Summer Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

There is a file with a vast amount of old data. Which of the following inputs.conf attributes would allow an admin to monitor the file for updates without indexing the pre-existing data?

A.

IgnoreOlderThan

B.

allowList

C.

monitor

D.

followTail

Full Access
Question # 5

In which phase of the index time process does the license metering occur?

A.

input phase

B.

Parsing phase

C.

Indexing phase

D.

Licensing phase

Full Access
Question # 6

What happens when there are conflicting settings within two or more configuration files?

A.

The setting is ignored until conflict is resolved.

B.

The setting for both values will be used together.

C.

The setting with the lowest precedence is used.

D.

The setting with the highest precedence is used.

Full Access
Question # 7

An admin oversees an environment with a 1000 GBI day license. The configuration file

server.conf has strict pool quota=false set. The license is divided into the following three pools, and today's usage is shown on the right-hand column:

PoolLicense SizeToday's usage

X500 GB/day100 GB

Y350 GB/day400 GB

Z150 GB/day300 GB

Given this, which pool(s) are issued warnings?

A.

All pools

B.

Z only

C.

None

D.

Y and Z

Full Access
Question # 8

A Splunk administrator has been tasked with developing a retention strategy to have frequently accessed data sets on SSD storage and to have older, less frequently accessed data on slower NAS storage. They have set a mount point for the NAS. Which parameter do they need to modify to set the path for the older, less frequently accessed data in indexes.conf?

A.

homepath

B.

thawedPath

C.

summaryHomePath

D.

colddeath

Full Access
Question # 9

How is data handled by Splunk during the input phase of the data ingestion process?

A.

Data is treated as streams.

B.

Data is broken up into events.

C.

Data is initially written to disk.

D.

Data is measured by the license meter.

Full Access
Question # 10

Where are license files stored?

A.

$SPLUNK_HOME/etc/secure

B.

$SPLUNK_HOME/etc/system

C.

$SPLUNK_HOME/etc/licenses

D.

$SPLUNK_HOME/etc/apps/licenses

Full Access
Question # 11

A user is assigned two roles with the following search filters. What is the user's applied search filter?

A.

B.

B.

C.

C.

D.

D.

Full Access
Question # 12

Which forwarder type can parse data prior to forwarding?

A.

Universal forwarder

B.

Heaviest forwarder

C.

Hyper forwarder

D.

Heavy forwarder

Full Access
Question # 13

Using the CLI on the forwarder, how could the current forwarder to indexer configuration be viewed?

A.

splunk btool server list --debug

B.

splunk list forward-indexer

C.

splunk list forward-server

D.

splunk btool indexes list --debug

Full Access
Question # 14

All search-time field extractions should be specified on which Splunk component?

A.

Deployment server

B.

Universal forwarder

C.

Indexer

D.

Search head

Full Access
Question # 15

In this example, ifuseACKis set to true and themaxQueueSizeis set to 7MB, what is the size of the wait queue on this universal forwarder?

A.

21MB

B.

28MB

C.

14MB

D.

7MB

Full Access
Question # 16

After automatic load balancing is enabled on a forwarder, the time interval for switching indexers can be updated by using which of the following attributes?

A.

channelTTL

B.

connectionTimeout

C.

autoLBFrequency

D.

secsInFailurelnterval

Full Access
Question # 17

What is the correct order of index time precedence?

(For each of the following, highest precedence is shown at the top and lowest precedence is shown at the bottom)

A.

B.

B.

C.

C.

D.

D.

Full Access
Question # 18

What is the default value ofLINE_BREAKER?

A.

\r\n

B.

([\r\n]+)

C.

\r+\n+

D.

(\r\n+)

Full Access
Question # 19

Which of the following is a valid method to create a Splunk user?

A.

Create a support ticket.

B.

Create a user on the host operating system.

C.

Splunk REST API.

D.

Add the username to users. conf.

Full Access
Question # 20

Which of the following are supported options when configuring optional network inputs?

A.

Metadata override, sender filtering options, network input queues (quantum queues)

B.

Metadata override, sender filtering options, network input queues (memory/persistent queues)

C.

Filename override, sender filtering options, network output queues (memory/persistent queues)

D.

Metadata override, receiver filtering options, network input queues (memory/persistent queues)

Full Access
Question # 21

Which of the following is true when authenticating users to Splunk using LDAP?

A.

LDAP group names must match the Splunk role name defined in authorize.conf.

B.

Splunk will search each LDAP strategy in the order in which they are listed in authentication.conf.

C.

Splunk only supports encrypted LDAP connections.

D.

LDAP will take precedence over local users with the same username as defined in etc/passwd.

Full Access
Question # 22

Which of the following enables compression for universal forwarders in outputs. conf ?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 23

Which option accurately describes the purpose of the HTTP Event Collector (HEC)?

A.

A token-based HTTP input that is secure and scalable and that requires the use of forwarders

B.

A token-based HTTP input that is secure and scalable and that does not require the use of forwarders.

C.

An agent-based HTTP input that is secure and scalable and that does not require the use of forwarders.

D.

A token-based HTTP input that is insecure and non-scalable and that does not require the use of forwarders.

Full Access
Question # 24

In addition to single, non-clustered Splunk instances, what else can the deployment server push apps to?

A.

Universal forwarders

B.

Splunk Cloud

C.

Linux package managers

D.

Windows using WMI

Full Access
Question # 25

Which of the following apply to how distributed search works? (select all that apply)

A.

The search head dispatches searches to the peers

B.

The search peers pull the data from the forwarders.

C.

Peers run searches in parallel and return their portion of results.

D.

The search head consolidates the individual results and prepares reports

Full Access
Question # 26

User role inheritance allows what to be inherited from the parent role? (select all that apply)

A.

Parents

B.

Capabilities

C.

Index access

D.

Search history

Full Access
Question # 27

UsingSEDCMDinprops.confallows raw data to be modified. With the given event below, which option will mask the first three digits of theAcctIDfield resulting output:[22/Oct/2018:15:50:21] VendorID=1234 Code=B AcctID=xxx5309

Event:

[22/Oct/2018:15:50:21] VendorID=1234 Code=B AcctID=xxx5309

A.

SEDCMD-1acct = s/VendorID=\d{3}(\d{4})/VendorID=xxx/g

B.

SEDCMD-xxxAcct = s/AcctID=\d{3}(\d{4})/AcctID=xxx/g

C.

SEDCMD-1acct = s/AcctID=\d{3}(\d{4})/AcctID=\1xxx/g

D.

SEDCMD-1acct = s/AcctID=\d{3}(\d{4})/AcctID=xxx\1/g

Full Access
Question # 28

The Splunk administrator wants to ensure data is distributed evenly amongst the indexers. To do this, he runs

the following search over the last 24 hours:

index=*

What field can the administrator check to see the data distribution?

A.

host

B.

index

C.

linecount

D.

splunk_server

Full Access
Question # 29

In case of a conflict between a whitelist and a blacklist input setting, which one is used?

A.

Blacklist

B.

Whitelist

C.

They cancel each other out.

D.

Whichever is entered into the configuration first.

Full Access
Question # 30

When should the Data Preview feature be used?

A.

When extracting fields for ingested data.

B.

When previewing the data before searching.

C.

When reviewing data on the source host.

D.

When validating the parsing of data.

Full Access
Question # 31

Which of the following is a benefit of distributed search?

A.

Peers run search in sequence.

B.

Peers run search in parallel.

C.

Resilience from indexer failure.

D.

Resilience from search head failure.

Full Access
Question # 32

Which data pipeline phase is the last opportunity for defining event boundaries?

A.

Input phase

B.

Indexing phase

C.

Parsing phase

D.

Search phase

Full Access
Question # 33

For single line event sourcetypes. it is most efficient to set SHOULD_linemerge to what value?

A.

True

B.

False

C.

D.

Newline Character

Full Access
Question # 34

Which layers are involved in Splunk configuration file layering? (select all that apply)

A.

App context

B.

User context

C.

Global context

D.

Forwarder context

Full Access
Question # 35

Immediately after installation, what will a Universal Forwarder do first?

A.

Automatically detect any indexers in its subnet and begin routing data.

B.

Begin generating internal Splunk logs.

C.

Begin reading local files on its server.

D.

Send an email to the operator that the installation process has completed.

Full Access
Question # 36

When running a real-time search, search results are pulled from which Splunk component?

A.

Heavy forwarders and search peers

B.

Heavy forwarders

C.

Search heads

D.

Search peers

Full Access
Question # 37

Which default Splunk role could be assigned to provide users with the following capabilities?

Create saved searches

Edit shared objects and alerts

Not allowed to create custom roles

A.

admin

B.

power

C.

user

D.

splunk-system-role

Full Access
Question # 38

Which feature of Splunk’s role configuration can be used to aggregate multiple roles intended for groups of

users?

A.

Linked roles

B.

Grantable roles

C.

Role federation

D.

Role inheritance

Full Access
Question # 39

Which of the following are methods for adding inputs in Splunk? (select all that apply)

A.

CLI

B.

Splunk Web

C.

Editing inputs. conf

D.

Editing monitor. conf

Full Access
Question # 40

Which of the following configuration files are used with a universal forwarder? (Choose all that apply.)

A.

inputs.conf

B.

monitor.conf

C.

outputs.conf

D.

forwarder.conf

Full Access
Question # 41

A company moves to a distributed architecture to meet the growing demand for the use of Splunk. What parameter can be configured to enable automatic load balancing in the

Universal Forwarder to send data to the indexers?

A.

Create one outputs . conf file for each of the server addresses in the indexing tier.

B.

Configure the outputs . conf file to point to any server in the indexing tier and Splunk will configure the data to be sent to all of the indexers.

C.

Splunk does not do load balancing and requires a hardware load balancer to balance traffic across the indexers.

D.

Set the stanza to have a server value equal to a comma-separated list of IP addresses and indexer ports for each of the indexers in the environment.

Full Access
Question # 42

Which artifact is required in the request header when creating an HTTP event?

A.

ackID

B.

Token

C.

Manifest

D.

Host name

Full Access
Question # 43

When enabling data integrity control, where does Splunk Enterprise store the hash files for each bucket?

A.

Splunk Enterprise stores hash files in the logdata directory of the corresponding bucket.

B.

Splunk Enterprise stores hash files in the rawdata directory of the corresponding bucket.

C.

Splunk Enterprise stores hash files in the hashdata directory of the corresponding bucket.

D.

Splunk Enterprise stores hash files in the metadata directory of the corresponding bucket.

Full Access
Question # 44

Which Splunk component distributes apps and certain other configuration updates to search head cluster members?

A.

Deployer

B.

Cluster master

C.

Deployment server

D.

Search head cluster master

Full Access
Question # 45

What is required when adding a native user to Splunk? (select all that apply)

A.

Password

B.

Username

C.

Full Name

D.

Default app

Full Access
Question # 46

Search heads in a company's European offices need to be able to search data in their New York offices. They also need to restrict access to certain indexers. What should be configured to allow this type of action?

A.

Indexer clustering

B.

LDAP control

C.

Distributed search

D.

Search head clustering

Full Access
Question # 47

Which of the following is the recommended guideline for creating a new user role?

A.

Create a role that incorporates capabilities and index inheritance.

B.

Create a new unique role for each unique user.

C.

There are no recommended guidelines when creating new user roles.

D.

Create two roles based on capabilities and indexes, then utilize inheritance.

Full Access
Question # 48

When deploying apps, which attribute in the forwarder management interface determines the apps that clients install?

A.

App Class

B.

Client Class

C.

Server Class

D.

Forwarder Class

Full Access
Question # 49

Which Splunk forwarder has a built-in license?

A.

Light forwarder

B.

Heavy forwarder

C.

Universal forwarder

D.

Cloud forwarder

Full Access
Question # 50

Which configuration files are used to transform raw data ingested by Splunk? (Choose all that apply.)

A.

props.conf

B.

inputs.conf

C.

rawdata.conf

D.

transforms.conf

Full Access
Question # 51

Which of the following lists the three phases of the Splunk Indexing process in order?

A.

Ingest phaseLicensing phaseParsing phase

B.

Sourcetype phaseIndex phaseWrite-to-disk phase

C.

Input phaseParsing phaseIndexing phase

D.

Ingest phaseTransforming phaseIndexing phase

Full Access
Question # 52

The volume of data from collecting log files from 50 Linux servers and 200 Windows servers will require

multiple indexers. Following best practices, which types of Splunk component instances are needed?

A.

Indexers, search head, universal forwarders, license master

B.

Indexers, search head, deployment server, universal forwarders

C.

Indexers, search head, deployment server, license master, universal forwarder

D.

Indexers, search head, deployment server, license master, universal forwarder, heavy forwarder

Full Access
Question # 53

Which Splunk forwarder type allows parsing of data before forwarding to an indexer?

A.

Universal forwarder

B.

Parsing forwarder

C.

Heavy forwarder

D.

Advanced forwarder

Full Access
Question # 54

The CLI command splunk add forward-server indexer: will create stanza(s) in

which configuration file?

A.

inputs.conf

B.

indexes.conf

C.

outputs.conf

D.

servers.conf

Full Access
Question # 55

This file has been manually created on a universal forwarder

A new Splunk admin comes in and connects the universal forwarders to a deployment server and deploys the same app with a new

Which file is now monitored?

A.

/var/log/messages

B.

/var/log/maillog

C.

/var/log/maillog and /var/log/messages

D.

none of the above

Full Access
Question # 56

How can native authentication be disabled in Splunk?

A.

Remove the $SPLUNK_HOME/etc/passwd file

B.

Create an empty $SPLUNK_HOME/etc/passwd file

C.

Set SPLUNK_AUTHENTICATION=false in splunk-launch.conf

D.

Set nativeAuthentication=false in authentication.conf

Full Access
Question # 57

Consider the following stanza ininputs.conf:

What will the value of the source filed be for events generated by this scripts input?

A.

/opt/splunk/ecc/apps/search/bin/liscer.sh

B.

unknown

C.

liscer

D.

liscer.sh

Full Access
Question # 58

In a customer managed Splunk Enterprise environment, what is the endpoint URI used to collect data?

A.

services/collector

B.

data/collector

C.

services/inputs?raw

D.

services/data/collector

Full Access