New Year Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

SPLK-2001 Questions and Answers

Question # 6

What application security best practices should be adhered to while developing an app for Splunk? (Select all that apply.)

A.

Review the OWASP Top Ten List.

B.

Store passwords in clear text in .conf files.

C.

Review the OWASP Secure Coding Practices Quick Reference Guide.

D.

Ensure that third-party libraries that the app depends on have no outstanding CVE vulnerabilities.

Full Access
Question # 7

For a KV store, a lookup stanza in the transforms.conf file must contain which of the following? (Select all that apply.)

A.

collection

B.

fields_list

C.

external_type

D.

internal_type

Full Access
Question # 8

Which of the following describes a Splunk custom visualization?

A.

A visualization with custom colors.

B.

Any visualization available in Splunk.

C.

A visualization in Splunk modified by the user.

D.

A visualization that uses the Splunk Custom Visualization API.

Full Access
Question # 9

Which of the following will unset a token named my_token?

A.

$my_token$

B.

C.

false

D.

disabled

Full Access
Question # 10

Which of the following is a security best practice?

A.

Enable XSS.

B.

Eliminate all escape characters.

C.

Ensure the app passes App Certification.

D.

Ensure components have no Common Vulnerabilities and Exposures (CVE) vulnerabilities.

Full Access
Question # 11

Assuming permissions are set appropriately, which REST endpoint path can be used by someone with a power user role to access information about mySearch, a saved search owned by someone with a user role?

A.

/servicesNS/-/data/saved/searches/mySearch

B.

/servicesNS/object/saved/searches/mySearch

C.

/servicesNS/search/saved/searches/mySearch

D.

/servicesNS/-/search/saved/searches/mySearch

Full Access
Question # 12

A user wants to add the token $token_name$ to a dashboard for use in a drilldown. Which token filter encodes URL values?

A.

$$token_name$$

B.

$token_name|h$

C.

$token_name|n$

D.

$token_name|u$

Full Access
Question # 13

Which HTTP Event Collector (HEC) endpoint should be used to collect data in the following format?

{“message”:“Hello World”, “foo”:“bar”, “pony”:“buttercup”}

A.

data/inputs/http/{name}

B.

services/collector/raw

C.

services/collector

D.

data/inputs/http

Full Access
Question # 14

Log files related to Splunk REST calls can be found in which indexes? (Select all that apply.)

A.

_audit

B.

_internal

C.

_thefishbucket

D.

_blocksignature

Full Access
Question # 15

Consider the following Python code snippet used in a Splunk add-on:

if not os.path.exists(full_path): self.doAction(full_path, header) else: f = open (full_path) oldORnew = f.readline().split(“,”) f.close()

An attacker could create a denial of service by causing an error in either the open() or readline()

commands. What type of vulnerability is this?

A.

CWE-693: Protection Mechanism Failure

B.

CWE-562: Return of Stack Variable Address

C.

CWE-404: Improper Resource Shutdown or Release

D.

CWE-636: Not Failing Securely (‘Failing Open’)

Full Access
Question # 16

Which of the following are valid parent elements for the event action shown below? (Select all that apply.)

sourcetype=$click.value|s$

A.

B.

C.

D.

Full Access
Question # 17

Which of the following search commands can be used to perform statistical queries on indexed fields in TSIDX files?

A.

stats

B.

tstats

C.

tscollect

D.

transaction

Full Access
Question # 18

How can hiding or showing a panel by clicking on a chart or a table on the same form be performed?

A.

By using vent drilldown.

B.

By using workflow action.

C.

By using contextual drilldown.

D.

By using visualization drilldown.

Full Access
Question # 19

When using the Splunk REST API, which of the following containers is/are included in the Atom Feed response? (Select all that apply.)

A.

B.

C.

D.

<namespace>

Full Access
Question # 20

Which of the following log files contains logs that are most relevant to Splunk Web?

A.

audit.log

B.

metrics.log

C.

splunkd.log

D.

web_service.log

Full Access
Question # 21

Data can be added to a KV store collection in which of the following format(s)?

A.

JSON

B.

JSON, XML

C.

JSON, XML, CSV

D.

JSON, XML, CSV, TXT

Full Access