Labour Day Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Splunk > Splunk Core Certified Power User > SPLK-1002

SPLK-1002 Splunk Core Certified Power User Exam Question and Answers

Question # 4

Which of the following search control will not re-rerun the search? (Select all that apply.)

A.

zoom out

B.

selecting a bar on the timeline

C.

deselect

D.

selecting a range of bars on the timelines

Full Access
Question # 5

Which of the following are valid options to speed up reports? (Select all the apply.)

A.

Edit permissions

B.

Edit description

C.

Edit acceleration

D.

Edit schedule

Full Access
Question # 6

Which of the following searches will return all clientip addresses that start with 108?

A.

… | where like (clientip, “108.% )

B.

… | where (clientip, "108. %")

C.

… | where (clientip=108. % )

D.

… | search clientip=108

Full Access
Question # 7

Which of the following can be saved as an event type?

A.

index-server_472 sourcetype-BETA_494 code-488 I stats count by code

B.

index=server_472 sourcetype=BETA_494 code=488 [I inputlookup append=t servercode.csv]

C.

index=server_472 sourcetype=BETA_494 code=488 I stats where code > 200

D.

index=server_472 sourcetype=BETA_494 code-488

Full Access
Question # 8

Which of the following about reports is/are true?

A.

Reports are knowledge objects.

B.

Reports can be scheduled.

C.

Reports can run a script.

D.

All of the above.

Full Access
Question # 9

Which of the following statements describes the use of the Field Extractor (FX)?

A.

The Field Extractor automatically extracts all fields at search time.

B.

The Field Extractor uses PERL to extract fields from the raw events.

C.

Fields extracted using the Field Extractor persist as knowledge objects.

D.

Fields extracted using the Field Extractor do not persist and must be defined for each search.

Full Access
Question # 10

What is a limitation of searches generated by workflow actions?

A.

Searches generated by workflow action cannot use macros.

B.

Searches generated by workflow actions must be less than 256 characters long.

C.

Searches generated by workflow action must run in the same app as the workflow action.

D.

Searches generated by workflow action run with the same permissions as the user running them.

Full Access
Question # 11

A user runs the following search:

index—X sourcetype=Y I chart count (domain) as count, sum (price) as sum by product, action usenull=f useother—f

Which of the following table headers match the order this command creates?

A.

The chart command does not allow for multiple statistical functions.

B.

Product, sum: addtocart, sum: remove, sum: purchase, count: addtocart, count: remove, count: purchase

C.

Product, count: addtocart, count: remove, count: purchase, sum: addtocart, sum: remove, sum: purchase

D.

Count: product, sum: product, count: action, sum: action

Full Access
Question # 12

Which type of workflow action sends field values to an external resource (e.g. a ticketing system)?

A.

POST

B.

Search

C.

GET

D.

Format

Full Access
Question # 13

If a calculated field has the same name as an extracted field, what happens to the extracted field?

A.

The calculated field will override the extracted field.

B.

The calculated and extracted fields will be combined.

C.

The calculated field will duplicate the extracted field.

D.

An error will be returned and the search will fail.

Full Access
Question # 14

Where are the results of eval commands stored?

A.

In a field.

B.

In an index.

C.

In a KV Store.

D.

In a database.

Full Access
Question # 15

Which of the following describes the I transaction command?

A.

It is an SPL command that groups at least two events together based on shared values in selected fields.

B.

It allows an exchange of data from one Splunk index to another Splunk index.

C.

It is an SPL command that groups events together with shared values in selected fields.

D.

It allows an exchange of data from one Splunk system to another Splunk system.

Full Access
Question # 16

When using the transaction command, what does the argument maxspan do?

A.

Sets the maximum total time between events in a transaction.

B.

Sets the maximum length of all events within a transaction.

C.

Sets the maximum total time between the earliest and latest events in a transaction.

D.

Sets the maximum length that any single event can reach to be included in the transaction.

Full Access
Question # 17

Which of these stats commands will show the total bytes for each unique combination of page and server?

A.

index=web | stats sum (bytes) BY page BY server

B.

index=web | stats sum (bytes) BY page server

C.

index=web | stats sum(bytes) BY page AND server

D.

index=web | stats sum(bytes) BY values (page) values (server)

Full Access
Question # 18

Which of the following is included with the Common Information Model (CIM) add-on?

A.

Search macros

B.

Event category tags

C.

Workflow actions

D.

tsidx files

Full Access
Question # 19

Which knowledge object is used to normalize field names to comply with the Splunk Common Information Model (CIM)?

A.

Field alias

B.

Event types

C.

Search workflow action

D.

Tags

Full Access
Question # 20

During the validation step of the Field Extractor workflow:

Select your answer.

A.

You can remove values that aren't a match for the field you want to define

B.

You can validate where the data originated from

C.

You cannot modify the field extraction

Full Access
Question # 21

Complete the search, …. | _____ failure>successes

A.

Search

B.

Where

C.

If

D.

Any of the above

Full Access
Question # 22

The macro weekly_sales (2) contains the search string:

index=games | eval ProductSales = $Price$ * $AmountSold$

Which of the following will return results?

A.

‘weekly sales (3)’

B.

‘weekly_sales($3.995, $108)’

C.

'weekly_sales (3.99, 10)’

D.

‘weekly sales (3.99, 10)’

Full Access
Question # 23

Which of the following searches will show the number of categoryld used by each host?

A.

Sourcetype=access_* |sum bytes by host

B.

Sourcetype=access_* |stats sum(categorylD. by host

C.

Sourcetype=access_* |sum(bytes) by host

D.

Sourcetype=access_* |stats sum by host

Full Access
Question # 24

which of the following are valid options with the chart command

A.

useother

B.

usenull

C.

fillfield

D.

usefiled

Full Access
Question # 25

These users can create global knowledge objects. (Select all that apply.)

A.

users

B.

power users

C.

administrators

Full Access
Question # 26

Which of the following data models are included in the Splunk Common Information Model (CIM) add-on? (select all that apply)

A.

User permissions

B.

Alerts

C.

Databases

D.

Email

Full Access
Question # 27

When you mouse over and click to add a search term this (thesE. Boolean operator(s) is(arE. not implied. (Select all that apply).

A.

OR

B.

( )

C.

AND

D.

NOT

Full Access
Question # 28

A data model consists of which three types of datasets?

A.

Constraint, field, value.

B.

Events, searches, transactions.

C.

Field extraction, regex, delimited.

D.

Transaction, session ID, metadata.

Full Access
Question # 29

What type of command is eval?

A.

Streaming in some modes

B.

Report generating

C.

Distributable streaming

D.

Centralized streaming

Full Access
Question # 30

A macro has another macro nested within it, and this inner macro requires an argument. How can the user pass this argument into the SPL?

A.

An argument can be passed through the outer macro.

B.

An argument can be passed to the outer macro by nesting parentheses.

C.

There is no way to pass an argument to the inner macro.

D.

An argument can be passed to the inner macro by nesting parentheses.

Full Access
Question # 31

Where are the descriptions of the data models that come with the Splunk Common Information Model (CIM) Add-on documented?

A.

Search and reporting user manual.

B.

CIM Add-on manual.

C.

Pivot users manual.

D.

Datamodel command reference guide.

Full Access
Question # 32

Consider the following search:

index=web sourcetype=access_corabined

The log shows several events that share the same jsesszonid value (SD462K101O2F267). View the events as a group.

From the following list, which search groups events by jSSESSIONID?

A.

index=web sourcetype=access_combined I transaction JSESSZONID I search SD462K101C2F267

B.

index=web sourcetype=access_combined SD462K101O2F267 | table JSESSIONID

C.

index=web sourcetype=access_combined | highlight JSESSIONID | search SD462K101O2F267

D.

index=web sourcetype=access_combined JSESSTONID

Full Access
Question # 33

Which of the following expressions could be used to create a calculated field called gigabytes?

A.

eval sc_bytes(1024/1024)

B.

| eval negabytes=sc_bytes(1024/1024)

C.

megabytes=sc_bytes(1024/1024)

D.

sc_bytas(1024/1024)

Full Access
Question # 34

What are search macros?

A.

Lookup definitions in lookup tables.

B.

Reusable pieces of search processing language.

C.

A method to normalize fields.

D.

Categories of search results.

Full Access
Question # 35

What is required for a macro to accept three arguments?

A.

The macro's name ends with (3).

B.

The macro's name starts with (3).

C.

The macro's argument count setting is 3 or more.

D.

Nothing, all macros can accept any number of arguments.

Full Access
Question # 36

How is a macro referenced in a search?

A.

By using the macroname command.

B.

By using the macro command.

C.

By enclosing the macro name in backtick characters (‘).

D.

By enclosing the macro name in single-quote characters (‘).

Full Access
Question # 37

What is the relationship between data models and pivots?

A.

Data models provide the datasets for pivots.

B.

Pivots and data models have no relationship.

C.

Pivots and data models are the same thing.

D.

Pivots provide the datasets for data models.

Full Access
Question # 38

What will you learn from the results of the following search?

sourcetype=cisco_esa | transaction mid, dcid, icid | timechart avg(duration)

A.

The average time elapsed during each transaction for all transactions

B.

The average time for each event within each transaction

C.

The average time between each transaction

Full Access
Question # 39

Given the macro definition below, what should be entered into the Name and Arguments fileds to correctly configured the macro?

A.

The macro name is sessiontracker and the arguments are action, JESSIONID.

B.

The macro name is sessiontracker(2) and the arguments are action, JESSIONID.

C.

The macro name is sessiontracker and the arguments are $action$, $JESSIONID$.

D.

The macro name is sessiontracker(2) and the Arguments are $action$, $JESSIONID$.

Full Access
Question # 40

Which of the following statements describes the command below (select all that apply)

Sourcetype=access_combined | transaction JSESSIONID

A.

An additional filed named maxspan is created.

B.

An additional field named duration is created.

C.

An additional field named eventcount is created.

D.

Events with the same JSESSIONID will be grouped together into a single event.

Full Access
Question # 41

Which of the following actions can the eval command perform?

A.

Remove fields from results.

B.

Create or replace an existing field.

C.

Group transactions by one or more fields.

D.

Save SPL commands to be reused in other searches.

Full Access
Question # 42

Which of the following searches will return events contains a tag name Privileged?

A.

Tag= Priv

B.

Tag= Pri*

C.

Tag= Priv*

D.

Tag= Privileged

Full Access
Question # 43

Which of the following are required to create a POST workflow action?

A.

Label, URI, search string.

B.

XMI attributes, URI, name.

C.

Label, URI, post arguments.

D.

URI, search string, time range picker.

Full Access
Question # 44

Which of the following can be used with the eval command tostring function (select all that apply)

A.

‘’hex’’

B.

‘’commas’’

C.

‘’Decimal’’

D.

‘’duration’’

Full Access
Question # 45

Which of the following workflow actions can be executed from search results? (select all that apply)

A.

GET

B.

POST

C.

LOOKUP

D.

Search

Full Access
Question # 46

What functionality does the Splunk Common Information Model (CIM) rely on to normalize fields with different names?

A.

Macros.

B.

Field aliases.

C.

The rename command.

D.

CIM does not work with different names for the same field.

Full Access
Question # 47

Calculated fields can be based on which of the following?

A.

Tags

B.

Extracted fields

C.

Output fields for a lookup

D.

Fields generated from a search string

Full Access
Question # 48

When creating a Search workflow action, which field is required?

A.

Search string

B.

Data model name

C.

Permission setting

D.

An eval statement

Full Access
Question # 49

Which delimiters can the Field Extractor (FX) detect? (select all that apply)

A.

Tabs

B.

Pipes

C.

Spaces

D.

Commas

Full Access
Question # 50

Which of the following statements describes this search?

sourcetype=access_combined I transaction JSESSIONID | timechart avg (duration)

A.

This is a valid search and will display a timechart of the average duration, of each transaction event.

B.

This is a valid search and will display a stats table showing the maximum pause among transactions.

C.

No results will be returned because the transaction command must include the startswith and endswith options.

D.

No results will be returned because the transaction command must be the last command used in the search pipeline.

Full Access
Question # 51

Which of the following knowledge objects represents the output of an eval expression?

A.

Eval fields

B.

Calculated fields

C.

Field extractions

D.

Calculated lookups

Full Access
Question # 52

Which of the following file formats can be extracted using a delimiter field extraction?

A.

CSV

B.

PDF

C.

XML

D.

JSON

Full Access
Question # 53

When performing a regular expression (regex) field extraction using the Field Extractor (FX), what happens when the require option is used?

A.

The regex can no longer be edited.

B.

The field being extracted will be required for all future events.

C.

The events without the required field will not display in searches.

D.

Only events with the required string will be included in the extraction.

Full Access
Question # 54

What does the fillnull command replace null values with, it the value argument is not specified?

A.

0

B.

N/A

C.

NaN

D.

NULL

Full Access
Question # 55

Which of the following statements describe the search below? (select all that apply)

Index=main I transaction clientip host maxspan=30s maxpause=5s

A.

Events in the transaction occurred within 5 seconds.

B.

It groups events that share the same clientip and host.

C.

The first and last events are no more than 5 seconds apart.

D.

The first and last events are no more than 30 seconds apart.

Full Access
Question # 56

By default search results are not returned in ________ order.

A.

Chronological

B.

Reverser chronological

C.

ASCIE

D.

Alphabetical

Full Access
Question # 57

Which of these is NOT a field that is automatically created with the transaction command?

A.

maxcount

B.

duration

C.

eventcount

Full Access
Question # 58

Which of the following statements describes macros?

A.

A macro is a reusable search string that must contain the full search.

B.

A macro is a reusable search string that must have a fixed time range.

C.

A macro Is a reusable search string that may have a flexible time range.

D.

A macro Is a reusable search string that must contain only a portion of the search.

Full Access
Question # 59

Which of the following statements describe the search string below?

| datamodel Application_State All_Application_State search

A.

Evenrches would return a report of sales by state.

B.

Events will be returned from the data model named Application_State.

C.

Events will be returned from the data model named All_Application_state.

D.

No events will be returned because the pipe should occur after the datamodel command

Full Access
Question # 60

Which are valid ways to create an event type? (select all that apply)

A.

By using the searchtypes command in the search bar.

B.

By editing the event_type stanza in the props.conf file.

C.

By going to the Settings menu and clicking Event Types > New.

D.

By selecting an event in search results and clicking Event Actions > Build Event Type.

Full Access
Question # 61

Which of the following statements describes Search workflow actions?

A.

By default. Search workflow actions will run as a real-time search.

B.

Search workflow actions can be configured as scheduled searches,

C.

The user can define the time range of the search when created the workflow action.

D.

Search workflow actions cannot be configured with a search string that includes the transaction command

Full Access
Question # 62

A user wants to convert numeric field values to strings and also to sort on those values.

Which command should be used first, the eval or the sort?

A.

It doesn't matter whether eval or sort is used first.

B.

Convert the numeric to a string with eval first, then sort.

C.

Use sort first, then convert the numeric to a string with eval.

D.

You cannot use the sort command and the eval command on the same field.

Full Access
Question # 63

Which group of users would most likely use pivots?

A.

Users

B.

Architects

C.

Administrators

D.

Knowledge Managers

Full Access
Question # 64

Based on the macro definition shown below, what is the correct way to execute the macro in a search string?

A.

Convert_sales (euro, €, 79)”

B.

Convert_sales (euro, €, .79)

C.

Convert_sales ($euro,$€$,s79$

D.

Convert_sales ($euro, $€$,S,79$)

Full Access
Question # 65

Which one of the following statements about the search command is true?

A.

It does not allow the use of wildcards.

B.

It treats field values in a case-sensitive manner.

C.

It can only be used at the beginning of the search pipeline.

D.

It behaves exactly like search strings before the first pipe.

Full Access
Question # 66

What does the Splunk Common Information Model (CIM) add-on include? (select all that apply)

A.

Custom visualizations

B.

Pre-configured data models

C.

Fields and event category tags

D.

Automatic data model acceleration

Full Access
Question # 67

Which of the following is the correct way to use the data model command to search field in the data model within the web dataset?

A.

| datamodel web search | filed web *

B.

| Search datamodel web web | filed web*

C.

| datamodel web web field | search web*

D.

Datamodel=web | search web | filed web*

Full Access
Question # 68

What are the two parts of a root event dataset?

A.

Fields and variables.

B.

Fields and attributes.

C.

Constraints and fields.

D.

Constraints and lookups.

Full Access
Question # 69

In what order arc the following knowledge objects/configurations applied?

A.

Field Aliases, Field Extractions, Lookups

B.

Field Extractions, Field Aliases, Lookups

C.

Field Extractions, Lookups, Field Aliases

D.

Lookups, Field Aliases, Field Extractions

Full Access
Question # 70

When should you use the transaction command instead of the scats command?

A.

When you need to group on multiple values.

B.

When duration is irrelevant in search results. .

C.

When you have over 1000 events in a transaction.

D.

When you need to group based on start and end constraints.

Full Access
Question # 71

Which of the following statements about event types is true? (select all that apply)

A.

Event types can be tagged.

B.

Event types must include a time range,

C.

Event types categorize events based on a search.

D.

Event types can be a useful method for capturing and sharing knowledge.

Full Access
Question # 72

Selected fields are displayed ______each event in the search results.

A.

below

B.

interesting fields

C.

other fields

D.

above

Full Access
Question # 73

Which of the following describes the Splunk Common Information Model (CIM) add-on?

A.

The CIM add-on uses machine learning to normalize data.

B.

The CIM add-on contains dashboards that show how to map data.

C.

The CIM add-on contains data models to help you normalize data.

D.

The CIM add-on is automatically installed in a Splunk environment.

Full Access
Question # 74

Which of the following statements about tags is true?

A.

Tags are case insensitive.

B.

Tags are created at index time.

C.

Tags can make your data more understandable.

D.

Tags are searched by using the syntax tag: :

Full Access
Question # 75

Which of the following statements about data models and pivot are true? (select all that apply)

A.

They are both knowledge objects.

B.

Data models are created out of datasets called pivots.

C.

Pivot requires users to input SPL searches on data models.

D.

Pivot allows the creation of data visualizations that present different aspects of a data model.

Full Access
Question # 76

A field alias has been created based on an original field. A search without any transforming commands is then executed in Smart Mode. Which field name appears in the results?

A.

Both will appear in the All Fields list, but only if the alias is specified in the search.

B.

Both will appear in the Interesting Fields list, but only if they appear in at least 20 percent of events.

C.

The original field only appears in All Fields list and the alias only appears in the Interesting Fields list.

D.

The alias only appears in the All Fields list and the original field only appears in the Interesting Fields list.

Full Access
Question # 77

Which of the following statements describe data model acceleration? (select all that apply)

A.

Root events cannot be accelerated.

B.

Accelerated data models cannot be edited.

C.

Private data models cannot be accelerated.

D.

You must have administrative permissions or the accelerate_dacamodel capability to accelerate a data model.

Full Access