New Year Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

SPLK-1005 Questions and Answers

Question # 6

For the following data, what would be the correct attribute/value oair to use to successfully extract the correct timestamp from all the events?

A.

TIMK_FORMAT = %b %d %H:%M:%S %z

B.

DATETIME CONFIG = %Y-%m-%d %H:%M:%S %2

C.

TIME_FORMAT = %b %d %H:%M:%S

D.

DATETIKE CONFIG = Sb %d %H:%M:%S

Full Access
Question # 7

The following sample log event shows evidence of credit card numbers being present in the transactions. loc file.

Which of these SEDCM3 settings will mask this and other suspected credit card numbers with an Y character for each character being masked? The indexed event should be formatted as follows:

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 8

Files from multiple systems are being stored on a centralized log server. The files are organized into directories based on the original server they came from. Which of the following is a recommended approach for correctly setting the host values based on their origin?

A.

Use the host segment, setting.

B.

Set host = * in the monitor stanza.

C.

The host value cannot be dynamically set.

D.

Manually create a separate monitor stanza for each host, with the nose = value set.

Full Access
Question # 9

Which of the following is not a path used by Splunk to execute scripts?

A.

SPLUNK_HOME/etc/system/bin

B.

SPLUNK HOME/etc/appa//bin

C.

SPLUNKHOMS/ctc/scripts/local

D.

SPLUNK_HOME/bin/scripts

Full Access
Question # 10

Where is the recommended place to deploy input apps that are not permitted on Splunk Cloud?

A.

Universal Forwarder or Heavy Forwarder.

B.

Heavy Forwarder only.

C.

Universal Forwarder only.

D.

Apps cannot be installed on on-prem instances.

Full Access
Question # 11

A log file is being ingested into Splunk, and a few events have no date stamp. How would Splunk first try to determine the missing date of the events?

A.

Splunk will take the date of a previous event within the log file.

B.

Splunk will use the current system time of the Indexer for the date.

C.

Splunk will use the date of when the file monitor was created.

D.

Splunk will take the date from the file modification time.

Full Access
Question # 12

How are HTTP Event Collector (HEC) tokens configured in a managed Splunk Cloud environment?

A.

Any token will be accepted by HEC, the data may just end up in the wrong index.

B.

A token is generated when configuring a HEC input, which should be provided to the application developers.

C.

Obtain a token from the organization's application developers and apply it in Settings > Data Inputs > HTTP Event Collector > New Token.

D.

Open a support case for each new data input and a token will be provided.

Full Access
Question # 13

What two files are used in the data transformation process?

A.

parsing.conf and transforms.conf

B.

props.conf and transforms.conf

C.

transforms.conf and fields.conf

D.

transforms.conf and sourcetypes.conf

Full Access
Question # 14

Which file or folder below is not a required part of a deployment app?

A.

app.conf (in default or local)

B.

local.meta

C.

metadata folder

D.

props.conf

Full Access
Question # 15

Which of the following are valid settings for file and directory monitor inputs?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 16

What is the recommended approach to collect data from network devices?

A.

TCP/UDP Feed > Heavy Forwarder > Intermediate Forwarder > Splunk Cloud

B.

TCP/UDP Feed > Syslog Server with Universal Forwarder > Splunk Cloud

C.

TCP/UDP Feed > Universal Forwarder > Intermediate Forwarder > Splunk Cloud

D.

TCP/UDP Feed > Intermediate Forwarder > Heavy Forwarder > Splunk Cloud

Full Access
Question # 17

Which of the following statements is true about data transformations using SEDCMD?

A.

Can only be used to mask or truncate raw data.

B.

Configured in props.conf and transform.conf.

C.

Can be used to manipulate the sourcetype per event.

D.

Operates on a REGEX pattern match of the source, sourcetype, or host of an event.

Full Access
Question # 18

By default, which of the following capabilities are granted to the sc_admin role?

A.

indexes_edit, edit___token, admin_all_objects, delete_by_keyword

B.

indexes_edit, fsh_manage, acs_conf, list_indexesdiscovert

C.

indexes_edit, fsh_manage, admin_all_objects can_delete

D.

indexes_edit, edit_token_http, admin _all objects, edit limits_conf

Full Access
Question # 19

Which monitor statement will retrieve only files that start with "access" in the directory /opt/log/ww2/?

A.

[monitor:///opt/lug/.../access]

B.

[monitor:///opt/log/www2/access*]

C.

[monitor:///opt/log/www2/]

D.

[monitor:///opt/log/.../]

Full Access
Question # 20

What can be used in a Splunk Cloud environment to create new sourcetypes?

A.

Data Preview

B.

props. conf can be edited directly from the GUI

C.

Splunk's CLI

D.

Deployment Server

Full Access
Question # 21

Due to internal security policies, a Splunk Cloud administrator cannot send data directly to Splunk Cloud from certain data sources. Additional parsing and API-based data sources also need to be sent to Splunk Cloud. What forwarder type should the Splunk Cloud administrator use to satisfy these requirements within their environment?

A.

Syslog-ng server with a universal forwarder

B.

Light forwarder as an intermediate forwarder

C.

Heavy forwarder as an intermediate forwarder

D.

Universal forwarder as an intermediate forwarder

Full Access
Question # 22

In case of a Change Request, which of the following should submit a support case for Splunk Support?

A.

The party requesting the change.

B.

Certified Splunk Cloud administrator.

C.

Splunk infrastructure owner.

D.

Any person with the appropriate entitlement

Full Access
Question # 23

At what point in the indexing pipeline set is SEDCMD applied to data?

A.

In the aggregator queue

B.

In the parsing queue

C.

In the exec pipeline

D.

In the typing pipeline

Full Access
Question # 24

Which of the following methods is valid for creating index-time field extractions?

A.

Use the UI to create a sourcetype, specify the field name and corresponding regular expression with capture statement.

B.

Create a configuration app with the index-time props.conf and/or transfoms. conf, and upload the app via UI.

C.

Use the CU app to define settings in fields.conf, and restart Splunk Cloud.

D.

Use the rex command to extract the desired field, and then save as a calculated field.

Full Access