Questions Flashcards

1
Q

What determines the scope of data that appears in a scheduled report?

A

Permissions granted by the owner of report.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When writing searches in Splunk.what is true about Booleans?

A

They must be uppercase.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How can search results be kept for longer than 7 days?

A

Changing job settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

When running searches, command modifiers are displayed in what colour?

A

Orange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following is a Splunk search best practice?

A

Filter as early as possible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How are events displayed after a search is executed?

A

Reverse chronological order

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the primary function of a scheduled report?

A

Triggering an alert in your Splunk instance when certain conditions are met

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which commands is used to review the contents of a specified static lookup file?

A

inputlookup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When sorting on multiple fields with the sort command, what delimiter can be used between the field names in the search?

A

,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following about case sensitivity is true?

A

Field names ARE case sensitive; field values are NOT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does the rare command do?

A

Returns the least common field values of a given field in the results.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which Boolean operator is always implied between two search terms, unless otherwise specified?

A

AND

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the purpose of using a by clause with the stats command?

A

To group the results by one or more fields

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How can you add a field to the fields sidebar?

A

Click All Fields and select the field to add it to Selected Fields

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In the fields sidebar, which character denotes alpha numeric field values?

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How does Splunk determine which fields to extract from data?

A

Splunk automatically discovers many fields based on sourcetype and key/value pairs found in data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What syntax is used to link key/value pairs in search strings?

A

Relational operators such as =,

18
Q

In a deployment with multiple indexes, what will happen when a search is run and an index is not specified in the search string?

A

Events from every index searched by default to which the user has access will be returned

19
Q

In the Splunk interface, the list of alerts can be filtered based on which characteristics?

A

App, Time, Window, Type, and Severity

20
Q

When viewing results of a search, what is an interesting field?

A

A field that appears in the at least 20% of events

21
Q

When a Splunk search generates calculated data that appears in the Statistics tab, in what formats can the results be exported?

A

CSV, XML, JSON

22
Q

What is the recommended way to create multiple dashboards displaying data from the same search?

A

Export the results of the search to an XML file and use the file as the basis of the dashboards

23
Q

What does the stats command do?

A

Calculates statistics on data that matches the search criteria

24
Q

Which is the primary function of the timeline located under the search bar?

A

To show peaks and/or valleys in the timeline, which can indicate spikes in activity or downtime.

25
Q

What can be configured using the Edit Job Settings menu?

A

Change Job Lifetime from 10 minutes to 7 days

26
Q

What is the primary use of the rare command?

A

To find the least common values of a field in a dataset

27
Q

What happens when a field is added to Selected Fields?

A

The selected field wand it’s corresponding values will appear underneath the events in the search results.

28
Q

How would you describe lookup files?

A

Lookups contain static data available in the index.

29
Q

Which component of Splunk is primarily responsible for saving data?

A

Indexer

30
Q

Is the universal forwarded recommended for forwarding logs to the indexers?

A

Yes.

31
Q

What can be used as a wildcard search in Splunk?

A

*

32
Q

Can prefix wildcards cause performance issues?

A

Yes

33
Q

What forms does machine data come in?

A

Structured and unstructured

34
Q

How many user roles are there in Splunk?

A

3

35
Q

Where can data be parsed?

A

Heavy Forwarder and Indexers

36
Q

How can you onboard data to Splunk?

A

CLI, Splunk Web, Splunk apps and add-ons, inputs.conf

37
Q

What does the eval command do?

A

Calculates an expression and puts the resulting value into a destination field

38
Q

When could you need to use lookup tables?

A

To retrieve additional information present in the raw events.

39
Q

What’s an advantage of using data models with Pivot?

A

You can create dashboards and reports without designing the searches that generate them.

40
Q

What is the difference between Selected Fields and Interesting Fields in the Fields sidebar?

A

Selected Fields show host, source, and sourcetype fields.

Interesting Fields show the fields extracted by Splunk that are present in at least 20% of the events.