Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Splunk > Splunk Enterprise Certified Admin > SPLK-1003

SPLK-1003 Splunk Enterprise Certified Admin Question and Answers

Question # 4

Which pathway represents where a network input in Splunk might be found?

A.

$SPLUNK HOME/ etc/ apps/ ne two r k/ inputs.conf

B.

$SPLUNK HOME/ etc/ apps/ $appName/ local / inputs.conf

C.

$SPLUNK HOME/ system/ local /udp.conf

D.

$SPLUNK HOME/ var/lib/ splunk/$inputName/homePath/

Full Access
Question # 5

Which of the following is the recommended guideline for creating a new user role?

A.

Create a role that incorporates capabilities and index inheritance.

B.

Create a new unique role for each unique user.

C.

There are no recommended guidelines when creating new user roles.

D.

Create two roles based on capabilities and indexes, then utilize inheritance.

Full Access
Question # 6

On the deployment server, administrators can map clients to server classes using client filters. Which of the

following statements is accurate?

A.

The blacklist takes precedence over the whitelist.

B.

The whitelist takes precedence over the blacklist.

C.

Wildcards are not supported in any client filters.

D.

Machine type filters are applied before the whitelist and blacklist.

Full Access
Question # 7

A Universal Forwarder is monitoring a very active syslog stream and as a result is unable to switch between destinations. How would an admin safely remediate this issue?

A.

Configure and enable the LINE_BREAKER on the forwarder.

B.

Configure useAck on the forwarder.

C.

Configure forceTimebasedAutoLB on the forwarder.

D.

Configure and enable the FVFNT BREAKER on the forwarder.

Full Access
Question # 8

Where can scripts for scripted inputs reside on the host file system? (select all that apply)

A.

$SFLUNK_HOME/bin/scripts

B.

$SPLUNK_HOME/etc/apps/bin

C.

$SPLUNK_HOME/etc/system/bin

D.

$S?LUNK_HOME/etc/apps//bin_

Full Access
Question # 9

Which of the following statements accurately describes using SSL to secure the feed from a forwarder?

A.

It does not encrypt the certificate password.

B.

SSL automatically compresses the feed by default.

C.

It requires that the forwarder be set to compressed=true.

D.

It requires that the receiver be set to compression=true.

Full Access
Question # 10

Which of the following statements apply to directory inputs? {select all that apply)

A.

All discovered text files are consumed.

B.

Compressed files are ignored by default

C.

Splunk recursively traverses through the directory structure.

D.

When adding new log files to a monitored directory, the forwarder must be restarted to take them into account.

Full Access
Question # 11

Which of the following methods will connect a deployment client to a deployment server? (select all that apply)

A.

Run $SPLUNK_ROME/bin/ splunk set deploy-poll : from the command line of the deployment client.

B.

Create and edit a deploymentserver . conf file in SSPLVNE{ on the deployment server.

C.

Create and edit a deploymentclient . conf file in SSPLTJNE( EOME/etc/ system/local on the deployment client.

D.

Run $SPLUNK ROME/bin/spiunk set deploy-poi i : from the command line of the deployment server.

Full Access
Question # 12

What is the correct order of steps in Duo Multifactor Authentication?

A.

1 Request Login2. Connect to SAML server3 Duo MFA4 Create User session5 Authentication Granted 6. Log into Splunk

B.

1. Request Login 2 Duo MFA3. Authentication Granted 4 Connect to SAML server5. Log into Splunk6. Create User session

C.

1 Request Login2 Check authentication / group mapping3 Authentication Granted4. Duo MFA5. Create User session6. Log into Splunk

D.

1 Request Login 2 Duo MFA3. Check authentication / group mapping4 Create User session5. Authentication Granted6 Log into Splunk

Full Access
Question # 13

An admin updates the Role to Group mapping for external authentication. How does the change affect users that are currently logged into Splunk?

A.

Users will continue to operate under their previous role until the next time they log into Splunk.

B.

Search is disabled until users reauthenticate.

C.

Only newly created user accounts are affected by the role change.

D.

The role update terminates the user’s current session, and they have to log back in.

Full Access
Question # 14

Immediately after installation, what will a Universal Forwarder do first?

A.

Automatically detect any indexers in its subnet and begin routing data.

B.

Begin generating internal Splunk logs.

C.

Begin reading local files on its server.

D.

Send an email to the operator that the installation process has completed.

Full Access
Question # 15

Which of the following applies only to Splunk index data integrity check?

A.

Lookup table

B.

Summary Index

C.

Raw data in the index

D.

Data model acceleration

Full Access
Question # 16

What hardware attribute would need to be changed to increase the number of simultaneous searches (ad-hoc and scheduled) on a single search head?

A.

Disk

B.

CPUs

C.

Memory

D.

Network interface cards

Full Access
Question # 17

Which of the following apply to how distributed search works? (select all that apply)

A.

The search head dispatches searches to the peers

B.

The search peers pull the data from the forwarders.

C.

Peers run searches in parallel and return their portion of results.

D.

The search head consolidates the individual results and prepares reports

Full Access
Question # 18

What type of Splunk license is pre-selected in a brand new Splunk installation?

A.

Free license

B.

Forwarder license

C.

Enterprise trial license

D.

Enterprise license

Full Access
Question # 19

What will the following inputs. conf stanza do?

[script://myscript . sh]

Interval=0

A.

The script will run at the default interval of 60 seconds.

B.

The script will not be run.

C.

The script will be run only once for each time Splunk is restarted.

D.

The script will be run. As soon as the script exits, Splunk restarts it.

Full Access
Question # 20

Which forwarder type can parse data prior to forwarding?

A.

Universal forwarder

B.

Heaviest forwarder

C.

Hyper forwarder

D.

Heavy forwarder

Full Access
Question # 21

When deploying apps on Universal Forwarders using the deployment server, what is the correct component and location of the app before it is deployed?

A.

On Universal Forwarder, $SPLUNK_HOME/etc/apps

B.

On Deployment Server, $SPLUNK_HOME/etc/apps

C.

On Deployment Server, $SPLUNK_HOME/etc/deployment-apps

D.

On Universal Forwarder, $SPLUNK_HOME/etc/deployment-apps

Full Access
Question # 22

When should the Data Preview feature be used?

A.

When extracting fields for ingested data.

B.

When previewing the data before searching.

C.

When reviewing data on the source host.

D.

When validating the parsing of data.

Full Access
Question # 23

Which of the following is a valid method to create a Splunk user?

A.

Create a support ticket.

B.

Create a user on the host operating system.

C.

Splunk REST API.

D.

Add the username to users. conf.

Full Access
Question # 24

When Splunk is integrated with LDAP, which attribute can be changed in the Splunk UI for an LDAP user?

A.

Default app

B.

LDAP group

C.

Password

D.

Username

Full Access
Question # 25

Which data pipeline phase is the last opportunity for defining event boundaries?

A.

Input phase

B.

Indexing phase

C.

Parsing phase

D.

Search phase

Full Access
Question # 26

Which option accurately describes the purpose of the HTTP Event Collector (HEC)?

A.

A token-based HTTP input that is secure and scalable and that requires the use of forwarders

B.

A token-based HTTP input that is secure and scalable and that does not require the use of forwarders.

C.

An agent-based HTTP input that is secure and scalable and that does not require the use of forwarders.

D.

A token-based HTTP input that is insecure and non-scalable and that does not require the use of forwarders.

Full Access
Question # 27

What are the required stanza attributes when configuring the transforms. conf to manipulate or remove events?

A.

REGEX, DEST. FORMAT

B.

REGEX.SRC_KEY, FORMAT

C.

REGEX, DEST_KEY, FORMAT

D.

REGEX, DEST_KEY FORMATTING

Full Access
Question # 28

How would you configure your distsearch conf to allow you to run the search below? sourcetype=access_combined status=200 action=purchase splunk_setver_group=HOUSTON

A)

B)

C)

D)

A.

option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 29

How is data handled by Splunk during the input phase of the data ingestion process?

A.

Data is treated as streams.

B.

Data is broken up into events.

C.

Data is initially written to disk.

D.

Data is measured by the license meter.

Full Access
Question # 30

Which layers are involved in Splunk configuration file layering? (select all that apply)

A.

App context

B.

User context

C.

Global context

D.

Forwarder context

Full Access
Question # 31

An organization wants to collect Windows performance data from a set of clients, however, installing Splunk

software on these clients is not allowed. What option is available to collect this data in Splunk Enterprise?

A.

Use Local Windows host monitoring.

B.

Use Windows Remote Inputs with WMI.

C.

Use Local Windows network monitoring.

D.

Use an index with an Index Data Type of Metrics.

Full Access
Question # 32

A new forwarder has been installed with a manually createddeploymentclient.conf.

What is the next step to enable the communication between the forwarder and the deployment server?

A.

Restart Splunk on the deployment server.

B.

Enable the deployment client in Splunk Web under Forwarder Management.

C.

Restart Splunk on the deployment client.

D.

Wait for up to the time set in thephoneHomeIntervalInSecssetting.

Full Access
Question # 33

Which artifact is required in the request header when creating an HTTP event?

A.

ackID

B.

Token

C.

Manifest

D.

Host name

Full Access
Question # 34

A security team needs to ingest a static file for a specific incident. The log file has not been collected previously and future updates to the file must not be indexed.

Which command would meet these needs?

A.

splunk add one shot / opt/ incident [data .log —index incident

B.

splunk edit monitor /opt/incident/data.* —index incident

C.

splunk add monitor /opt/incident/data.log —index incident

D.

splunk edit oneshot [opt/ incident/data.* —index incident

Full Access
Question # 35

In a customer managed Splunk Enterprise environment, what is the endpoint URI used to collect data?

A.

services/collector

B.

data/collector

C.

services/inputs?raw

D.

services/data/collector

Full Access
Question # 36

When using license pools, volume allocations apply to which Splunk components?

A.

Indexers

B.

Indexes

C.

Heavy Forwarders

D.

Search Heads

Full Access
Question # 37

Which of the following Splunk components require a separate installation package?

A.

Deployment server

B.

License master

C.

Universal forwarder

D.

Heavy forwarder

Full Access
Question # 38

Which of the following authentication types requires scripting in Splunk?

A.

ADFS

B.

LDAP

C.

SAML

D.

RADIUS

Full Access
Question # 39

What action could be taken to prevent a license warning with an ingest-based license?

A.

Add a new license before midnight on the indexer(s).

B.

Delete the data before midnight on the indexer(s).

C.

Add a new license before midnight on the license manager.

D.

Delete the data before midnight on the license manager.

Full Access
Question # 40

This file has been manually created on a universal forwarder

A new Splunk admin comes in and connects the universal forwarders to a deployment server and deploys the same app with a new

Which file is now monitored?

A.

/var/log/messages

B.

/var/log/maillog

C.

/var/log/maillog and /var/log/messages

D.

none of the above

Full Access
Question # 41

UsingSEDCMDinprops.confallows raw data to be modified. With the given event below, which option will mask the first three digits of theAcctIDfield resulting output:[22/Oct/2018:15:50:21] VendorID=1234 Code=B AcctID=xxx5309

Event:

[22/Oct/2018:15:50:21] VendorID=1234 Code=B AcctID=xxx5309

A.

SEDCMD-1acct = s/VendorID=\d{3}(\d{4})/VendorID=xxx/g

B.

SEDCMD-xxxAcct = s/AcctID=\d{3}(\d{4})/AcctID=xxx/g

C.

SEDCMD-1acct = s/AcctID=\d{3}(\d{4})/AcctID=\1xxx/g

D.

SEDCMD-1acct = s/AcctID=\d{3}(\d{4})/AcctID=xxx\1/g

Full Access
Question # 42

Which authentication methods are natively supported within Splunk Enterprise? (select all that apply)

A.

LDAP

B.

SAML

C.

RADIUS

D.

Duo Multifactor Authentication

Full Access
Question # 43

Which of the following lists the three phases of the Splunk Indexing process in order?

A.

Ingest phaseLicensing phaseParsing phase

B.

Sourcetype phaseIndex phaseWrite-to-disk phase

C.

Input phaseParsing phaseIndexing phase

D.

Ingest phaseTransforming phaseIndexing phase

Full Access
Question # 44

Which scenario is applicable given the stanzas in authentication.conf below?

[authentication]

externalTwoFactorAuthVendor = Duo

externalTwoFactorAuthSettings = duoMFA

[duoMFA]

integrationKey = aGFwcHliaXJ0aGRheU1pZGR5

secretKey = YXVzdHJhaWxpYW5Gb3JHcmVw

applicationKey = c3BsaW5raW5ndGhlcGx1bWJ1c3NpbmN1OTU

apiHostname = 466993018.duosecurity.com

failOpen = True

timeout = 60

A.

If Splunk cannot connect to the multifactor authentication provider, all logins will be denied.

B.

Multifactor authentication is required to log into the host operating system.

C.

The secretKey does not need to be protected since multifactor authentication is turned on.

D.

If Splunk cannot connect to the multifactor authentication provider, authentications will be successful without completing a multifactor challenge.

Full Access
Question # 45

Which of the following is an acceptable channel value when using the HTTP Event Collector indexer acknowledgment capability?

A.

GUID

B.

DNS

C.

Hash Checksum

D.

IP Address

Full Access
Question # 46

Which of the following indexes come pre-configured with Splunk Enterprise? (select all that apply)

A.

_license

B.

_lnternal

C.

_external

D.

_thefishbucket

Full Access
Question # 47

Which Splunk indexer operating system platform is supported when sending logs from a Windows universal forwarder?

A.

Any OS platform

B.

Linux platform only

C.

Windows platform only.

D.

None of the above.

Full Access
Question # 48

After how many warnings within a rolling 30-day period will a license violation occur with an enforced

Enterprise license?

A.

1

B.

3

C.

4

D.

5

Full Access
Question # 49

Which is a valid stanza for a network input?

A.

[udp://172.16.10.1:9997]connection = dnssourcetype = dns

B.

[any://172.16.10.1:10001]connection_host = ipsourcetype = web

C.

[tcp://172.16.10.1:9997]connection_host = websourcetype = web

D.

[tcp://172.16.10.1:10001]connection_host = dnssourcetype = dns

Full Access
Question # 50

What happens when there are conflicting settings within two or more configuration files?

A.

The setting is ignored until conflict is resolved.

B.

The setting for both values will be used together.

C.

The setting with the lowest precedence is used.

D.

The setting with the highest precedence is used.

Full Access
Question # 51

Which default Splunk role could be assigned to provide users with the following capabilities?

Create saved searches

Edit shared objects and alerts

Not allowed to create custom roles

A.

admin

B.

power

C.

user

D.

splunk-system-role

Full Access
Question # 52

When using a directory monitor input, specific source type can be selectively overridden using which configuration file?

A.

props.conf

B.

sourcetypes.conf

C.

transforms.conf

D.

outputs.conf

Full Access
Question # 53

The priority of layered Splunk configuration files depends on the file's:

A.

Owner

B.

Weight

C.

Context

D.

Creation time

Full Access
Question # 54

Which of the following describes a Splunk deployment server?

A.

A Splunk Forwarder that deploys data to multiple indexers.

B.

A Splunk app installed on a Splunk Enterprise server.

C.

A Splunk Enterprise server that distributes apps.

D.

A server that automates the deployment of Splunk Enterprise to remote servers.

Full Access
Question # 55

Which of the following accurately describes HTTP Event Collector indexer acknowledgement?

A.

It requires a separate channel provided by the client.

B.

It is configured the same as indexer acknowledgement used to protect in-flight data.

C.

It can be enabled at the global setting level.

D.

It stores status information on the Splunk server.

Full Access
Question # 56

There is a file with a vast amount of old data. Which of the following inputs.conf attributes would allow an admin to monitor the file for updates without indexing the pre-existing data?

A.

IgnoreOlderThan

B.

allowList

C.

monitor

D.

followTail

Full Access
Question # 57

Which of the following types of data count against the license daily quota?

A.

Replicated data

B.

splunkd logs

C.

Summary index data

D.

Windows internal logs

Full Access
Question # 58

Which Splunk forwarder type allows parsing of data before forwarding to an indexer?

A.

Universal forwarder

B.

Parsing forwarder

C.

Heavy forwarder

D.

Advanced forwarder

Full Access