Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: myex65

Home > Splunk > Splunk Enterprise Certified Admin > SPLK-1003

SPLK-1003 Splunk Enterprise Certified Admin Question and Answers

Question # 4

When working with an indexer cluster, what changes with the global precedence when comparing to a standalone deployment?

A.

Nothing changes.

B.

The peer-apps local directory becomes the highest priority.

C.

The app local directories move to second in the priority list.

D.

The system default directory' becomes the highest priority.

Full Access
Question # 5

For single line event sourcetypes. it is most efficient to set SHOULD_linemerge to what value?

A.

True

B.

False

C.

D.

Newline Character

Full Access
Question # 6

Which Splunk configuration file is used to enable data integrity checking?

A.

props.conf

B.

global.conf

C.

indexes.conf

D.

data_integrity.conf

Full Access
Question # 7

This file has been manually created on a universal forwarder

A new Splunk admin comes in and connects the universal forwarders to a deployment server and deploys the same app with a new

Which file is now monitored?

A.

/var/log/messages

B.

/var/log/maillog

C.

/var/log/maillog and /var/log/messages

D.

none of the above

Full Access
Question # 8

Which of the following are available input methods when adding a file input in Splunk Web? (Choose all that

apply.)

A.

Index once.

B.

Monitor interval.

C.

On-demand monitor.

D.

Continuously monitor.

Full Access
Question # 9

Search heads in a company's European offices need to be able to search data in their New York offices. They also need to restrict access to certain indexers. What should be configured to allow this type of action?

A.

Indexer clustering

B.

LDAP control

C.

Distributed search

D.

Search head clustering

Full Access
Question # 10

A security team needs to ingest a static file for a specific incident. The log file has not been collected previously and future updates to the file must not be indexed.

Which command would meet these needs?

A.

splunk add one shot / opt/ incident [data .log —index incident

B.

splunk edit monitor /opt/incident/data.* —index incident

C.

splunk add monitor /opt/incident/data.log —index incident

D.

splunk edit oneshot [opt/ incident/data.* —index incident

Full Access
Question # 11

Which of the following indexes come pre-configured with Splunk Enterprise? (select all that apply)

A.

_license

B.

_lnternal

C.

_external

D.

_thefishbucket

Full Access
Question # 12

Which artifact is required in the request header when creating an HTTP event?

A.

ackID

B.

Token

C.

Manifest

D.

Host name

Full Access
Question # 13

The universal forwarder has which capabilities when sending data? (select all that apply)

A.

Sending alerts

B.

Compressing data

C.

Obfuscating/hiding data

D.

Indexer acknowledgement

Full Access
Question # 14

In a customer managed Splunk Enterprise environment, what is the endpoint URI used to collect data?

A.

services/collector

B.

data/collector

C.

services/inputs?raw

D.

services/data/collector

Full Access
Question # 15

Using SEDCMD in props.conf allows raw data to be modified. With the given event below, which option will mask the first three digits of the AcctID field resulting output: [22/Oct/2018:15:50:21] VendorID=1234 Code=B AcctID=xxx5309

Event:

[22/Oct/2018:15:50:21] VendorID=1234 Code=B AcctID=xxx5309

A.

SEDCMD-1acct = s/VendorID=\d{3}(\d{4})/VendorID=xxx/g

B.

SEDCMD-xxxAcct = s/AcctID=\d{3}(\d{4})/AcctID=xxx/g

C.

SEDCMD-1acct = s/AcctID=\d{3}(\d{4})/AcctID=\1xxx/g

D.

SEDCMD-1acct = s/AcctID=\d{3}(\d{4})/AcctID=xxx\1/g

Full Access
Question # 16

What is required when adding a native user to Splunk? (select all that apply)

A.

Password

B.

Username

C.

Full Name

D.

Default app

Full Access
Question # 17

Which of the following must be done to define user permissions when integrating Splunk with LDAP?

A.

Map Users

B.

Map Groups

C.

Map LDAP Inheritance

D.

Map LDAP to Active Directory

Full Access
Question # 18

How can native authentication be disabled in Splunk?

A.

Remove the $SPLUNK_HOME/etc/passwd file

B.

Create an empty $SPLUNK_HOME/etc/passwd file

C.

Set SPLUNK_AUTHENTICATION=false in splunk-launch.conf

D.

Set nativeAuthentication=false in authentication.conf

Full Access
Question # 19

Which of the following is an appropriate description of a deployment server in a non-cluster environment?

A.

Allows management of local Splunk instances, requires Enterprise license, handles job of sending configurations packaged as apps. can automatically restart remote Splunk instances.

B.

Allows management of remote Splunk instances, requires Enterprise license, handles job of sending configurations, can automatically restart remote Splunk instances.

C.

Allows management of remote Splunk instances, requires no license, handles job of sending configurations, can automatically restart remote Splunk instances.

D.

Allows management of remote Splunk instances, requires Enterprise license, handles job of sending configurations, can manually restart remote Splunk instances.

Full Access
Question # 20

Which of the following applies only to Splunk index data integrity check?

A.

Lookup table

B.

Summary Index

C.

Raw data in the index

D.

Data model acceleration

Full Access
Question # 21

Which of the following is the use case for the deployment server feature of Splunk?

A.

Managing distributed workloads in a Splunk environment.

B.

Automating upgrades of Splunk forwarder installations on endpoints.

C.

Orchestrating the operations and scale of a containerized Splunk deployment.

D.

Updating configuration and distributing apps to processing components, primarily forwarders.

Full Access
Question # 22

Which configuration file would be used to forward the Splunk internal logs from a search head to the indexer?

A.

props.conf

B.

inputs.conf

C.

outputs.conf

D.

collections.conf

Full Access
Question # 23

Which of the following statements describes how distributed search works?

A.

Forwarders pull data from the search peers.

B.

Search heads store a portion of the searchable data.

C.

The search head dispatches searches to the search peers.

D.

Search results are replicated within the indexer cluster.

Full Access
Question # 24

Which of the following are required when defining an index in indexes. conf? (select all that apply)

A.

coldPath

B.

homePath

C.

frozenPath

D.

thawedPath

Full Access
Question # 25

Where should apps be located on the deployment server that the clients pull from?

A.

$SFLUNK_KOME/etc/apps

B.

$SPLUNK_HCME/etc/sear:ch

C.

$SPLUNK_HCME/etc/master-apps

D.

$SPLUNK HCME/etc/deployment-apps

Full Access
Question # 26

Immediately after installation, what will a Universal Forwarder do first?

A.

Automatically detect any indexers in its subnet and begin routing data.

B.

Begin reading local files on its server.

C.

Begin generating internal Splunk logs.

D.

Send an email to the operator that the installation process has completed.

Full Access
Question # 27

Which scenario is applicable given the stanzas in authentication.conf below?

[authentication]

externalTwoFactorAuthVendor = Duo

externalTwoFactorAuthSettings = duoMFA

[duoMFA]

integrationKey = aGFwcHliaXJ0aGRheU1pZGR5

secretKey = YXVzdHJhaWxpYW5Gb3JHcmVw

applicationKey = c3BsaW5raW5ndGhlcGx1bWJ1c3NpbmN1OTU

apiHostname = 466993018.duosecurity.com

failOpen = True

timeout = 60

A.

If Splunk cannot connect to the multifactor authentication provider, all logins will be denied.

B.

Multifactor authentication is required to log into the host operating system.

C.

The secretKey does not need to be protected since multifactor authentication is turned on.

D.

If Splunk cannot connect to the multifactor authentication provider, authentications will be successful without completing a multifactor challenge.

Full Access
Question # 28

How do you remove missing forwarders from the Monitoring Console?

A.

By restarting Splunk.

B.

By rescanning active forwarders.

C.

By reloading the deployment server.

D.

By rebuilding the forwarder asset table.

Full Access
Question # 29

After configuring a universal forwarder to communicate with an indexer, which index can be checked via the Splunk Web UI for a successful connection?

A.

index=main

B.

index=test

C.

index=summary

D.

index=_internal

Full Access
Question # 30

Given a forwarder with the following outputs.conf configuration:

[tcpout : mypartner]

Server = 145.188.183.184:9097

[tcpout : hfbank]

server = inputsl . mysplunkhfs . corp : 9997 , inputs2 . mysplunkhfs . corp : 9997

Which of the following is a true statement?

A.

Data will continue to flow to hfbank if 145.1 ga. 183.184 : 9097 is unreachable.

B.

Data is not encrypted to mypartner because 145.188 .183.184 : 9097 is specified by IP.

C.

Data is encrypted to mypartner because 145.183.184 : 9097 is specified by IP.

D.

Data will eventually stop flowing everywhere if 145.188.183.184 : 9097 is unreachable.

Full Access
Question # 31

Which of the following describes a Splunk deployment server?

A.

A Splunk Forwarder that deploys data to multiple indexers.

B.

A Splunk app installed on a Splunk Enterprise server.

C.

A Splunk Enterprise server that distributes apps.

D.

A server that automates the deployment of Splunk Enterprise to remote servers.

Full Access
Question # 32

Which default Splunk role could be assigned to provide users with the following capabilities?

Create saved searches

Edit shared objects and alerts

Not allowed to create custom roles

A.

admin

B.

power

C.

user

D.

splunk-system-role

Full Access
Question # 33

What happens when the same username exists in Splunk as well as through LDAP?

A.

Splunk user is automatically deleted from authentication.conf.

B.

LDAP settings take precedence.

C.

Splunk settings take precedence.

D.

LDAP user is automatically deleted from authentication.conf

Full Access
Question # 34

An admin oversees an environment with a 1000 GBI day license. The configuration file

server.conf has strict pool quota=false set. The license is divided into the following three pools, and today's usage is shown on the right-hand column:

PoolLicense SizeToday's usage

X500 GB/day100 GB

Y350 GB/day400 GB

Z150 GB/day300 GB

Given this, which pool(s) are issued warnings?

A.

All pools

B.

Z only

C.

None

D.

Y and Z

Full Access
Question # 35

During search time, which directory of configuration files has the highest precedence?

A.

$SFLUNK_KOME/etc/system/local

B.

$SPLUNK_KCME/etc/system/default

C.

$SPLUNK_HCME/etc/apps/app1/local

D.

$SPLUNK HCME/etc/users/admin/local

Full Access
Question # 36

The following stanza is active in indexes.conf:

[cat_facts]

maxHotSpanSecs = 3600

frozenTimePeriodInSecs = 2630000

maxTota1DataSizeMB = 650000

All other related indexes.conf settings are default values.

If the event timestamp was 3739283 seconds ago, will it be searchable?

A.

Yes, only if the bucket is still hot.

B.

No, because the index will have exceeded its maximum size.

C.

Yes, only if the index size is also below 650000 MB.

D.

No, because the event time is greater than the retention time.

Full Access
Question # 37

What is a role in Splunk? (select all that apply)

A.

A classification that determines what capabilities a user has.

B.

A classification that determines if a Splunk server can remotely control another Splunk server.

C.

A classification that determines what functions a Splunk server controls.

D.

A classification that determines what indexes a user can search.

Full Access
Question # 38

In this source definition the MAX_TIMESTAMP_LOOKHEAD is missing. Which value would fit best?

Event example:

A.

MAX_TIMESTAMP_L0CKAHEAD = 5

B.

MAX_TIMESTAMP_LOOKAHEAD - 10

C.

MAX_TIMESTAMF_LOOKHEAD = 20

D.

MAX TIMESTAMP LOOKAHEAD - 30

Full Access
Question # 39

A Splunk administrator has been tasked with developing a retention strategy to have frequently accessed data sets on SSD storage and to have older, less frequently accessed data on slower NAS storage. They have set a mount point for the NAS. Which parameter do they need to modify to set the path for the older, less frequently accessed data in indexes.conf?

A.

homepath

B.

thawedPath

C.

summaryHomePath

D.

colddeath

Full Access
Question # 40

When using a directory monitor input, specific source types can be selectively overridden using which configuration file?

A.

sourcetypes . conf

B.

trans forms . conf

C.

outputs . conf

D.

props . conf

Full Access
Question # 41

What is the correct order of steps in Duo Multifactor Authentication?

A.

1 Request Login

2. Connect to SAML server

3 Duo MFA

4 Create User session

5 Authentication Granted 6. Log into Splunk

B.

1. Request Login 2 Duo MFA

3. Authentication Granted 4 Connect to SAML server

5. Log into Splunk

6. Create User session

C.

1 Request Login

2 Check authentication / group mapping

3 Authentication Granted

4. Duo MFA

5. Create User session

6. Log into Splunk

D.

1 Request Login 2 Duo MFA

3. Check authentication / group mapping

4 Create User session

5. Authentication Granted

6 Log into Splunk

Full Access
Question # 42

What is the correct curl to send multiple events through HTTP Event Collector?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 43

Which of the methods listed below supports muti-factor authentication?

A.

Lightweight Directory Access Protocol (LDAP)

B.

Security Assertion Markup Language (SAML)

C.

Single Sign-on (SSO)

D.

OpenlD

Full Access
Question # 44

After how many warnings within a rolling 30-day period will a license violation occur with an enforced

Enterprise license?

A.

1

B.

3

C.

4

D.

5

Full Access
Question # 45

Which configuration files are used to transform raw data ingested by Splunk? (Choose all that apply.)

A.

props.conf

B.

inputs.conf

C.

rawdata.conf

D.

transforms.conf

Full Access
Question # 46

An organization wants to collect Windows performance data from a set of clients, however, installing Splunk

software on these clients is not allowed. What option is available to collect this data in Splunk Enterprise?

A.

Use Local Windows host monitoring.

B.

Use Windows Remote Inputs with WMI.

C.

Use Local Windows network monitoring.

D.

Use an index with an Index Data Type of Metrics.

Full Access
Question # 47

What event-processing pipelines are used to process data for indexing? (select all that apply)

A.

fifo pipeline

B.

Indexing pipeline

C.

Parsing pipeline

D.

Typing pipeline

Full Access
Question # 48

Which of the following is a valid distributed search group?

A.

[distributedSearch:Paris] default = false servers = server1, server2

B.

[searchGroup:Paris] default = false servers = server1:8089, server2:8089

C.

[searchGroup:Paris] default = false servers = server1:9997, server2:9997

D.

[distributedSearch:Paris] default = false servers = server1:8089; server2:8089

Full Access
Question # 49

An index stores its data in buckets. Which default directories does Splunk use to store buckets? (Choose all that apply.)

A.

bucketdb

B.

frozendb

C.

colddb

D.

db

Full Access
Question # 50

After an Enterprise Trial license expires, it will automatically convert to a Free license. How many days is an Enterprise Trial license valid before this conversion occurs?

A.

90 days

B.

60 days

C.

7 days

D.

14 days

Full Access
Question # 51

In which scenario would a Splunk Administrator want to enable data integrity check when creating an index?

A.

To ensure that hot buckets are still open for writes and have not been forced to roll to a cold state

B.

To ensure that configuration files have not been tampered with for auditing and/or legal purposes

C.

To ensure that user passwords have not been tampered with for auditing and/or legal purposes.

D.

To ensure that data has not been tampered with for auditing and/or legal purposes

Full Access
Question # 52

What are the minimum required settings when creating a network input in Splunk?

A.

Protocol, port number

B.

Protocol, port, location

C.

Protocol, username, port

D.

Protocol, IP. port number

Full Access
Question # 53

What type of data is counted against the Enterprise license at a fixed 150 bytes per event?

A.

License data

B.

Metricsdata

C.

Internal Splunk data

D.

Internal Windows logs

Full Access
Question # 54

When does a warm bucket roll over to a cold bucket?

A.

When Splunk is restarted.

B.

When the maximum warm bucket age has been reached.

C.

When the maximum warm bucket size has been reached.

D.

When the maximum number of warm buckets is reached.

Full Access
Question # 55

What hardware attribute would need to be changed to increase the number of simultaneous searches (ad-hoc and scheduled) on a single search head?

A.

Disk

B.

CPUs

C.

Memory

D.

Network interface cards

Full Access