Core Certified User - 1001 Flashcards
What determines the scope of data that appears in a scheduled report?
A. All data accessible to the User role will appear in the report.
B. All data accessible to the owner of the report will appear in the report.
C. All data accessible to all users will appear in the report until the next time the report is run.
D. The owner of the report can configure permissions so that the report uses either the User role or the owner’s profile at run time.
D. The owner of the report can configure permissions so that the report uses either the User role or the owner’s profile at run time.
When writing searches in Splunk, which of the following is true about Booleans? A. They must be lowercase. B. They must be uppercase. C. They must be in Quotations. D. They must be in parentheses.
B. They must be uppercase.
Which of the following searches would return events with failure in index netfw or warn or critical in index netops?
A. (index=netfw failure) AND index=netops warn OR critical
B. (index=netfw failure) OR (index=netops (warn OR critical))
C. (index=netfw failure) AND (index=netops (warn OR critical))
D. (index=netfw failure) OR index=netops OR (warn OR critical)
B. (index=netfw failure) OR (index=netops (warn OR critical))
Which of the following constraints can be used with the top command? A. limit B. useperc C. addtotals D. fieldcount
A. limit
When running searches, command modifiers in the search string are displayed in what color? A. Red B. Blue C. Orange D. Highlighted
C. Orange
How can search results be kept longer than 7 days?
A. By scheduling a report.
B. By creating a link to the job.
C. By changing the job settings.
D. By changing the time range picker to more than 7 days.
A. By scheduling a report.
Which of the following is a Splunk search best practice?
A. Filter as early as possible.
B. Never specify more than one index.
C. Include as few search terms as possible.
D. Use wildcards to return more search results.
A. Filter as early as possible.
When displaying results of a search, which of the following is true about line charts?
A. Line charts are optimal for single and multiple series.
B. Line charts are optimal for single series when using Fast mode.
C. Line charts are optimal for multiple series with 3 or more columns.
D. Line charts are optimal for multiseries searches with at least 2 or more columns.
A. Line charts are optimal for single and multiple series.
How are events displayed after a search is executed?
A. In chronological order.
B. Randomly by default.
C. In reverse chronological order.
D. Alphabetically according to field name.
C. In reverse chronological order.
10) Which of the following is true about user account settings and preferences?
A. Search & Reporting is the only app that can be set as the default application.
B. Full names can only be changed by accounts with a Power User or Admin role.
C. Time zones are automatically updated based on the setting of the computer accessing Splunk.
D. Full name, time zone, and default app can be defined by clicking the login name in the Splunk bar.
D. Full name, time zone, and default app can be defined by clicking the login name in the Splunk bar.
What is a primary function of a scheduled report?
A. Auto-detect changes in performance.
B. Auto-generated PDF reports of overall data trends.
C. Regularly scheduled archiving to keep disk space use low.
D. Triggering an alert in your Splunk instance when certain conditions are met.
B. Auto-generated PDF reports of overall data trends.
Which command is used to review the contents of a specified static lookup file? A. lookup B. csvlookup C. inputlookup D. outputlookup
C. inputlookup
When sorting on multiple fields with the sort command, what delimiter can be used between the field names in the search? A. | B. $ C. ! D. ,
D. ,
Which time range picker configuration would return real-time events for the past 30 seconds?
A. Preset - Relative: 30-seconds ago
B. Relative - Earliest: 30-seconds ago, Latest: Now
C. Real-time - Earliest: 30-seconds ago, Latest: Now
D. Advanced - Earliest: 30-seconds ago, Latest: Now
C. Real-time - Earliest: 30-seconds ago, Latest: Now
What is the correct syntax to count the number of events containing a vendor_action field? A. count stats vendor_action B. count stats (vendor_action) C. stats count (vendor_action) D. stats vendor_action (count)
C. stats count (vendor_action)
Which of the following statements about case sensitivity is true?
A. Both field names and field values ARE case sensitive.
B. Field names ARE case sensitive; field values are NOT.
C. Field values ARE case sensitive; field names ARE NOT.
D. Both field names and field values ARE NOT case sensitive.
B. Field names ARE case sensitive; field values are NOT.
What does the rare command do?
A. Returns the least common field values of a given field in the results.
B. Returns the most common field values of a given field in the results.
C. Returns the top 10 field values of a given field in the results.
D. Returns the lowest 10 field values of a given field in the results.
A. Returns the least common field values of a given field in the results.
Which Boolean operator is always implied between two search terms, unless otherwise specified? A. OR B. NOT C. AND D. XOR
C. AND
What is the purpose of using a by clause with the stats command?
A. To group the results by one or more fields.
B. To compute numerical statistics on each field.
C. To specify how the values in a list are delimited.
D. To partition the input data based on the split-by fields.
A. To group the results by one or more fields.
How do you add or remove fields from search results?
A. Use field +to add and field -to remove.
B. Use table +to add and table -to remove.
C. Use fields +to add and fields –to remove.
D. Use fields Plus to add and fields Minus to remove.
C. Use fields +to add and fields –to remove.
A field exists in search results, but isn’t being displayed in the fields sidebar.
How can it be added to the fields sidebar?
A. Click All Fields and select the field to add it to Selected Fields.
B. Click Interesting Fields and select the field to add it to Selected Fields.
C. Click Selected Fields and select the field to add it to Interesting Fields.
D. This scenario isn’t possible because all fields returned from a search always appear in the fields sidebar.
A. Click All Fields and select the field to add it to Selected Fields.
In the fields sidebar, which character denotes alphanumeric field values? A. # B. % C. a D. a#
C. a
What user interface component allows for time selection? A. Time summary B. Time range picker C. Search time picker D. Data source time statistics
B. Time range picker
Which of the following is the most efficient filter for running searches in Splunk? A. Time B. Fast mode C. Sourcetype D. Selected Fields
A. Time
How does Splunk determine which fields to extract from data?
A. Splunk only extracts the most interesting data from the last 24 hours.
B. Splunk only extracts fields users have manually specified in their data.
C. Splunk automatically extracts any fields that generate interesting visualizations.
D. Splunk automatically discovers many fields based on sourcetype and key/value pairs found in the data.
D. Splunk automatically discovers many fields based on sourcetype and key/value pairs found in the data.
Which of the following file types is an option for exporting Splunk search results? A. PDF B. JSON C. XLS D. RTF
B. JSON
What syntax is used to link key/value pairs in search strings? A. Parentheses B. @ or # symbols C. uotation marks D. Relational operators such as =,
D. Relational operators such as =,
Which search would return events from the access_combined sourcetype? A. Sourcetype=access_combined B. Sourcetype=Access_Combined C. sourcetype=Access_Combined D. SOURCETYPE=access_combined
C. sourcetype=Access_Combined
In a deployment with multiple indexes, what will happen when a search is run and an index is not specified in the search string?
A. No events will be returned.
B. Splunk will prompt you to specify an index.
C. All non-indexed events to which the user has access will be returned.
D. Events from every index searched by default to which the user has access will be returned.
D. Events from every index searched by default to which the user has access will be returned.
In the Splunk interface, the list of alerts can be filtered based on which characteristics? A. App, Owner, Severity, and Type B. App, Owner, Priority, and Status C. App, Dashboard, Severity, and Type D. App, Time Window, Type, and Severity
A. App, Owner, Severity, and Type
Which of the following are functions of the stats command? A. count, sum, add B. count, sum, less C. sum, avg, values D. sum, values, table
C. sum, avg, values
Which of the following is a best practice when writing a search string?
A. Include all formatting commands before any search terms.
B. Include at least one function as this is a search reuirement.
C. Include the search terms at the beginning of the search string.
D. Avoid using formatting clauses, as they add too much overhead.
C. Include the search terms at the beginning of the search string.
When viewing the results of a search, what is an Interesting Field?
A. A field that appears in any event.
B. A field that appears in every event.
C. A field that appears in the top 10 events.
D. A field that appears in at least 20% of the events.
D. A field that appears in at least 20% of the events.
When a Splunk search generates calculated data that appears in the Statistics tab, in what formats can the results be exported? A. CSV, JSON, PDF B. CSV, XML, JSON C. Raw Events, XML, JSON D. Raw Events, CSV, XML, JSON
B. CSV, XML, JSON
Which search matches the events containing the terms “error” and “fail”? A. index=security Error Fail B. index=security error OR fail C. index=security “error failure” D. index=security NOT error NOT fail
A. index=security Error Fail
Which of the following is the recommended way to create multiple dashboards displaying data from the same search?
A. Save the search as a report and use it in multiple dashboards as needed.
B. Save the search as a dashboard panel for each dashboard that needs the data.
C. Save the search as a scheduled alert and use it in multiple dashboards as needed.
D. Export the results of the search to an XML file and use the file as the basis of the dashboards.
A. Save the search as a report and use it in multiple dashboards as needed.
Which component of Splunk is primarily responsible for saving data? A. Search Head B. Heavy Forwarder C. Indexer D. Universal Forwarder
C. Indexer
Universal forwarder is recommended for forwarding the logs to indexers.
A. Incorrect
B. Correct
B. Correct
We should use heavy forwarder for sending event-based data to Indexers.
A. Incorrect
B. Correct
B. Correct
Which of the following can be used as wildcard search in Splunk? A. = B. > C. ! D. *
D. *
Prefix wildcards might cause performance issues.
A. Incorrect
B. Correct
B. Correct
Machine data can be in structured and unstructured format.
A. Incorrect
B. Correct
B. Correct
Splunk internal fields contains general information about events and starts from underscore i.e. _ .
A. Correct
B. Incorrect
A. Correct
How many main user roles do you have in Splunk? A. 2 B. 4 C. 1 D. 3
D. 3
What does the stats command do?
A. Automatically correlates related fields.
B. Converts field values into numerical values.
C. Calculates statistics on data that matches the search criteria.
D. Analyzes numerical fields for their ability to predict another discrete field.
C. Calculates statistics on data that matches the search criteria.
Which is primary function of the timeline located under the search bar?
A. To differentiate between structured and unstructured events in the data.
B. To sort the events returned by the search command in chronological order.
C. To zoom in and zoom out, although this does not change the scale of the chart.
D. To show peaks and/or valleys in the timeline, which can indicate spikes in activity or downtime.
D. To show peaks and/or valleys in the timeline, which can indicate spikes in activity or downtime.
What can be configured using the Edit Job Settings menu?
A. Export the result to CSV format.
B. Add the Job results to a dashboard.
C. Schedule the Job to re-run in 10 minutes.
D. Change Job Lifetime from 10 minutes to 7 days.
D. Change Job Lifetime from 10 minutes to 7 days.
What is the primary use for the rare command?
A. To sort field values in descending order.
B. To return only fields containing five of fewer values.
C. To find the least common values of a field in a dataset.
D. To find the fields with the fewest number of values across a dataset.
C. To find the least common values of a field in a dataset.
What happens when a field is added to the Selected Fields list in the fields sidebar?
A. Splunk will re-run the search job in Verbose Mode to prioritize the new Selected Field.
B. Splunk will highlight related fields as a suggestion to add them to the Selected Fields list.
C. Custom selections will replace the Interesting Fields that Splunk populated into the list at search time.
D. The selected field and its corresponding values will appear underneath the events in the search results.
D. The selected field and its corresponding values will appear underneath the events in the search results.
Which of the following describes lookup files?
A. Lookup fields cannot be used in searches.
B. Lookups contain static data available in the index.
C. Lookups add more fields to results returned by a search.
D. Lookups pull data at index time and add them to search results.
C. Lookups add more fields to results returned by a search.
Splunk extracts fields from event data at index time and at search time.
A. Correct
B. Incorrect
A. Correct
Splunk indexes the data on the basis of timestamps.
A. Correct
B. Incorrect
A. Correct
Parsing of data can happen both in HF and Indexer.
A. Only HF
B. No
C. Yes
C. Yes
You can on-board data to Splunk using following means (Choose four.): A. Props B. CLI C. Splunk Web D. savedsearches.conf E. Splunk apps and add-ons F. inputs.conf
B. CLI
C. Splunk Web
E. Splunk apps and add-ons
F. inputs.conf
Data sources being opened and read applies to: A. None of these B. Indexing Phase C. Parsing Phase D. Input Phase E. License Metering
D. Input Phase
Select the correct option that applies to Index time processing (Choose three.). A. Indexing B. Searching C. Parsing D. Settings E. Input
A. Indexing
C. Parsing
E. Input
Parsing of data can happen both in HF and UF.
A. Correct
B. Incorrect
B. Incorrect
Upload option creates inputs.conf
A. Correct
B. Incorrect
B. Incorrect
Splunk index time process can be broken down into \_\_\_\_\_\_\_\_\_\_ phases. A. 3 B. 2 C. 4 D. 1
A. 3
In monitor option you can select the following options in GUI.
A. Only HTTP Event Collector (HEC) and TCP/UDP
B. None of these
C. Only TCP/UDP
D. Only Scripts
E. Files & Directories, HTTP Event Collector (HEC), TCP/UDP and Scripts
E. Files & Directories, HTTP Event Collector (HEC), TCP/UDP and Scripts
Where does Licensing meter happen? A. Indexer B. Parsing C. Heavy Forwarder D. Input
A. Indexer
Beginning parentheses is automatically highlighted to guide you on the presence of complimenting parentheses.
A. Incorrect
B. Correct
B. Correct
Matching of parentheses is a feature of Splunk Assistant.
A. Incorrect
B. Correct
B. Correct
What is Search Assistant in Splunk?
A. It is only available to Admins.
B. Such feature does not exist in Splunk.
C. Shows options to complete the search string.
C. Shows options to complete the search string.
The new data uploaded in Splunk are shown in \_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_. A. Real-time B. 10 Minutes C. Overnight Download D. 30 Minutes
A. Real-time
The default host name used in Inputs general settings can not be changed.
A. Incorrect
B. Correct
A. Incorrect
Splunk Parses data into individual events, extracts time, and assigns metadata.
A. Incorrect
B. Correct
B. Correct
There are three different search modes in Splunk (Choose three.): A. Automatic B. Smart C. Fast D. Verbose
B. Smart
C. Fast
D. Verbose
Select the statements that are true for timeline in Splunk (Choose four.):
A. Timeline shows distribution of events specified in the time range in the form of bars.
B. Single click to see the result for particular time period.
C. You can click and drag across the bar for selecting the range.
D. This is default view and you can’t make any changes to it.
E. You can hover your mouse for details like total events, time and date.
A. Timeline shows distribution of events specified in the time range in the form of bars.
B. Single click to see the result for particular time period.
C. You can click and drag across the bar for selecting the range.
E. You can hover your mouse for details like total events, time and date.
Snapping rounds down to the nearest specified unit.
A. Correct
B. Incorrect
A. Correct
Data summary button just below the search bar gives you the following (Choose three.): A. Hosts B. Sourcetypes C. Sources D. Indexes
A. Hosts
B. Sourcetypes
C. Sources
What options do you get after selecting timeline? (Choose four.) A. Zoom to selection B. Format Timeline C. Deselect D. Delete E. Zoom Out
A. Zoom to selection
B. Format Timeline
C. Deselect
E. Zoom Out
You can view the search result in following format (Choose three.): A. Table B. Raw C. Pie Chart D. List
A. Table
B. Raw
D. List
At the time of searching the start time is 03:35:08.
Will it look back to 03:00:00 if we use -30m@h in searching?
A. Correct
B. Incorrect
A. Correct
You can also specify a time range in the search bar. You can use the following for beginning and ending for a time range (Choose two.):
A. Not possible to specify time manually in Search query
B. end=
C. start=
D. earliest=
E. latest=
D. earliest=
E. latest=
How to make Interesting field into a selected field?
A. Click field in field sidebar -> click YES on the pop-up dialog on upper right side -> check now field should be visible in the list of selected fields.
B. Not possible.
C. Only CLI changes will enable it.
D. Click Settings -> Find field option -> Drop down select field -> enable selected field -> check now field should be visible in the list of selected fields.
A. Click field in field sidebar -> click YES on the pop-up dialog on upper right side -> check now field should be visible in the list of selected fields.
Field names are case sensitive and field value are not.
A. Correct
B. Incorrect
A. Correct
Query - status != 100:
A. Will return event where status field exist but value of that field is not 100.
B. Will return event where status field exist but value of that field is not 100 and all events where status field doesn’t exist.
C. Will get different results depending on data.
A. Will return event where status field exist but value of that field is not 100.
NOT status = 100:
A. Will display result depending on the data.
B. Will return event where status field exist but value of that field is not 100.
C. Will return event where status field exist but value of that field is not 100 and all events where status field doesn’t exist.
C. Will return event where status field exist but value of that field is not 100 and all events where status field doesn’t exist.
Will the queries following below get the same result?
1. index=log sourcetype=error_log status !=100
2. index=log sourcetype=error_log NOT status =100
A. Correct
B. Incorrect
B. Incorrect
Put query into separate lines where | (Pipes) are used by selecting following options. A. CTRL + Enter B. Shift + Enter C. Space + Enter D. ALT + Enter
B. Shift + Enter
Fields are searchable key value pairs in your event data.
A. Correct
B. Incorrect
A. Correct
Search Language Syntax in Splunk can be broken down into the following components. (Choose all that apply.) A. Search term B. Command C. Pipe D. Functions E. Arguments F. Clause
A. Search term B. Command D. Functions E. Arguments F. Clause
Which of the following reports is available in the Fields window? A. Top values by time B. Rare values by time C. Events with top value fields D. Events with rare value fields
A. Top values by time
Which of the following is the most efficient search?
A. index=* “failed password”
B. “failed password” index=*
C. (index=* OR index=security) “failed password”
D. index=security “failed password”
D. index=security “failed password”
What is a quick, comprehensive way to learn what data is present in a Splunk deployment? A. Review Splunk reports B. Run ./splunk show C. Click Data Summary in Splunk Web D. Search index=* sourcetype=* host=*
C. Click Data Summary in Splunk Web
Which of the following is a metadata field assigned to every event in Splunk? A. host B. owner C. bytes D. action
A. host
Which of the following is the best way to create a report that shows the last 24 hours of events?
A. Use earliest=-1d@d latest=@d
B. Set a real-time search over a 24-hour window
C. Use the time range picket to select “Yesterday”
D. Use the time range picker to select “Last 24 hours”
D. Use the time range picker to select “Last 24 hours”
When is the pipe character, I, used in search strings?
A. Before clauses. For example: stats sum(bytes) | by host
B. Before commands. For example: | stats sum(bytes) by host
C. Before arguments. For example: stats sum| (bytes) by host
D. Before functions. For example: stats |sum(bytes) by host
B. Before commands. For example: | stats sum(bytes) by host
In the Fields sidebar, what does the number directly to the right of the field name indicate?
A. The value of the field
B. The number of values for the field
C. The number of unique values for the field
D. The numeric non-unique values of the field
C. The number of unique values for the field
Which search will return the 15 least common field values for the dest_ip field?
A. sourcetype=firewall | rare num=15 dest_ip
B. sourcetype=firewall | rare last=15 dest_ip
C. sourcetype=firewall | rare count=15 dest_ip
D. sourcetype=firewall | rare limit=15 dest_ip
D. sourcetype=firewall | rare limit=15 dest_ip