Labour Day - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

SPLK-1003 Questions and Answers

Question # 6

Which feature in Splunk allows Event Breaking, Timestamp extractions, and any advanced configurations

found in props.conf to be validated all through the UI?

A.

Apps

B.

Search

C.

Data preview

D.

Forwarder inputs

Full Access
Question # 7

Which option accurately describes the purpose of the HTTP Event Collector (HEC)?

A.

A token-based HTTP input that is secure and scalable and that requires the use of forwarders

B.

A token-based HTTP input that is secure and scalable and that does not require the use of forwarders.

C.

An agent-based HTTP input that is secure and scalable and that does not require the use of forwarders.

D.

A token-based HTTP input that is insecure and non-scalable and that does not require the use of forwarders.

Full Access
Question # 8

Which Splunk component performs indexing and responds to search requests from the search head?

A.

Forwarder

B.

Search peer

C.

License master

D.

Search head cluster

Full Access
Question # 9

In a customer managed Splunk Enterprise environment, what is the endpoint URI used to collect data?

A.

services/collector

B.

data/collector

C.

services/inputs?raw

D.

services/data/collector

Full Access
Question # 10

What hardware attribute would need to be changed to increase the number of simultaneous searches (ad-hoc and scheduled) on a single search head?

A.

Disk

B.

CPUs

C.

Memory

D.

Network interface cards

Full Access
Question # 11

This file has been manually created on a universal forwarder

A new Splunk admin comes in and connects the universal forwarders to a deployment server and deploys the same app with a new

Which file is now monitored?

A.

/var/log/messages

B.

/var/log/maillog

C.

/var/log/maillog and /var/log/messages

D.

none of the above

Full Access
Question # 12

Which of the following are supported configuration methods to add inputs on a forwarder? (select all that apply)

A.

CLI

B.

Edit inputs . conf

C.

Edit forwarder.conf

D.

Forwarder Management

Full Access
Question # 13

In which scenario would a Splunk Administrator want to enable data integrity check when creating an index?

A.

To ensure that hot buckets are still open for writes and have not been forced to roll to a cold state

B.

To ensure that configuration files have not been tampered with for auditing and/or legal purposes

C.

To ensure that user passwords have not been tampered with for auditing and/or legal purposes.

D.

To ensure that data has not been tampered with for auditing and/or legal purposes

Full Access
Question # 14

Which Splunk configuration file is used to enable data integrity checking?

A.

props.conf

B.

global.conf

C.

indexes.conf

D.

data_integrity.conf

Full Access
Question # 15

When running a real-time search, search results are pulled from which Splunk component?

A.

Heavy forwarders and search peers

B.

Heavy forwarders

C.

Search heads

D.

Search peers

Full Access
Question # 16

Immediately after installation, what will a Universal Forwarder do first?

A.

Automatically detect any indexers in its subnet and begin routing data.

B.

Begin reading local files on its server.

C.

Begin generating internal Splunk logs.

D.

Send an email to the operator that the installation process has completed.

Full Access
Question # 17

Which default Splunk role could be assigned to provide users with the following capabilities?

Create saved searches

Edit shared objects and alerts

Not allowed to create custom roles

A.

admin

B.

power

C.

user

D.

splunk-system-role

Full Access
Question # 18

In addition to single, non-clustered Splunk instances, what else can the deployment server push apps to?

A.

Universal forwarders

B.

Splunk Cloud

C.

Linux package managers

D.

Windows using WMI

Full Access
Question # 19

When indexing a data source, which fields are considered metadata?

A.

source, host, time

B.

time, sourcetype, source

C.

host, raw, sourcetype

D.

sourcetype, source, host

Full Access
Question # 20

The following stanzas in inputs. conf are currently being used by a deployment client:

[udp: //145.175.118.177:1001

Connection_host = dns

sourcetype = syslog

Which of the following statements is true of data that is received via this input?

A.

If Splunk is restarted, data will be queued and then sent when Splunk has restarted.

B.

Local firewall ports do not need to be opened on the deployment client since the port is defined in inputs.conf.

C.

The host value associated with data received will be the IP address that sent the data.

D.

If Splunk is restarted, data may be lost.

Full Access
Question # 21

Which of the following statements describe deployment management? (select all that apply)

A.

Requires an Enterprise license

B.

Is responsible for sending apps to forwarders.

C.

Once used, is the only way to manage forwarders

D.

Can automatically restart the host OS running the forwarder.

Full Access
Question # 22

When using license pools, volume allocations apply to which Splunk components?

A.

Indexers

B.

Indexes

C.

Heavy Forwarders

D.

Search Heads

Full Access
Question # 23

How do you remove missing forwarders from the Monitoring Console?

A.

By restarting Splunk.

B.

By rescanning active forwarders.

C.

By reloading the deployment server.

D.

By rebuilding the forwarder asset table.

Full Access
Question # 24

A log file contains 193 days worth of timestamped events. Which monitor stanza would be used to collect data 45 days old and newer from that log file?

A.

followTail = -45d

B.

ignore = 45d

C.

includeNewerThan = -35d

D.

ignoreOlderThan = 45d

Full Access
Question # 25

In which phase of the index time process does the license metering occur?

A.

input phase

B.

Parsing phase

C.

Indexing phase

D.

Licensing phase

Full Access
Question # 26

An organization wants to collect Windows performance data from a set of clients, however, installing Splunk

software on these clients is not allowed. What option is available to collect this data in Splunk Enterprise?

A.

Use Local Windows host monitoring.

B.

Use Windows Remote Inputs with WMI.

C.

Use Local Windows network monitoring.

D.

Use an index with an Index Data Type of Metrics.

Full Access
Question # 27

What event-processing pipelines are used to process data for indexing? (select all that apply)

A.

fifo pipeline

B.

Indexing pipeline

C.

Parsing pipeline

D.

Typing pipeline

Full Access
Question # 28

What are the required stanza attributes when configuring the transforms. conf to manipulate or remove events?

A.

REGEX, DEST. FORMAT

B.

REGEX.SRC_KEY, FORMAT

C.

REGEX, DEST_KEY, FORMAT

D.

REGEX, DEST_KEY FORMATTING

Full Access
Question # 29

Which feature of Splunk’s role configuration can be used to aggregate multiple roles intended for groups of

users?

A.

Linked roles

B.

Grantable roles

C.

Role federation

D.

Role inheritance

Full Access
Question # 30

In case of a conflict between a whitelist and a blacklist input setting, which one is used?

A.

Blacklist

B.

Whitelist

C.

They cancel each other out.

D.

Whichever is entered into the configuration first.

Full Access
Question # 31

Which Splunk forwarder type allows parsing of data before forwarding to an indexer?

A.

Universal forwarder

B.

Parsing forwarder

C.

Heavy forwarder

D.

Advanced forwarder

Full Access
Question # 32

What are the values forhostandindexfor[stanza1]used by Splunk during index time, given the following configuration files?

A.

host=server1

index=unixinfo

B.

host=server1

index=searchinfo

C.

host=searchsvr1

index=searchinfo

D.

host=unixsvr1

index=unixinfo

Full Access
Question # 33

What is the correct curl to send multiple events through HTTP Event Collector?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 34

Which Splunk indexer operating system platform is supported when sending logs from a Windows universal forwarder?

A.

Any OS platform

B.

Linux platform only

C.

Windows platform only.

D.

None of the above.

Full Access
Question # 35

Which Splunk component(s) would break a stream of syslog inputs into individual events? (select all that apply)

A.

Universal Forwarder

B.

Search head

C.

Heavy Forwarder

D.

Indexer

Full Access
Question # 36

Where can scripts for scripted inputs reside on the host file system? (select all that apply)

A.

$SFLUNK_HOME/bin/scripts

B.

$SPLUNK_HOME/etc/apps/bin

C.

$SPLUNK_HOME/etc/system/bin

D.

$S?LUNK_HOME/etc/apps/<your_app>/bin_

Full Access
Question # 37

Local user accounts created in Splunk store passwords in which file?

A.

$ SFLUNK_HOME/etc/passwd

B.

$ SFLUNK_HOME/etc/authentication

C.

$ S?LUNK_HOME/etc/users/passwd.conf

D.

$ SPLUNK HOME/etc/users/authentication.conf

Full Access
Question # 38

Which of the following must be done to define user permissions when integrating Splunk with LDAP?

A.

Map Users

B.

Map Groups

C.

Map LDAP Inheritance

D.

Map LDAP to Active Directory

Full Access
Question # 39

A configuration file in a deployed app needs to be directly edited. Which steps would ensure a successful deployment to clients?

A.

Make the change in $SPLUNK HOME/etc/dep10yment apps/$appName/10ca1/ on the deployment server, and the change will be automatically sent to the deployment clients.

B.

Make the change in $SPLUNK HOME /etc/apps/$appname/local/ on any of the deployment clients, and then run the command . / splunk reload deploy-server to push that change to the deployment server.

C.

Make the change in $SPLUNK HOME/etc/dep10yment apps/$appName/10ca1/ on the deployment server, and then run $SPLUNK HOME/bin/sp1unk reload deploy—server.

D.

Make the change in $SPLUNK HOME/etc/apps/$appName/defau1t on the deployment server, and it will be distributed down to the clients' own local versions.

Full Access
Question # 40

What is required when adding a native user to Splunk? (select all that apply)

A.

Password

B.

Username

C.

Full Name

D.

Default app

Full Access
Question # 41

What action is required to enable forwarder management in Splunk Web?

A.

Navigate to Settings > Server Settings > General Settings, and set an App server port.

B.

Navigate to Settings > Forwarding and receiving, and click on Enable Forwarding.

C.

Create a server class and map it to a client inSPLUNK_HOME/etc/system/local/serverclass.conf.

D.

Place an app in theSPLUNK_HOME/etc/deployment-appsdirectory of the deployment server.

Full Access
Question # 42

What options are available when creating custom roles? (select all that apply)

A.

Restrict search terms

B.

Whitelist search terms

C.

Limit the number of concurrent search jobs

D.

Allow or restrict indexes that can be searched.

Full Access
Question # 43

Which of the following Splunk components require a separate installation package?

A.

Deployment server

B.

License master

C.

Universal forwarder

D.

Heavy forwarder

Full Access
Question # 44

What conf file needs to be edited to set up distributed search groups?

A.

props.conf

B.

search.conf

C.

distsearch.conf

D.

distibutedsearch.conf

Full Access
Question # 45

When configuring monitor inputs with whitelists or blacklists, what is the supported method of filtering the lists?

A.

Slash notation

B.

Regular expression

C.

Irregular expression

D.

Wildcard-only expression

Full Access
Question # 46

Which of the following are available input methods when adding a file input in Splunk Web? (Choose all that

apply.)

A.

Index once.

B.

Monitor interval.

C.

On-demand monitor.

D.

Continuously monitor.

Full Access
Question # 47

Which of the following authentication types requires scripting in Splunk?

A.

ADFS

B.

LDAP

C.

SAML

D.

RADIUS

Full Access
Question # 48

All search-time field extractions should be specified on which Splunk component?

A.

Deployment server

B.

Universal forwarder

C.

Indexer

D.

Search head

Full Access
Question # 49

Which of the following configuration files are used with a universal forwarder? (Choose all that apply.)

A.

inputs.conf

B.

monitor.conf

C.

outputs.conf

D.

forwarder.conf

Full Access
Question # 50

How does the Monitoring Console monitor forwarders?

A.

By pulling internal logs from forwarders.

B.

By using the forwarder monitoring add-on

C.

With internal logs forwarded by forwarders.

D.

With internal logs forwarded by deployment server.

Full Access
Question # 51

Which file will be matched for the following monitor stanza in inputs. conf?

[monitor: ///var/log/*/bar/*. txt]

A.

/var/log/host_460352847/temp/bar/file/csv/foo.txt

B.

/var/log/host_460352847/bar/foo.txt

C.

/var/log/host_460352847/bar/file/foo.txt

D.

/var/ log/ host_460352847/temp/bar/file/foo.txt

Full Access
Question # 52

Which configuration file would be used to forward the Splunk internal logs from a search head to the indexer?

A.

props.conf

B.

inputs.conf

C.

outputs.conf

D.

collections.conf

Full Access
Question # 53

Which of the following are reasons to create separate indexes? (Choose all that apply.)

A.

Different retention times.

B.

Increase number of users.

C.

Restrict user permissions.

D.

File organization.

Full Access
Question # 54

Which of the following statements accurately describes using SSL to secure the feed from a forwarder?

A.

It does not encrypt the certificate password.

B.

SSL automatically compresses the feed by default.

C.

It requires that the forwarder be set to compressed=true.

D.

It requires that the receiver be set to compression=true.

Full Access