Black Friday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Splunk > Splunk Enterprise Certified Admin > SPLK-1003

SPLK-1003 Splunk Enterprise Certified Admin Question and Answers

Question # 4

What are the required stanza attributes when configuring the transforms. conf to manipulate or remove events?

A.

REGEX, DEST. FORMAT

B.

REGEX.SRC_KEY, FORMAT

C.

REGEX, DEST_KEY, FORMAT

D.

REGEX, DEST_KEY FORMATTING

Full Access
Question # 5

After an Enterprise Trial license expires, it will automatically convert to a Free license. How many days is an Enterprise Trial license valid before this conversion occurs?

A.

90 days

B.

60 days

C.

7 days

D.

14 days

Full Access
Question # 6

What is the default purpose of a Splunk Deployment Server?

A.

To stage and deploy updates to /etc/pcer-apps/

B.

To stage and deploy updates to $SPLUNK_HOME/etc/apps/

C.

To stage and deploy updates to /etc/manager-apps/

D.

To stage and deploy updates to /etc/deployment-apps/

Full Access
Question # 7

During search time, which directory of configuration files has the highest precedence?

A.

$SFLUNK_KOME/etc/system/local

B.

$SPLUNK_KCME/etc/system/default

C.

$SPLUNK_HCME/etc/apps/app1/local

D.

$SPLUNK HCME/etc/users/admin/local

Full Access
Question # 8

What is required when adding a native user to Splunk? (select all that apply)

A.

Password

B.

Username

C.

Full Name

D.

Default app

Full Access
Question # 9

Which optional configuration setting in inputs .conf allows you to selectively forward the data to specific indexer(s)?

A.

_TCP_ROUTING

B.

_INDEXER_LIST

C.

_INDEXER_GROUP

D.

_INDEXER ROUTING

Full Access
Question # 10

What is the correct curl to send multiple events through HTTP Event Collector?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 11

Which of the following types of data count against the license daily quota?

A.

Replicated data

B.

splunkd logs

C.

Summary index data

D.

Windows internal logs

Full Access
Question # 12

Which of the following apply to how distributed search works? (select all that apply)

A.

The search head dispatches searches to the peers

B.

The search peers pull the data from the forwarders.

C.

Peers run searches in parallel and return their portion of results.

D.

The search head consolidates the individual results and prepares reports

Full Access
Question # 13

A Universal Forwarder is collecting two separate sources of data (A,B). Source A is being routed through a Heavy Forwarder and then to an indexer. Source B is being routed directly to the indexer. Both sets of data require the masking of raw text strings before being written to disk. What does the administrator need to do to

ensure that the masking takes place successfully?

A.

Make sure that props . conf and transforms . conf are both present on the in-dexer and the search head.

B.

For source A, make sure that props . conf is in place on the indexer; and for source B, make sure transforms . conf is present on the Heavy Forwarder.

C.

Make sure that props . conf and transforms . conf are both present on the Universal Forwarder.

D.

Place both props . conf and transforms . conf on the Heavy Forwarder for source A, and place both props . conf and transforms . conf on the indexer for source B.

Full Access
Question # 14

When using license pools, volume allocations apply to which Splunk components?

A.

Indexers

B.

Indexes

C.

Heavy Forwarders

D.

Search Heads

Full Access
Question # 15

Which of the following is valid distribute search group?

A)

B)

C)

D)

A.

option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 16

Which of the following applies only to Splunk index data integrity check?

A.

Lookup table

B.

Summary Index

C.

Raw data in the index

D.

Data model acceleration

Full Access
Question # 17

Where are deployment server apps mapped to clients?

A.

Apps tab in forwarder management interface or clientapps.conf.

B.

Clients tab in forwarder management interface or deploymentclient.conf.

C.

Server Classes tab in forwarder management interface or serverclass.conf.

D.

Client Applications tab in forwarder management interface or clientapps.conf.

Full Access
Question # 18

A user recently installed an application to index NCINX access logs. After configuring the application, they realize that no data is being ingested. Which configuration file do they need to edit to ingest the access logs to ensure it remains unaffected after upgrade?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 19

What is the order of precedence (from lowest → highest) within serverclass.conf in which attributes will be expressed?

A.

[global] → [serverClass:] → [serverClass::client:]

B.

[global] → [serverClass:] → [app:]

C.

[global] → [serverClass:] → [serverClass::app:]

D.

[global] → [serverClass:] → [serverClass::client::user:]

Full Access
Question # 20

Which of the following is the use case for the deployment server feature of Splunk?

A.

Managing distributed workloads in a Splunk environment.

B.

Automating upgrades of Splunk forwarder installations on endpoints.

C.

Orchestrating the operations and scale of a containerized Splunk deployment.

D.

Updating configuration and distributing apps to processing components, primarily forwarders.

Full Access
Question # 21

Which forwarder is recommended by Splunk to use in a production environment?

A.

Heavy forwarder

B.

SSL forwarder

C.

Lightweight forwarder

D.

Universal forwarder

Full Access
Question # 22

Which valid bucket types are searchable? (select all that apply)

A.

Hot buckets

B.

Cold buckets

C.

Warm buckets

D.

Frozen buckets

Full Access
Question # 23

Immediately after installation, what will a Universal Forwarder do first?

A.

Automatically detect any indexers in its subnet and begin routing data.

B.

Begin generating internal Splunk logs.

C.

Begin reading local files on its server.

D.

Send an email to the operator that the installation process has completed.

Full Access
Question # 24

There is a file with a vast amount of old data. Which of the following inputs.conf attributes would allow an admin to monitor the file for updates without indexing the pre-existing data?

A.

IgnoreOlderThan

B.

allowList

C.

monitor

D.

followTail

Full Access
Question # 25

What is the name of the object that stores events inside of an index?

A.

Container

B.

Bucket

C.

Data layer

D.

Indexer

Full Access
Question # 26

In addition to single, non-clustered Splunk instances, what else can the deployment server push apps to?

A.

Universal forwarders

B.

Splunk Cloud

C.

Linux package managers

D.

Windows using WMI

Full Access
Question # 27

Which of the following is true when authenticating users to Splunk using LDAP?

A.

LDAP group names must match the Splunk role name defined in authorize.conf.

B.

Splunk will search each LDAP strategy in the order in which they are listed in authentication.conf.

C.

Splunk only supports encrypted LDAP connections.

D.

LDAP will take precedence over local users with the same username as defined in etc/passwd.

Full Access
Question # 28

Local user accounts created in Splunk store passwords in which file?

A.

$ SFLUNK_HOME/etc/passwd

B.

$ SFLUNK_HOME/etc/authentication

C.

$ S?LUNK_HOME/etc/users/passwd.conf

D.

$ SPLUNK HOME/etc/users/authentication.conf

Full Access
Question # 29

Running this search in a distributed environment:

On what Splunk component does the eval command get executed?

A.

Heavy Forwarders

B.

Universal Forwarders

C.

Search peers

D.

Search heads

Full Access
Question # 30

This file has been manually created on a universal forwarder

A new Splunk admin comes in and connects the universal forwarders to a deployment server and deploys the same app with a new

Which file is now monitored?

A.

/var/log/messages

B.

/var/log/maillog

C.

/var/log/maillog and /var/log/messages

D.

none of the above

Full Access
Question # 31

Which of the following are supported options when configuring optional network inputs?

A.

Metadata override, sender filtering options, network input queues (quantum queues)

B.

Metadata override, sender filtering options, network input queues (memory/persistent queues)

C.

Filename override, sender filtering options, network output queues (memory/persistent queues)

D.

Metadata override, receiver filtering options, network input queues (memory/persistent queues)

Full Access
Question # 32

A Universal Forwarder has the following active stanza in inputs . conf:

[monitor: //var/log]

disabled = O

host = 460352847

An event from this input has a timestamp of 10:55. What timezone will Splunk add to the event as part of indexing?

A.

Universal Coordinated Time.

B.

The timezone of the search head.

C.

The timezone of the indexer that indexed the event.

D.

The timezone of the forwarder.

Full Access
Question # 33

Which Splunk component(s) would break a stream of syslog inputs into individual events? (select all that apply)

A.

Universal Forwarder

B.

Search head

C.

Heavy Forwarder

D.

Indexer

Full Access
Question # 34

After configuring a universal forwarder to communicate with an indexer, which index can be checked via the Splunk Web UI for a successful connection?

A.

index=main

B.

index=test

C.

index=summary

D.

index=_internal

Full Access
Question # 35

Which of the following statements accurately describes using SSL to secure the feed from a forwarder?

A.

It does not encrypt the certificate password.

B.

SSL automatically compresses the feed by default.

C.

It requires that the forwarder be set to compressed=true.

D.

It requires that the receiver be set to compression=true.

Full Access
Question # 36

All search-time field extractions should be specified on which Splunk component?

A.

Deployment server

B.

Universal forwarder

C.

Indexer

D.

Search head

Full Access
Question # 37

What is the difference between the two wildcards ... and - for the monitor stanza in inputs, conf?

A.

... is not supported in monitor stanzas

B.

There is no difference, they are interchangable and match anything beyond directory boundaries.

C.

* matches anything in that specific directory path segment, whereas ... recurses through subdirectories as well.

D.

... matches anything in that specific directory path segment, whereas - recurses through subdirectories as well.

Full Access
Question # 38

Where should apps be located on the deployment server that the clients pull from?

A.

$SFLUNK_KOME/etc/apps

B.

$SPLUNK_HCME/etc/sear:ch

C.

$SPLUNK_HCME/etc/master-apps

D.

$SPLUNK HCME/etc/deployment-apps

Full Access
Question # 39

Which option accurately describes the purpose of the HTTP Event Collector (HEC)?

A.

A token-based HTTP input that is secure and scalable and that requires the use of forwarders

B.

A token-based HTTP input that is secure and scalable and that does not require the use of forwarders.

C.

An agent-based HTTP input that is secure and scalable and that does not require the use of forwarders.

D.

A token-based HTTP input that is insecure and non-scalable and that does not require the use of forwarders.

Full Access
Question # 40

A request has been made to restrict lookup files up to 500 megabytes for replication. Anything larger should not be replicated. Which of the following parameters provides the correct control for this scenario?

A.

maxBundleSize

B.

maxMemoryBundleSize

C.

excludeReplicatedLookupSize

D.

includeReplicatedLookupSize

Full Access
Question # 41

Which of the following are available input methods when adding a file input in Splunk Web? (Choose all that

apply.)

A.

Index once.

B.

Monitor interval.

C.

On-demand monitor.

D.

Continuously monitor.

Full Access
Question # 42

An admin oversees an environment with a 1000 GBI day license. The configuration file

server.conf has strict pool quota=false set. The license is divided into the following three pools, and today's usage is shown on the right-hand column:

PoolLicense SizeToday's usage

X500 GB/day100 GB

Y350 GB/day400 GB

Z150 GB/day300 GB

Given this, which pool(s) are issued warnings?

A.

All pools

B.

Z only

C.

None

D.

Y and Z

Full Access
Question # 43

Which of the following Splunk components require a separate installation package?

A.

Deployment server

B.

License master

C.

Universal forwarder

D.

Heavy forwarder

Full Access
Question # 44

How is a remote monitor input distributed to forwarders?

A.

As an app.

B.

As a forward.conf file.

C.

As a monitor.conf file.

D.

As a forwarder monitor profile.

Full Access
Question # 45

Which of the following are required when defining an index in indexes. conf? (select all that apply)

A.

coldPath

B.

homePath

C.

frozenPath

D.

thawedPath

Full Access
Question # 46

Which pathway represents where a network input in Splunk might be found?

A.

$SPLUNK HOME/ etc/ apps/ ne two r k/ inputs.conf

B.

$SPLUNK HOME/ etc/ apps/ $appName/ local / inputs.conf

C.

$SPLUNK HOME/ system/ local /udp.conf

D.

$SPLUNK HOME/ var/lib/ splunk/$inputName/homePath/

Full Access
Question # 47

Which Splunk configuration file is used to enable data integrity checking?

A.

props.conf

B.

global.conf

C.

indexes.conf

D.

data_integrity.conf

Full Access
Question # 48

Which of the following statements describe deployment management? (select all that apply)

A.

Requires an Enterprise license

B.

Is responsible for sending apps to forwarders.

C.

Once used, is the only way to manage forwarders

D.

Can automatically restart the host OS running the forwarder.

Full Access
Question # 49

How is data handled by Splunk during the input phase of the data ingestion process?

A.

Data is treated as streams.

B.

Data is broken up into events.

C.

Data is initially written to disk.

D.

Data is measured by the license meter.

Full Access
Question # 50

The priority of layered Splunk configuration files depends on the file's:

A.

Owner

B.

Weight

C.

Context

D.

Creation time

Full Access
Question # 51

The CLI command splunk add forward-server indexer: will create stanza(s) in

which configuration file?

A.

inputs.conf

B.

indexes.conf

C.

outputs.conf

D.

servers.conf

Full Access
Question # 52

In which Splunk configuration is the SEDCMD used?

A.

props, conf

B.

inputs.conf

C.

indexes.conf

D.

transforms.conf

Full Access
Question # 53

When configuring monitor inputs with whitelists or blacklists, what is the supported method of filtering the lists?

A.

Slash notation

B.

Regular expression

C.

Irregular expression

D.

Wildcard-only expression

Full Access
Question # 54

Which of the methods listed below supports muti-factor authentication?

A.

Lightweight Directory Access Protocol (LDAP)

B.

Security Assertion Markup Language (SAML)

C.

Single Sign-on (SSO)

D.

OpenlD

Full Access
Question # 55

Which configuration file would be used to forward the Splunk internal logs from a search head to the indexer?

A.

props.conf

B.

inputs.conf

C.

outputs.conf

D.

collections.conf

Full Access
Question # 56

What action is required to enable forwarder management in Splunk Web?

A.

Navigate to Settings > Server Settings > General Settings, and set an App server port.

B.

Navigate to Settings > Forwarding and receiving, and click on Enable Forwarding.

C.

Create a server class and map it to a client inSPLUNK_HOME/etc/system/local/serverclass.conf.

D.

Place an app in theSPLUNK_HOME/etc/deployment-appsdirectory of the deployment server.

Full Access
Question # 57

Which of the following is the recommended guideline for creating a new user role?

A.

Create a role that incorporates capabilities and index inheritance.

B.

Create a new unique role for each unique user.

C.

There are no recommended guidelines when creating new user roles.

D.

Create two roles based on capabilities and indexes, then utilize inheritance.

Full Access
Question # 58

Social Security Numbers (PII) data is found in log events, which is against company policy. SSN format is as

follows: 123-44-5678.

Which configuration file and stanza pair will mask possible SSNs in the log events?

A.

props.conf[mask-SSN]REX = (?ms)^(.)\<[SSN>\d{3}-?\d{2}-?(\d{4}.*)$"FORMAT = $1###-##-$2KEY = _raw

B.

props.conf[mask-SSN]REGEX = (?ms)^(.)\<[SSN>\d{3}-?\d{2}-?(\d{4}.*)$"FORMAT = $1###-##-$2DEST_KEY = _raw

C.

transforms.conf[mask-SSN]REX = (?ms)^(.)\<[SSN>\d{3}-?\d{2}-?(\d{4}.*)$"FORMAT = $1###-##-$2DEST_KEY = _raw

D.

transforms.conf[mask-SSN]REGEX = (?ms)^(.)\<[SSN>\d{3}-?\d{2}-?(\d{4}.*)$"FORMAT = $1###-##-$2DEST_KEY = _raw

Full Access
Question # 59

Which of the following is accurate regarding the input phase?

A.

Breaks data into events with timestamps.

B.

Applies event-level transformations.

C.

Fine-tunes metadata.

D.

Performs character encoding.

Full Access
Question # 60

Which feature of Splunk’s role configuration can be used to aggregate multiple roles intended for groups of

users?

A.

Linked roles

B.

Grantable roles

C.

Role federation

D.

Role inheritance

Full Access