaction.
index=main | transaction clientip host maxspan=30s maxpause=5s
The search does the following:
It filters the events by the index main, which is a default index in Splunk that contains
all data that is not sent to other indexes.
It uses the transaction command to group events into transactions based on two
fields: clientip and host. The transaction command creates new events from groups of
events that share the same clientip and host values.
It specifies the start and end constraints for the transactions using the maxspan and
maxpause arguments. The maxspan argument sets the maximum time span between
the first and last events in a transaction. The maxpause argument sets the maximum
time span between any two consecutive events in a transaction. In this case, the
maxspan is 30 seconds and the maxpause is 5 seconds, meaning that any
transaction that has a longer time span or pause will be split into multiple
transactions.
It creates some additional fields for each transaction, such as duration, eventcount,
startime, etc. The duration field shows the time span between the first and last events
in a transaction.
E
xc
el
le
nt
S
pl
u
nk
S
P
LK
-1
00
2
D
um
ps
(V
14
56.Given the macro definition below, what should be entered into the Name and
Arguments fileds to correctly configured the macro?
le
nt
S
pl
u
nk
S
P
LK
-1
00
2
D
um
ps
(V
14
.0
2)
to
O
bt
ai
n
10
0%
A
ch
ie
ve
m
en
t
-D
um
ps
B
as
e
A. The macro name is sessiontracker and the arguments are action, JESSIONID.
B. The macro name is sessiontracker(2) and the arguments are action, JESSIONID.
C. The macro name is sessiontracker and the arguments are $action$,
$JESSIONID$.
D. The macro name is sessiontracker(2) and the Arguments are $action$,
$JESSIONID$.
Answer: B
Explanation:
Reference:
https://docs.splunk.com/Documentation/Splunk/8.0.3/Knowledge/Definesearchmacros
The macro definition below shows a macro that tracks user sessions based on two
arguments: action and JSESSIONID.
sessiontracker(2)
The macro definition does the following:
It specifies the name of the macro as sessiontracker. This is the name that will be
used to execute the macro in a search string.
It specifies the number of arguments for the macro as 2. This indicates that the macro
takes two arguments when it is executed.
It specifies the code for the macro as index=main
sourcetype=access_combined_wcookie
action=$action$ JSESSIONID=$JSESSIONID$ | stats count by JSESSIONID. This is
the search string that will be run when the macro is executed. The search string can
contain any part of a search, such as search terms, commands, arguments, etc. The
search string can also include variables for the arguments using dollar signs around
them. In this case, action and JSESSIONID are variables for the arguments that will
be replaced by their values when the macro is executed.
Therefore, to correctly configure the macro, you should enter sessiontracker as the
name and action, JSESSIONID as the arguments. Alternatively, you can use
sessiontracker(2) as the name and leave the arguments blank.
E
xc
el
57.After manually editing; a regular expression (regex), which of the following
statements is true?
A. Changes made manually can be reverted in the Field Extractor (FX) UI.
B. It is no longer possible to edit the field extraction in the Field Extractor (FX) UI.
C. It is not possible to manually edit a regular expression (regex) that was created
using the Field Extractor (FX) UI.
D. The Field Extractor (FX) UI keeps its own version of the field extraction in addition
to the one that was manually edited.
Answer: B
Explanation:
After manually editing a regular expression (regex) that was created using the Field
Extractor (FX) UI, it is no longer possible to edit the field extraction in the FX UI. The
FX UI is a tool that helps you extract fields from your data using delimiters or regular
expressions. The FX UI can generate a regex for you based on your selection of
sample values or you can enter your own regex in the FX UI. However, if you edit the
regex manually in the props.conf file, the FX UI will not be able to recognize the
changes and will not let you edit the field extraction in the FX UI anymore. You will
have to use the props.conf file to make any further changes to the field extraction.
Changes made manually cannot be reverted in the FX UI, as the FX UI does not keep
track of the changes made in the props.conf file. It is possible to manually edit a regex
that was created using the FX UI, as long as you do it in the props.conf file.
Therefore, only statement B is true about manually editing a regex.
S
pl
u
nk
S
P
LK
-1
00
2
D
um
ps
(V
14
.0
2)
to
O
bt
ai
n
10
0%
A
ch
ie
ve
m
en
t
-D
um
ps
B
as
e
58.What does the fillnull command replace null values with, it the value argument is
not specified?
A. 0
B. N/A
C. NaN
D. NULL
Answer: A
Explanation:
Reference: https://answers.splunk.com/answers/653427/fillnull-doesnt-work-withoutspecfying-a-field.html
The fillnull command is a search command that replaces null values with a specified
value or 0 if no value is specified. Null values are values that are missing, empty, or
undefined in Splunk. The fillnull command can replace null values for all fields or for
specific fields. The fillnull command can take an optional argument called value that
specifies the value to replace null values with. If no value argument is specified, the
fillnull command will replace null values with 0 by default.
E
xc
el
le
nt
59.To identify all of the contributing events within a transaction that contains at least
one REJECT event, which syntax is correct?
A. Index-main | REJECT trans sessionid
B. Index-main | transaction sessionid | search REJECT
C. Index=main | transaction sessionid | whose transaction=reject
D. Index=main | transaction sessionid | where transaction=reject’’
Answer: B
Explanation:
The transaction command is used to group events that share a common value for one
or more fields into transactions2. The transaction command assigns a transaction ID
to each group of events and creates new fields such as duration, eventcount and
eventlist for each transaction2. To identify all of the contributing events within a
transaction that contains at least one REJECT event, you can use the following
syntax: index=main | transaction sessionid | search REJECT2. This search will first
group the events by sessionid, then filter out the transactions that do not contain
REJECT in any of their events2. Therefore, option B is correct, while options A, C and
D are incorrect because they do not follow the correct syntax for using the transaction
command or the search command.
(V
14
.0
2)
to
O
bt
ai
n
10
0%
A
ch
ie
ve
m
en
t
-D
um
ps
B
as
e
60.Which of the following actions can the eval command perform?
A. Remove fields from results.
B. Create or replace an existing field.
C. Group transactions by one or more fields.
D. Save SPL commands to be reused in other searches.
Answer: B
Explanation:
The eval command is used to create new fields or modify existing fields based on an
expression2. The eval command can perform various actions such as calculations,
conversions, string manipulations and more2. One of the actions that the eval
command can perform is to create or replace an existing field with a new value based
on an expression2. For example, | eval status=if(status="200","OK","ERROR") will
create or replace the status field with either OK or ERROR depending on the original
value of status2. Therefore, option B is correct, while options A, C and D are incorrect
because they are not actions that the eval command can perform.
E
xc
el
le
nt
S
pl
u
nk
S
P
LK
-1
00
2
D
um
ps
61.Which of the following statements describe the Common Information Model (CIM)?
(select all that apply)
A. CIM is a methodology for normalizing data.
B. CIM can correlate data from different sources.
C. The Knowledge Manager uses the CIM to create knowledge objects.
D. CIM is an app that can coexist with other apps on a single Splunk deployment.
Answer: A, B, C
Explanation:
Reference: https://docs.splunk.com/Documentation/CIM/4.15.0/User/Overview
The Common Information Model (CIM) is a methodology for normalizing data from
different sources and making it easier to analyze and report on it3. The CIM defines a
common set of fields and tags for various domains such as Alerts, Email, Database,
Network Traffic, Web and more3. One of the statements that describe the CIM is that
it is a methodology for normalizing data, which means that it provides a standard way
to name and structure data from different sources so that they can be compared and
correlated3. Therefore, option A is correct. Another statement that describes the CIM
is that it can correlate data from different sources, which means that it enables you to
run searches and reports across data from different sources that share common fields
and tags3. Therefore, option B is correct. Another statement that describes the CIM is
that the Knowledge Manager uses the CIM to create knowledge objects, which means
that the person who is responsible for creating and managing knowledge objects such
as data models, field aliases, tags and event types can use the CIM as a guide to
make their knowledge objects consistent and compatible with other apps and addons3. Therefore, option C is correct. Option D is incorrect because it does not
describe the CIM but rather one of its components.
E
xc
el
le
nt
S
pl
u
nk
S
P
LK
-1
00
2
D
um
ps
(V
14
.0
2)
to
O
bt
ai
n
10
0%
A
ch
ie
ve
m
en
t
-D
um
ps
B
as
e
62.Data model fields can be added using the Auto-Extracted method.
Which of the following statements describe Auto-Extracted fields? (select all that
apply)
A. Auto-Extracted fields can be hidden in Pivot.
B. Auto-Extracted fields can have their data type changed.
C. Auto-Extracted fields can be given a friendly name for use in Pivot.
D. Auto-Extracted fields can be added if they already exist in the dataset with
constraints.
Answer: ABCD
Explanation:
Data model fields are fields that describe the attributes of a dataset in a data model2.
Data model fields can be added using various methods such as Auto-Extracted,
Evaluated or Lookup2. Auto-Extracted fields are fields that are automatically extracted
from your raw data using various techniques such as regular expressions, delimiters
or key-value pairs2. Auto-Extracted fields can be hidden in Pivot, which means that
you can choose whether to display them or not in the Pivot interface2. Therefore,
option A is correct. Auto-Extracted fields can have their data type changed, which
means that you can specify whether they are strings, numbers, booleans or
timestamps2. Therefore, option B is correct. Auto-Extracted fields can be given a
friendly name for use in Pivot, which means that you can assign an alternative name
to them that is more descriptive or user-friendly than the original field name2.
Therefore, option C is correct. Auto-Extracted fields can be added if they already exist
in the dataset with constraints, which means that you can include them in your data
model even if they are already extracted from your raw data by applying filters or
constraints to limit the scope of your dataset2. Therefore, option D is correct.
63.When creating a Search workflow action, which field is required?
A. Search string
B. Data model name
C. Permission setting
D. An eval statement
Answer: A
Explanation:
Reference: https://docs.splunk.com/Documentation/Splunk/8.0.3/Knowledge/Setupas
ps
B
as
e
earchworkflowaction
A workflow action is a link that appears when you click an event field value in your
search results2. A workflow action can open a web page or run another search based
on the field value2. There are two types of workflow actions: GET and POST2. A GET
workflow action appends the field value to the end of a URI and opens it in a web
browser2. A POST workflow action sends the field value as part of an HTTP request
to a web server2. When creating a Search workflow action, which is a type of GET
workflow action that runs another search based on the field value, the only required
field is the search string2. The search string defines the search that will be run when
the workflow action is clicked2. Therefore, option A is correct, while options B, C and
D are incorrect because they are not required fields for creating a Search workflow
action.
S
P
LK
-1
00
2
D
um
ps
(V
14
.0
2)
to
O
bt
ai
n
10
0%
A
ch
ie
ve
m
en
t
-D
um
64.Selected fields are displayed ______each event in the search results.
A. below
B. interesting fields
C. other fields
D. above
Answer: A
Explanation:
Selected fields are fields that you choose to display in your search results by clicking
on them in the Fields sidebar or by using the fields command2. Selected fields are
displayed below each event in the search results, along with their values2. Therefore,
option A is correct, while options B, C and D are incorrect because they are not
places where selected fields are displayed.
E
xc
el
le
nt
S
pl
u
nk
65.A space is an implied _____ in a search string.
A. OR
B. AND
C. ()
D. NOT
Answer: B
Explanation:
A space is an implied AND in a search string, which means that it acts as a logical
operator that returns events that match both terms on either side of the space2. For
example, status=200 method=GET will return events that have both status=200 and
method=GET2. Therefore, option B is correct, while options A, C and D are incorrect
because they are not implied by a space in a search string.
66.Which of the following search control will not re-rerun the search? (Select all that
en
t
-D
um
ps
B
as
e
apply.)
A. zoom out
B. selecting a bar on the timeline
C. deselect
D. selecting a range of bars on the timelines
Answer: B, C, D
Explanation:
The timeline is a graphical representation of your search results that shows the
distribution of events over time2. You can use the timeline to zoom in or out of a
specific time range or to select one or more bars on the timeline to filter your results
by that time range2. However, these actions will not re-run the search, but rather
refine the existing results based on the selected time range2. Therefore, options B, C
and D are correct, while option A is incorrect because zooming out will re-run the
search with a broader time range.
le
nt
S
pl
u
nk
S
P
LK
-1
00
2
D
um
ps
(V
14
.0
2)
to
O
bt
ai
n
10
0%
A
ch
ie
ve
m
67.Highlighted search terms indicate _________ search results in Splunk.
A. Display as selected fields.
B. Sorted
C. Charted based on time
D. Matching
Answer: D
Explanation:
Highlighted search terms indicate matching search results in Splunk, which means
that they show which parts of your events match your search string2. For example, if
you search for error OR fail, Splunk will highlight error or fail in your events to show
which events match your search string2.
Therefore, option D is correct, while options A, B and C are incorrect because they
are not indicated by highlighted search terms.
E
xc
el
68.When you mouse over and click to add a search term this (these. Boolean
operator(s) is (are. not implied. (Select all that apply).
A. OR
B. ( )
C. AND
D. NOT
Answer: ABD
Explanation:
When you mouse over and click to add a search term from the Fields sidebar or from
an event in your search results, Splunk automatically adds the term to your search
string with an implied AND operator2. However, this does not apply to some Boolean
operators such as OR, NOT and parentheses (). These operators are not implied
when you add a search term and you have to type them manually if you want to use
them in your search string2. Therefore, options A, B and D are correct, while option C
is incorrect because AND is implied when you add a search term.
n
10
0%
A
ch
ie
ve
m
en
t
-D
um
ps
B
as
e
69.The time range specified for a historical search defines the ____________
questionable on ans
A. Amount of data shown on the timeline as data streams in
B. Amount of data fetched from index matching that time range
C. Time range for the static results
Answer: B
Explanation:
The time range specified for a historical search defines the amount of data fetched
from the index matching that time range2. A historical search is a search that runs
over a fixed period of time in the past2. When you run a historical search, Splunk
searches the index for events that match your search string and fall within the
specified time range2. Therefore, option B is correct, while options A and C are
incorrect because they are not what the time range defines for a historical search.
E
xc
el
le
nt
S
pl
u
nk
S
P
LK
-1
00
2
D
um
ps
(V
14
.0
2)
to
O
bt
ai
70.Using the export function, you can export search results as __________.( Select
all that apply)
A. Xml
B. Json
C. Html
D. A php file
Answer: A, B
Explanation:
Using the export function, you can export search results as XML or JSON2. The
export function allows you to save your search results in a structured format that can
be used by other applications or tools2. You can use the output_mode parameter to
specify whether you want to export your results as XML or JSON2. Therefore, options
A and B are correct, while options C and D are incorrect because they are not formats
that you can export your search results as.
71.The fields sidebar does not show________. (Select all that apply.)
A. interesting fields
B. selected fields
C. all extracted fields
Answer: C
Explanation:
The fields sidebar is a panel that shows the fields that are present in your search
results2. The fields sidebar does not show all extracted fields, which are fields that
are extracted from your raw data using various methods such as regular expressions,
delimiters or key-value pairs2. The fields sidebar only shows selected fields and
interesting fields2. Selected fields are fields that you choose to display in your search
results by clicking on them in the fields sidebar or by using the fields command2.
Interesting fields are fields that appear in at least 20 percent of events or have high
variability among values2. Therefore, option C is correct, while options A and B are
incorrect because they are types of fields that the fields sidebar does show.
-1
00
2
D
um
ps
(V
14
.0
2)
to
O
bt
ai
n
10
0%
A
ch
ie
ve
m
en
t
-D
um
ps
B
as
e
72.Splunk alerts can be based on search that run______. (Select all that apply.)
A. in real-time
B. on a regular schedule
C. and have no matching events
Answer: A, B
Explanation:
Splunk alerts can be based on searches that run in real-time or on a regular
schedule3. An alert is a way to monitor your data and get notified when certain
conditions are met3. You can create an alert by specifying a search and a triggering
condition3. You can also specify how often you want to run the search and how you
want to receive the alert notifications3. You can run the alert search in real-time,
which means that it continuously monitors your data as it streams into Splunk3.
Alternatively, you can run the alert search on a regular schedule, which means that it
runs at fixed intervals such as every hour or every day3. Therefore, options A and B
are correct, while option C is incorrect because it is not a way to run an alert search.
E
xc
el
le
nt
S
pl
u
nk
S
P
LK
73.Which of the following about reports is/are true?
A. Reports are knowledge objects.
B. Reports can be scheduled.
C. Reports can run a script.
D. All of the above.
Answer: D
Explanation:
A report is a way to save a search and its results in a format that you can reuse and
share with others2. A report is also a type of knowledge object, which is an entity that
you create to add knowledge to your data and make it easier to search and analyze2.
Therefore, option A is correct. A report can be scheduled, which means that you can
configure it to run at regular intervals and send the results to yourself or others via
email or other methods2. Therefore, option B is correct. A report can run a script,
which means that you can specify a script file to execute when the report runs and
use it to perform custom actions or integrations2. Therefore, option C is correct.
Therefore, option D is correct because all of the above statements are true for
reports.
(V
14
.0
2)
to
O
bt
ai
n
10
0%
A
ch
ie
ve
m
en
t
-D
um
ps
B
as
e
74.Select this in the fields sidebar to automatically pipe you search results to the rare
command
A. events with this field
B. rare values
C. top values by time
D. top values
Answer: B
Explanation:
The fields sidebar is a panel that shows the fields that are present in your search
results2. The fields sidebar has two sections: selected fields and interesting fields2.
Selected fields are fields that you choose to display in your search results by clicking
on them in the fields sidebar or by using the fields command2. Interesting fields are
fields that appear in at least 20 percent of events or have high variability among
values2. For each field in the fields sidebar, you can select one of the following
options: events with this field, rare values, top values by time or top values2. If you
select rare values, Splunk will automatically pipe your search results to the rare
command, which shows the least common values of a field2. Therefore, option B is
correct, while options A, C and D are incorrect because they do not pipe your search
results to the rare command.
E
xc
el
le
nt
S
pl
u
nk
S
P
LK
-1
00
2
D
um
ps
75.A report scheduled to run every 15 mins. but takes 17 mins. to complete is in
danger of being_____.
A. skipped or deferred
B. automatically accelerated
C. deleted
D. all of the above
Answer: A
Explanation:
A report that is scheduled to run every 15 minutes but takes 17 minutes to complete is
in danger of being skipped or deferred2. This means that Splunk may skip some
scheduled runs of the report if they overlap with previous runs that are still in progress
or defer them until the previous runs are finished2. This can affect the accuracy and
timeliness of the report results and notifications2. Therefore, option A is correct, while
options B, C and D are incorrect because they are not consequences of a report
taking longer than its schedule interval.
GET FULL VERSION OF SPLK-1002 DUMPS
Powered by TCPDF (www.tcpdf.org)
Download