Questions Flashcards

1
Q

What determines the scope of data that appears in a scheduled report?

A

Permissions granted by the owner of report.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When writing searches in Splunk.what is true about Booleans?

A

They must be uppercase.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How can search results be kept for longer than 7 days?

A

Changing job settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

When running searches, command modifiers are displayed in what colour?

A

Orange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following is a Splunk search best practice?

A

Filter as early as possible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How are events displayed after a search is executed?

A

Reverse chronological order

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the primary function of a scheduled report?

A

Triggering an alert in your Splunk instance when certain conditions are met

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which commands is used to review the contents of a specified static lookup file?

A

inputlookup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When sorting on multiple fields with the sort command, what delimiter can be used between the field names in the search?

A

,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following about case sensitivity is true?

A

Field names ARE case sensitive; field values are NOT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does the rare command do?

A

Returns the least common field values of a given field in the results.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which Boolean operator is always implied between two search terms, unless otherwise specified?

A

AND

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the purpose of using a by clause with the stats command?

A

To group the results by one or more fields

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How can you add a field to the fields sidebar?

A

Click All Fields and select the field to add it to Selected Fields

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In the fields sidebar, which character denotes alpha numeric field values?

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How does Splunk determine which fields to extract from data?

A

Splunk automatically discovers many fields based on sourcetype and key/value pairs found in data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What syntax is used to link key/value pairs in search strings?

A

Relational operators such as =,

18
Q

In a deployment with multiple indexes, what will happen when a search is run and an index is not specified in the search string?

A

Events from every index searched by default to which the user has access will be returned

19
Q

In the Splunk interface, the list of alerts can be filtered based on which characteristics?

A

App, Time, Window, Type, and Severity

20
Q

When viewing results of a search, what is an interesting field?

A

A field that appears in the at least 20% of events

21
Q

When a Splunk search generates calculated data that appears in the Statistics tab, in what formats can the results be exported?

A

CSV, XML, JSON

22
Q

What is the recommended way to create multiple dashboards displaying data from the same search?

A

Export the results of the search to an XML file and use the file as the basis of the dashboards

23
Q

What does the stats command do?

A

Calculates statistics on data that matches the search criteria

24
Q

Which is the primary function of the timeline located under the search bar?

A

To show peaks and/or valleys in the timeline, which can indicate spikes in activity or downtime.

25
What can be configured using the Edit Job Settings menu?
Change Job Lifetime from 10 minutes to 7 days
26
What is the primary use of the rare command?
To find the least common values of a field in a dataset
27
What happens when a field is added to Selected Fields?
The selected field wand it's corresponding values will appear underneath the events in the search results.
28
How would you describe lookup files?
Lookups contain static data available in the index.
29
Which component of Splunk is primarily responsible for saving data?
Indexer
30
Is the universal forwarded recommended for forwarding logs to the indexers?
Yes.
31
What can be used as a wildcard search in Splunk?
*
32
Can prefix wildcards cause performance issues?
Yes
33
What forms does machine data come in?
Structured and unstructured
34
How many user roles are there in Splunk?
3
35
Where can data be parsed?
Heavy Forwarder and Indexers
36
How can you onboard data to Splunk?
CLI, Splunk Web, Splunk apps and add-ons, inputs.conf
37
What does the eval command do?
Calculates an expression and puts the resulting value into a destination field
38
When could you need to use lookup tables?
To retrieve additional information present in the raw events.
39
What's an advantage of using data models with Pivot?
You can create dashboards and reports without designing the searches that generate them.
40
What is the difference between Selected Fields and Interesting Fields in the Fields sidebar?
Selected Fields show host, source, and sourcetype fields. Interesting Fields show the fields extracted by Splunk that are present in at least 20% of the events.