Splint other questions
Which of the following searches would return events with failure in index netfw or warn or criticalin index net ops?
(Index=network failure) OR (index=netops (warn OR critical))
When sorting on multiple fields with the sort command, what delimiter can be used between the field names in the search?
,
When editing a dashboard, which of the following are possible options? (select all that apply)
1. Export a dashboard panel. 2. Modify the chart type displayed in a dashboard panel. 3.Drag a dashboard panel to a different location on the dashboard.
By default, how long does Splunk retain a search job?
10 minutes
In the fields sidebar, what indicates that a field is numeric?
A # symbol to the left of the field name.
When viewing the results of a search, what is an Interesting Field?
A field that appears in at least 20% of the events.
Which Boolean operator is always implled between two search terms, unless otherwise specified?
AND
Assuming a user has the capability to edit reports, which of the following are editable?
Acceleration, schedule, permissions
Which of the following is an option after clicking an Item in search results?
Adding the item to the search.
What are the steps to schedule a report?
After saving the report, click Schedule
Which statement is true about Splunk alerts?
Alerts are based on searches that are either run on a scheduled interval or in real-time
Which events will be returned by the following search string? host=www3 status=503?
All events with a host of www3 that also have a status of 503
What is the default lifetime of every Splunk search job?
All search jobs are saved for 10 minutes.
A collection of items containing things such as data inputs, UI elements, and knowledge objects is known as:
An app
What type of search can be saved as a report?
Any search can be saved as a report.
In the Splunk interface, the list of alerts can be filtered based on which characteristics?
App, Time Window, Type, and Severity
When is the pipe character, I, used in search strings?
Before commands. For example: Istats sum(bytes) by host
How can search results be kept longer than 7 days?
By changing the job settings.
When a Splunk search generates calculated data that appears In the Statistics tab, In what formats can the results be exported?
CSV, XML, JSON
What does the stats command do?
Calculates statistics on data that matches the search criteria.
What can be configured using the Edit Job Settings menu?
Change Job Lifetime from 10 minutes to 7 days.
A field exists in search results, but isn't belng displayed In the flelds sidebar. How can it be added to the flelds sidebar?
Click All Fields and select the field to add it to Selected Fields
When looking at a statistics table, what is one way to drill down to see the underlying events?
Clicking on the visualizations tab.
In a deployment with multiple Indexes, what will happen when a search is run and an Index is not specified in the search string?
Events from every index searched by default to which the user has access will be returned.
What can be included in the All Fields option in the sidebar?
Field descriptions
Which of the following statements about case sensitivity is true?
Field names ARE case sensitive; field values are NOT.
Which of the following is a Splunk search best practice?
Filter as early as possible.
Which of the following Splunk components resides on the machines where data originates?
Forwarder
Which of the following is true about user account settings and preferences?
Full names can only be changed by accounts with a Power User or Admin role.
Which of the following represents the Splunk recommended naming convention for dashboards?
Group_Object_Description
How are events displayed after a search is executed?
In reverse chronological order.
Which of the following is a best practice when writing a search string?
Include all formatting commands before any search terms.
By default, which of the following fields would be listed in the fields sidebar under interesting fields?
Index
Which of the following index searches would provide the most efficient search performance?
Index=*
Which Field/Value pair will return only events found in a index names security?
Index=Security
Which search string is the most efficient?
Index=security "failed password"
Which search string returns a file containing the number of matching events and names that field event count?
Index=security failure | stats count as "Event Count"
Which command is used to review the contents of a specified static lookup file?
Inputlookup
How can results from a specified statistic lookup file be displayed?
Inputlookup command
What is one benefit of creating dashboard panels from reports?
It makes the dashboard more efficient because it only has to run one search string
Which statement is true about the top command?
It returns the top 10 results. It displays the output in table format. It returns the count and percent columns per row. All of the above.
Which of the following file types is an option for exporting Splunk search results?
JSON
Which of the following constraints can be used with the top command?
Limit
When displaying results of a search, which of the following is true about line charts?
Line charts are optimal for multiple series with 3 or more columns.
What does the values function of the stats command do?
Lists unique values of a given field.
What does the following specified time range do? earliest=-72h@h latest=@d
Look back from 3 days ago, up to the beginning of today.
Which of the following describes lookup files?
Lookups add more fields to results returned by a search.
After running a search, what effect does clicking and dragging across the timeline have?
Moves to past or future events.
When running searches, command modifiers in the search string are displayed in what color?
Orange
Which time range picker configuration would return real-time events for the past 30 seconds?
Real-time - Earliest: 30-seconds ago, Latest: Now
What syntax is used to link key/value in search strings?
Relational operators such as =, <, or >
What does the rare command do?
Returns the least common field values of a given field in the results.
When an alert action is configured to run a script, Splunk must be able to locate the script. Which is one of the directories Splunk will look in to find the script?
SSPLUNK HOME/bin/scripts
Which of the following is the recommended way to create multiple dashboards displaying data from the same search?
Save the search as a report and use it in multiple dashboards as needed.
What are the three main Splunk components?
Search head, Indexer, forwarder
Which of the following is the best way to create a report that shows the last 24 hours of the events?
Set a real-time search over a 24-hour window.
Which of the following fields is stored with the events in the index?
Source
Which search would return events from the access_combined source type?
Sourcetype=access_combined
How does Splunk determine which fields to extract from data?
Splunk automatically discovers many fields based on sourcetypw and key/value pairs foind in the data.
Which statement describes field discovery at search time?
Splunk automatically discovers only fields directly related to the search results.
Which of the following are functions of the stats command?
Sum, avg, values
What must be done before an automatic lookup can be created? (select all that apply)
The lookup definition must be created The lookup file must be uploaded to Splunk
What must be done in order to use a lookup table in Splunk?
The lookup file must be uploaded to Splunk and a lookup definition must be created.
In the Fields sidebar, what does the number directly to the right of the field name indicate?
The number of unique values for the field.
What determines the scope of data that appears in a scheduled report?
The owner of the report can configure permissions so that the report uses either the User role or the owner's profile at run time.
How can another user gain access to a saved report?
The owner of the report can edit permissions from the Edit drop down.
What happens when a field is added to the selected fields list in the fields sidebar?
The selected field and its corresponding values will appear underneath the events in the search results.
When writing searches in Splunk, which of the following is true about Booleans?
They must be uppercase.
Which of the following is the most efficient filter for running searches in Splunk?
Time
What user interface component allows for time selection?
Time range picker
What is the primary use for the rare command?
To find the least common values of a field in a dataset.
What is the purpose of using a by clause with the stats command?
To group the results by one or more fields.
Which is a primary function of the timeline located under the search bar?
To show peaks and/or valleys in the timeline, which can indicate spikes in activity or downtime.
Which command automatically returns percent and counts columns when executing searches?
Top
What is a primary function of a scheduled report?
Triggering an alert in your Splunk instance when certain conditions are met.
What is a suggested Splunk best practice for naming reports?
Use a consistent naming convention so they are easily separated by characteristics such as group and object.
How do you add or remove fields from search results?
Use fields +to add and fields -to remove.
When is an alert triggered?
When results of a search meet a specifically defined condition.
When looking at a dashboard panel that is based on a report, which of the following is true?
You can modify the search string in the panel, and you can configure the visualization.
What is the main requirement for creating visualizations using the Splunk UI?
Your search must transform event data into XML formatted data first.
At index time, in which field does Splunk store time stamp value?
_time
In the fields sidebar, which character denotes alphanumeric field values?
a#
What syntax is used to link key/value pairs in search strings?
action=purchase
Which stats command function provides a count of how many unique values exist for a given fleld in the result set?
dc(field)
When placed early in a search, which command is most effective at reducing search execution time?
dedup
Which of the following searches will return results where fail, 400, and error exist in every event?
error AND (fail AND 400)
According to Splunk best practices, which placement of the wildcard results in the most efficient search?
fail*
Which of the following is a metadata field assigned to every event in Splun?
host
Which search string only returns events from hostWWW3?
host=WWW3
Which search matches the events containing the terms "error" and "fail"?
index=security Error Fail
Select the answer that displays the accurate placing of the pipe In the following search string: Index=security sourctype=access_*status=200 stats voubt by price
index=security sourcetype=access_ *status=200 | stats count by price
Which of the following are common constraints of the top command?
showperc, countfield
By default, which of the following is a Selected Field?
sourcetype
Which search will return the 15 least common field values for the dest_ip field?
sourcetype=firewall | rare limit=15 dest_ip
What is the correct syntax to count the number of events containing a vendor_action field?
stats count (vendor_action)
Which search string matches only events with the status_code of 404?
status_code<=404
What are the two most efficient search filters?
time and index
Which command is used to validate a lookup file?
| inputlookup products.csv