What application security best practices should be adhered to while developing an app for Splunk? (Select all that apply.)
For a KV store, a lookup stanza in the transforms.conf file must contain which of the following? (Select all that apply.)
Assuming permissions are set appropriately, which REST endpoint path can be used by someone with a power user role to access information about mySearch, a saved search owned by someone with a user role?
A user wants to add the token $token_name$ to a dashboard for use in a drilldown. Which token filter encodes URL values?
Which HTTP Event Collector (HEC) endpoint should be used to collect data in the following format?
{“message”:“Hello World”, “foo”:“bar”, “pony”:“buttercup”}
Log files related to Splunk REST calls can be found in which indexes? (Select all that apply.)
Consider the following Python code snippet used in a Splunk add-on:
if not os.path.exists(full_path): self.doAction(full_path, header) else: f = open (full_path) oldORnew = f.readline().split(“,”) f.close()
An attacker could create a denial of service by causing an error in either the open() or readline()
commands. What type of vulnerability is this?
Which of the following are valid parent elements for the event action shown below? (Select all that apply.)
Which of the following search commands can be used to perform statistical queries on indexed fields in TSIDX files?
How can hiding or showing a panel by clicking on a chart or a table on the same form be performed?
When using the Splunk REST API, which of the following containers is/are included in the Atom Feed response? (Select all that apply.)
Which of the following log files contains logs that are most relevant to Splunk Web?
Data can be added to a KV store collection in which of the following format(s)?