When using the top command in the following search, which of the following will be true about the results?
index="main" sourcetype="access_*" action="purchase" | top 3 statusCode by user showperc=f countfield=status_code_count
Which of the following searches would return events with failure in index netfw or warn or critical in index netops?
Keywords are highlighted when you mouse over search results and you can click this search result to (Choose three.):
Which Boolean operator is implied between search terms, unless otherwise specified?
What is the correct syntax to count the number of events containing a vendor_action field?
A collection of items containing things such as data inputs, UI elements, and knowledge objects is known as what?
What is the result of the following search?
index=myindex source=c: \mydata. txt NOT error=*
By default, which role contains the minimum permissions required to have write access to Splunk alerts?
How many minutes, by default, is the time to live (ttl) for an ad-hoc search job?
Given the following SPL search, how many rows of results would you expect to be returned by default? index=security sourcetype=linux_secure (fail* OR invalid) I top src__ip
Which stats command function provides a count of how many unique values exist for a given field in the result set?
Which of the following are Splunk premium enhanced solutions? (Choose three.)
Which component of Splunk let us write SPL query to find the required data?
When running searches command modifiers in the search string are displayed in what color?
Which of the following Splunk components typically resides on the machines where data originates?
When a Splunk search generates calculated data that appears in the Statistics tab. in what formats can the results be exported?
Which command automatically returns percent and count columns when executing searches?
What is the main requirement for creating visualizations using the Splunk UI?
Creating Data Models:
Fields associated with a data set are known as ______.
According to Splunk best practices, which placement of the wildcard results in the most efficient search?
In the Search and Reporting app, which tab displays timecharts and bar charts?
Will the queries following below get the same result?
1. index=log sourcetype=error_log status !=100
2. index=log sourcetype=error_log NOT status =100
Which search will return only events containing the word “error†and display the results as a table that includes
the fields named action, src, and dest?
In a deployment with multiple indexes, what will happen when a search is run and an index is not specified in the search string?
Which search will return the 15 least common field values for the dest_ip field?
Splunk internal fields contains general information about events and starts from underscore i.e. _ .
What happens when a field is added to the Selected Fields list in the fields sidebar'?
You can use the following options to specify start and end time for the query range:
When placed early in a search, which command is most effective at reducing search execution time?