Winter Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

SPLK-1003 Questions and Answers

Question # 6

Which of the following are reasons to create separate indexes? (Choose all that apply.)

A.

Different retention times.

B.

Increase number of users.

C.

Restrict user permissions.

D.

File organization.

Full Access
Question # 7

Which layers are involved in Splunk configuration file layering? (select all that apply)

A.

App context

B.

User context

C.

Global context

D.

Forwarder context

Full Access
Question # 8

Given a forwarder with the following outputs.conf configuration:

[tcpout : mypartner]

Server = 145.188.183.184:9097

[tcpout : hfbank]

server = inputsl . mysplunkhfs . corp : 9997 , inputs2 . mysplunkhfs . corp : 9997

Which of the following is a true statement?

A.

Data will continue to flow to hfbank if 145.1 ga. 183.184 : 9097 is unreachable.

B.

Data is not encrypted to mypartner because 145.188 .183.184 : 9097 is specified by IP.

C.

Data is encrypted to mypartner because 145.183.184 : 9097 is specified by IP.

D.

Data will eventually stop flowing everywhere if 145.188.183.184 : 9097 is unreachable.

Full Access
Question # 9

Which artifact is required in the request header when creating an HTTP event?

A.

ackID

B.

Token

C.

Manifest

D.

Host name

Full Access
Question # 10

A Universal Forwarder is collecting two separate sources of data (A,B). Source A is being routed through a Heavy Forwarder and then to an indexer. Source B is being routed directly to the indexer. Both sets of data require the masking of raw text strings before being written to disk. What does the administrator need to do to

ensure that the masking takes place successfully?

A.

Make sure that props . conf and transforms . conf are both present on the in-dexer and the search head.

B.

For source A, make sure that props . conf is in place on the indexer; and for source B, make sure transforms . conf is present on the Heavy Forwarder.

C.

Make sure that props . conf and transforms . conf are both present on the Universal Forwarder.

D.

Place both props . conf and transforms . conf on the Heavy Forwarder for source A, and place both props . conf and transforms . conf on the indexer for source B.

Full Access
Question # 11

The universal forwarder has which capabilities when sending data? (select all that apply)

A.

Sending alerts

B.

Compressing data

C.

Obfuscating/hiding data

D.

Indexer acknowledgement

Full Access
Question # 12

How do you remove missing forwarders from the Monitoring Console?

A.

By restarting Splunk.

B.

By rescanning active forwarders.

C.

By reloading the deployment server.

D.

By rebuilding the forwarder asset table.

Full Access
Question # 13

What action is required to enable forwarder management in Splunk Web?

A.

Navigate to Settings > Server Settings > General Settings, and set an App server port.

B.

Navigate to Settings > Forwarding and receiving, and click on Enable Forwarding.

C.

Create a server class and map it to a client in SPLUNK_HOME/etc/system/local/serverclass.conf.

D.

Place an app in the SPLUNK_HOME/etc/deployment-apps directory of the deployment server.

Full Access
Question # 14

In a customer managed Splunk Enterprise environment, what is the endpoint URI used to collect data?

A.

services/collector

B.

data/collector

C.

services/inputs?raw

D.

services/data/collector

Full Access
Question # 15

When are knowledge bundles distributed to search peers?

A.

After a user logs in.

B.

When Splunk is restarted.

C.

When adding a new search peer.

D.

When a distributed search is initiated.

Full Access
Question # 16

Using the CLI on the forwarder, how could the current forwarder to indexer configuration be viewed?

A.

splunk btool server list --debug

B.

splunk list forward-indexer

C.

splunk list forward-server

D.

splunk btool indexes list --debug

Full Access
Question # 17

Which Splunk component performs indexing and responds to search requests from the search head?

A.

Forwarder

B.

Search peer

C.

License master

D.

Search head cluster

Full Access
Question # 18

Which of the following is accurate regarding the input phase?

A.

Breaks data into events with timestamps.

B.

Applies event-level transformations.

C.

Fine-tunes metadata.

D.

Performs character encoding.

Full Access
Question # 19

Where are deployment server apps mapped to clients?

A.

Apps tab in forwarder management interface or clientapps.conf.

B.

Clients tab in forwarder management interface or deploymentclient.conf.

C.

Server Classes tab in forwarder management interface or serverclass.conf.

D.

Client Applications tab in forwarder management interface or clientapps.conf.

Full Access
Question # 20

Which of the following apply to how distributed search works? (select all that apply)

A.

The search head dispatches searches to the peers

B.

The search peers pull the data from the forwarders.

C.

Peers run searches in parallel and return their portion of results.

D.

The search head consolidates the individual results and prepares reports

Full Access
Question # 21

Which data pipeline phase is the last opportunity for defining event boundaries?

A.

Input phase

B.

Indexing phase

C.

Parsing phase

D.

Search phase

Full Access
Question # 22

Load balancing on a Universal Forwarder is not scaling correctly. The forwarder's outputs. and the tcpout stanza are setup correctly. What else could be the cause of this scaling issue? (select all that apply)

A.

The receiving port is not properly setup to listen on the right port.

B.

The inputs . conf'S _SYSZOG_ROVTING is not setup to use the right group names.

C.

The DNS record used is not setup with a valid list of IP addresses.

D.

The indexAndForward value is not set properly.

Full Access
Question # 23

The priority of layered Splunk configuration files depends on the file's:

A.

Owner

B.

Weight

C.

Context

D.

Creation time

Full Access
Question # 24

In addition to single, non-clustered Splunk instances, what else can the deployment server push apps to?

A.

Universal forwarders

B.

Splunk Cloud

C.

Linux package managers

D.

Windows using WMI

Full Access
Question # 25

Which forwarder is recommended by Splunk to use in a production environment?

A.

Heavy forwarder

B.

SSL forwarder

C.

Lightweight forwarder

D.

Universal forwarder

Full Access
Question # 26

Which optional configuration setting in inputs .conf allows you to selectively forward the data to specific indexer(s)?

A.

_TCP_ROUTING

B.

_INDEXER_LIST

C.

_INDEXER_GROUP

D.

_INDEXER ROUTING

Full Access
Question # 27

When running the command shown below, what is the default path in which deployment server. conf is created?

splunk set deploy-poll deployServer:port

A.

SFLUNK_HOME/etc/deployment

B.

SPLUNK_HOME/etc/system/local

C.

SPLUNK_HOME/etc/system/default

D.

SPLUNK_KOME/etc/apps/deployment

Full Access
Question # 28

How would you configure your distsearch conf to allow you to run the search below? sourcetype=access_combined status=200 action=purchase splunk_setver_group=HOUSTON

A)

B)

C)

D)

A.

option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 29

Which of the following authentication types requires scripting in Splunk?

A.

ADFS

B.

LDAP

C.

SAML

D.

RADIUS

Full Access
Question # 30

How often does Splunk recheck the LDAP server?

A.

Every 5 minutes

B.

Each time a user logs in

C.

Each time Splunk is restarted

D.

Varies based on LDAP_refresh setting.

Full Access
Question # 31

Which of the following is a benefit of distributed search?

A.

Peers run search in sequence.

B.

Peers run search in parallel.

C.

Resilience from indexer failure.

D.

Resilience from search head failure.

Full Access
Question # 32

What is the command to reset the fishbucket for one source?

A.

rm -r ~/splunkforwarder/var/lib/splunk/fishbucket

B.

splunk clean eventdata -index _thefishbucket

C.

splunk cmd btprobe -d SPLUNK_HOME/var/lib/splunk/fishbucket/splunk_private_db --file --reset

D.

splunk btool fishbucket reset

Full Access
Question # 33

What event-processing pipelines are used to process data for indexing? (select all that apply)

A.

fifo pipeline

B.

Indexing pipeline

C.

Parsing pipeline

D.

Typing pipeline

Full Access
Question # 34

When configuring monitor inputs with whitelists or blacklists, what is the supported method of filtering the lists?

A.

Slash notation

B.

Regular expression

C.

Irregular expression

D.

Wildcard-only expression

Full Access
Question # 35

Which of the following configuration files are used with a universal forwarder? (Choose all that apply.)

A.

inputs.conf

B.

monitor.conf

C.

outputs.conf

D.

forwarder.conf

Full Access
Question # 36

Which valid bucket types are searchable? (select all that apply)

A.

Hot buckets

B.

Cold buckets

C.

Warm buckets

D.

Frozen buckets

Full Access
Question # 37

How is a remote monitor input distributed to forwarders?

A.

As an app.

B.

As a forward.conf file.

C.

As a monitor.conf file.

D.

As a forwarder monitor profile.

Full Access
Question # 38

All search-time field extractions should be specified on which Splunk component?

A.

Deployment server

B.

Universal forwarder

C.

Indexer

D.

Search head

Full Access
Question # 39

What is an example of a proper configuration for CHARSET within props.conf?

A.

[host: : server. splunk. com]

CHARSET = BIG5

B.

[index: :main]

CHARSET = BIG5

C.

[sourcetype: : son]

CHARSET = BIG5

D.

[source: : /var/log/ splunk]

CHARSET = BIG5

Full Access
Question # 40

During search time, which directory of configuration files has the highest precedence?

A.

$SFLUNK_KOME/etc/system/local

B.

$SPLUNK_KCME/etc/system/default

C.

$SPLUNK_HCME/etc/apps/app1/local

D.

$SPLUNK HCME/etc/users/admin/local

Full Access
Question # 41

When running a real-time search, search results are pulled from which Splunk component?

A.

Heavy forwarders and search peers

B.

Heavy forwarders

C.

Search heads

D.

Search peers

Full Access
Question # 42

Which of the following statements describes how distributed search works?

A.

Forwarders pull data from the search peers.

B.

Search heads store a portion of the searchable data.

C.

The search head dispatches searches to the search peers.

D.

Search results are replicated within the indexer cluster.

Full Access
Question # 43

A user recently installed an application to index NCINX access logs. After configuring the application, they realize that no data is being ingested. Which configuration file do they need to edit to ingest the access logs to ensure it remains unaffected after upgrade?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 44

Immediately after installation, what will a Universal Forwarder do first?

A.

Automatically detect any indexers in its subnet and begin routing data.

B.

Begin generating internal Splunk logs.

C.

Begin reading local files on its server.

D.

Send an email to the operator that the installation process has completed.

Full Access
Question # 45

When does a warm bucket roll over to a cold bucket?

A.

When Splunk is restarted.

B.

When the maximum warm bucket age has been reached.

C.

When the maximum warm bucket size has been reached.

D.

When the maximum number of warm buckets is reached.

Full Access
Question # 46

Which feature in Splunk allows Event Breaking, Timestamp extractions, and any advanced configurations

found in props.conf to be validated all through the UI?

A.

Apps

B.

Search

C.

Data preview

D.

Forwarder inputs

Full Access
Question # 47

When working with an indexer cluster, what changes with the global precedence when comparing to a standalone deployment?

A.

Nothing changes.

B.

The peer-apps local directory becomes the highest priority.

C.

The app local directories move to second in the priority list.

D.

The system default directory' becomes the highest priority.

Full Access
Question # 48

Where should apps be located on the deployment server that the clients pull from?

A.

$SFLUNK_KOME/etc/apps

B.

$SPLUNK_HCME/etc/sear:ch

C.

$SPLUNK_HCME/etc/master-apps

D.

$SPLUNK HCME/etc/deployment-apps

Full Access
Question # 49

Which scenario is applicable given the stanzas in authentication.conf below?

[authentication]

externalTwoFactorAuthVendor = Duo

externalTwoFactorAuthSettings = duoMFA

[duoMFA]

integrationKey = aGFwcHliaXJ0aGRheU1pZGR5

secretKey = YXVzdHJhaWxpYW5Gb3JHcmVw

applicationKey = c3BsaW5raW5ndGhlcGx1bWJ1c3NpbmN1OTU

apiHostname = 466993018.duosecurity.com

failOpen = True

timeout = 60

A.

If Splunk cannot connect to the multifactor authentication provider, all logins will be denied.

B.

Multifactor authentication is required to log into the host operating system.

C.

The secretKey does not need to be protected since multifactor authentication is turned on.

D.

If Splunk cannot connect to the multifactor authentication provider, authentications will be successful without completing a multifactor challenge.

Full Access
Question # 50

A Splunk administrator has been tasked with developing a retention strategy to have frequently accessed data sets on SSD storage and to have older, less frequently accessed data on slower NAS storage. They have set a mount point for the NAS. Which parameter do they need to modify to set the path for the older, less frequently accessed data in indexes.conf?

A.

homepath

B.

thawedPath

C.

summaryHomePath

D.

colddeath

Full Access
Question # 51

A configuration file in a deployed app needs to be directly edited. Which steps would ensure a successful deployment to clients?

A.

Make the change in $SPLUNK HOME/etc/dep10yment apps/$appName/10ca1/ on the deployment server, and the change will be automatically sent to the deployment clients.

B.

Make the change in $SPLUNK HOME /etc/apps/$appname/local/ on any of the deployment clients, and then run the command . / splunk reload deploy-server to push that change to the deployment server.

C.

Make the change in $SPLUNK HOME/etc/dep10yment apps/$appName/10ca1/ on the deployment server, and then run $SPLUNK HOME/bin/sp1unk reload deploy—server.

D.

Make the change in $SPLUNK HOME/etc/apps/$appName/defau1t on the deployment server, and it will be distributed down to the clients' own local versions.

Full Access
Question # 52

In this example, if useACK is set to true and the maxQueueSize is set to 7MB, what is the size of the wait queue on this universal forwarder?

A.

21MB

B.

28MB

C.

14MB

D.

7MB

Full Access
Question # 53

How can native authentication be disabled in Splunk?

A.

Remove the $SPLUNK_HOME/etc/passwd file

B.

Create an empty $SPLUNK_HOME/etc/passwd file

C.

Set SPLUNK_AUTHENTICATION=false in splunk-launch.conf

D.

Set nativeAuthentication=false in authentication.conf

Full Access
Question # 54

After how many warnings within a rolling 30-day period will a license violation occur with an enforced

Enterprise license?

A.

1

B.

3

C.

4

D.

5

Full Access
Question # 55

What is the default value of LINE_BREAKER?

A.

\r\n

B.

([\r\n]+)

C.

\r+\n+

D.

(\r\n+)

Full Access
Question # 56

Immediately after installation, what will a Universal Forwarder do first?

A.

Automatically detect any indexers in its subnet and begin routing data.

B.

Begin reading local files on its server.

C.

Begin generating internal Splunk logs.

D.

Send an email to the operator that the installation process has completed.

Full Access