11.11 Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

SPLK-1002 Exam Dumps - Splunk Core Certified Power User Exam

Question # 4

Which of the following data models are included in the Splunk Common Information Model (CIM) add-on? (select all that apply)

A.

User permissions

B.

Alerts

C.

Databases

D.

Email

Full Access
Question # 5

A data model consists of which three types of datasets?

A.

Constraint, field, value.

B.

Events, searches, transactions.

C.

Field extraction, regex, delimited.

D.

Transaction, session ID, metadata.

Full Access
Question # 6

Which field extraction method should be selected for comma-separated data?

A.

Regular expression

B.

Delimiters

C.

eval expression

D.

table extraction

Full Access
Question # 7

When creating a data model, which root dataset requires at least one constraint?

A.

Root transaction dataset

B.

Root event dataset

C.

Root child dataset

D.

Root search dataset

Full Access
Question # 8

Which function should you use with the transaction command to set the maximum total time between the earliest and latest events returned?

A.

maxpause

B.

endswith

C.

maxduration

D.

maxspan

Full Access
Question # 9

When using | timechart by host, which field is represented in the x-axis?

A.

date

B.

host

C.

time

D.

_time

Full Access
Question # 10

This function of the stats command allows you to return the middle-most value of field X.

A.

Median(X)

B.

Eval by X

C.

Fields(X)

D.

Values(X)

Full Access
Question # 11

What type of command is eval?

A.

Streaming in some modes

B.

Report generating

C.

Distributable streaming

D.

Centralized streaming

Full Access
Question # 12

If there are fields in the data with values that are " " or empty but not null, which of the following would add a value?

A.

| eval notNULL = if(isnull (notNULL), “0” notNULL)

B.

| eval notNULL = if(isnull (notNULL), “0”

C.

| eval notNULL = “” | nullfill value=0 notNULL

D.

| eval notNULL = “” fillnull value=0 notNULL

Full Access
Question # 13

Which of the following transforming commands can be used with transactions?

A.

chart, timechart, stats, eventstats

B.

chart, timechart, stats, diff

C.

chart, timeehart, datamodel, pivot

D.

chart, timecha:t, stats, pivot

Full Access
Question # 14

Which of the following is included with the Splunk Common Information Model (CIM) Add-on?

A.

Sourcetype definitions from the most popular technology vendors.

B.

A set of pre-configured data models.

C.

Scripted inputs to pre-align data with the CIM.

D.

Dashboards to validate data quality.

Full Access
Question # 15

Which of the following searches will return events containing a tag named Privileged?

A.

tag=Priv

B.

tag=Priv*

C.

tag=priv*

D.

tag=privileged

Full Access
Question # 16

Which statement is true?

A.

Pivot is used for creating datasets.

B.

Data model are randomly structured datasets.

C.

Pivot is used for creating reports and dashboards.

D.

In most cases, each Splunk user will create their own data model.

Full Access
Question # 17

When can a pipe follow a macro?

A.

A pipe may always follow a macro.

B.

The current user must own the macro.

C.

The macro must be defined in the current app.

D.

Only when sharing is set to global for the macro.

Full Access
Question # 18

Which of the following searches show a valid use of a macro? (Choose all that apply.)

A.

index=main source=mySource oldField=* |’makeMyField(oldField)’| table _time newField

B.

index=main source=mySource oldField=* | stats if(‘makeMyField(oldField)’) | table _time newField

C.

index=main source=mySource oldField=* | eval newField=’makeMyField(oldField)’| table _time newField

D.

index=main source=mySource oldField=* | "’newField(‘makeMyField(oldField)’)’" | table _time newField

Full Access
Question # 19

When creating an event type, which is allowed in the search string?

A.

Tags

B.

Joins

C.

Subsearches

D.

Pipes

Full Access
Question # 20

Highlighted search terms indicate _________ search results in Splunk.

A.

Display as selected fields.

B.

Sorted

C.

Charted based on time

D.

Matching

Full Access
Question # 21

Which of the following searches will return all clientip addresses that start with 108?

A.

… | where like (clientip, “108.% )

B.

… | where (clientip, "108. %")

C.

… | where (clientip=108. % )

D.

… | search clientip=108

Full Access
Question # 22

When using the transaction command, how are evicted transactions identified?

A.

Closed_txn field is set to o, or false.

B.

Max_txn field is set to O, or false.

C.

Txn_field is set to 1, or true.

D.

open_txn field is set to 1, or true.

Full Access
Question # 23

Which of the following statements would help a user choose between the transaction and stats commands?

A.

state can only group events using IP addresses.

B.

The transaction command is faster and more efficient.

C.

There is a 1000 event limitation with the transaction command.

D.

Use state when the events need to be viewed as a single event.

Full Access
Question # 24

What happens to the original field name when a field alias is created?

A.

The original field name is not affected by the creation of a field alias.

B.

The original field name is replaced by the field alias within the index.

C.

The original field name is italicized to indicate that it is not an alias.

D.

The original field name still exists in the index but is not visible to the user at search time.

Full Access
Question # 25

Which of the following is true about data sets used in the Pivot tool?

A.

They can only be created from data models.

B.

They can only be created by users with the Admin role.

C.

They can only be created from summary indexes.

D.

They can only be created from saved reports.

Full Access
Question # 26

Which of the following eval command functions is valid?

A.

int()

B.

count()

C.

print()

D.

tostring()

Full Access
Question # 27

A search contains example(100,200). What is the name of the macro?

A.

example(2)

B.

example(var1,var2)

C.

example($,$)

D.

example[2]

Full Access
Question # 28

Which of the following is a function of the Splunk Common Information Model (CIM)?

A.

Normalizing data across a Splunk deployment.

B.

Providing templates for reports and dashboards.

C.

Algorithmically shifting events to other indexes.

D.

Reingesting previously indexed data with new field names.

Full Access
Question # 29

Which of the following statements describes calculated fields?

A.

Calculated fields are only used on fields added by lookups.

B.

Calculated fields are a shortcut for repetitive and complex eval commands.

C.

Calculated fields are a shortcut for repetitive and complex calc commands.

D.

Calculated fields automatically calculate the simple moving average for indexed fields.

Full Access
Question # 30

Where are the descriptions of the data models that come with the Splunk Common Information Model (CIM) Add-on documented?

A.

Datamodel command reference guide.

B.

Pivot users manual.

C.

Search and reporting user manual.

D.

CIM Add-on manual.

Full Access
Question # 31

Which of the following is true about a datamodel that has been accelerated?

A.

They can be used with Pivot, the | tstats command, or the | datamodel command.

B.

They can still be used in the Pivot tool but only with the accelerate_pivot capability.

C.

They can no longer be used in the Pivot tool.

D.

They can be used with the |tstats command, but will only return that data which has been accelerated.

Full Access
Question # 32

What fields does the transaction command add to the raw events? (select all that apply)

A.

count

B.

duration

C.

eventcount

D.

transaction id

Full Access
Question # 33

Use this command to use lookup fields in a search and see the lookup fields in the field sidebar.

A.

inputlookup

B.

lookup

Full Access
Question # 34

The timechart command is an example of which of the following command types?

A.

Orchestrating

B.

Transforming

C.

Statistical

D.

Generating

Full Access
Question # 35

Consider the following search:

index=web sourcetype=access_corabined

The log shows several events that share the same jsesszonid value (SD462K101O2F267). View the events as a group.

From the following list, which search groups events by jSSESSIONID?

A.

index=web sourcetype=access_combined I transaction JSESSZONID I search SD462K101C2F267

B.

index=web sourcetype=access_combined SD462K101O2F267 | table JSESSIONID

C.

index=web sourcetype=access_combined | highlight JSESSIONID | search SD462K101O2F267

D.

index=web sourcetype=access_combined JSESSTONID

Full Access
Question # 36

When should you use the transaction command instead of the scats command?

A.

When you need to group on multiple values.

B.

When duration is irrelevant in search results. .

C.

When you have over 1000 events in a transaction.

D.

When you need to group based on start and end constraints.

Full Access
Question # 37

Which of the following statements describe calculated fields? (select all that apply)

A.

Calculated fields can be used in the search bar.

B.

Calculated fields can be based on an extracted field.

C.

Calculated fields can only be applied to host and sourcetype.

D.

Calculated fields are shortcuts for performing calculations using the eval command.

Full Access
Question # 38

How does a user display a chart in stack mode?

A.

By using the stack command.

B.

By turning on the Use Trellis Layout option.

C.

By changing Stack Mode in the Format menu.

D.

You cannot display a chart in stack mode, only a timechart.

Full Access
Question # 39

Which of the following statements describe the search below? (select all that apply)

Index=main I transaction clientip host maxspan=30s maxpause=5s

A.

Events in the transaction occurred within 5 seconds.

B.

It groups events that share the same clientip and host.

C.

The first and last events are no more than 5 seconds apart.

D.

The first and last events are no more than 30 seconds apart.

Full Access
Question # 40

What does the following search do?

A.

Creates a table of the total count of users and split by corndogs.

B.

Creates a table of the total count of mysterymeat corndogs split by user.

C.

Creates a table with the count of all types of corndogs eaten split by user.

D.

Creates a table that groups the total number of users by vegetarian corndogs.

Full Access
Question # 41

In which of the following scenarios is an event type more effective than a saved search?

A.

When a search should always include the same time range.

B.

When a search needs to be added to other users' dashboards.

C.

When the search string needs to be used in future searches.

D.

When formatting needs to be included with the search string.

Full Access
Question # 42

What does the Splunk Common Information Model (CIM) add-on include? (select all that apply)

A.

Custom visualizations

B.

Pre-configured data models

C.

Fields and event category tags

D.

Automatic data model acceleration

Full Access
Question # 43

The Field Extractor (FX) is used to extract a custom field. A report can be created using this custom field. The created report can then be shared with other people in the organization. If another person in the organization runs the shared report and no results are returned, why might this be? (select all that apply)

A.

Fast mode is enabled.

B.

The dashboard is private.

C.

The extraction is private-

D.

The person in the organization running the report does not have access to the index.

Full Access
Question # 44

Selected fields are displayed ______each event in the search results.

A.

below

B.

interesting fields

C.

other fields

D.

above

Full Access
Question # 45

Which of the following statements about data models and pivot are true? (select all that apply)

A.

They are both knowledge objects.

B.

Data models are created out of datasets called pivots.

C.

Pivot requires users to input SPL searches on data models.

D.

Pivot allows the creation of data visualizations that present different aspects of a data model.

Full Access
Question # 46

Which of the following statements describes field aliases?

A.

Field alias names replace the original field name.

B.

Field aliases can be used in lookup file definitions.

C.

Field aliases only normalize data across sources and sourcetypes.

D.

Field alias names are not case sensitive when used as part of a search.

Full Access
Question # 47

Which of the following can be used with the eval command tostring function (select all that apply)

A.

‘’hex’’

B.

‘’commas’’

C.

‘’Decimal’’

D.

‘’duration’’

Full Access
Question # 48

Which of the following is the correct way to use the data model command to search field in the data model within the web dataset?

A.

| datamodel web search | filed web *

B.

| Search datamodel web web | filed web*

C.

| datamodel web web field | search web*

D.

Datamodel=web | search web | filed web*

Full Access
Question # 49

Data model are composed of one or more of which of the following datasets? (select all that apply.)

A.

Events datasets

B.

Search datasets

C.

Transaction datasets

D.

Any child of event, transaction, and search datasets

Full Access
Question # 50

What functionality does the Splunk Common Information Model (CIM) rely on to normalize fields with different names?

A.

Macros.

B.

Field aliases.

C.

The rename command.

D.

CIM does not work with different names for the same field.

Full Access
Question # 51

Data model fields can be added using the Auto-Extracted method. Which of the following statements describe Auto-Extracted fields? (select all that apply)

A.

Auto-Extracted fields can be hidden in Pivot.

B.

Auto-Extracted fields can have their data type changed.

C.

Auto-Extracted fields can be given a friendly name for use in Pivot.

D.

Auto-Extracted fields can be added if they already exist in the dataset with constraints.

Full Access
Question # 52

Calculated fields can be based on which of the following?

A.

Tags

B.

Extracted fields

C.

Output fields for a lookup

D.

Fields generated from a search string

Full Access
Question # 53

Which of the following statements describe data model acceleration? (select all that apply)

A.

Root events cannot be accelerated.

B.

Accelerated data models cannot be edited.

C.

Private data models cannot be accelerated.

D.

You must have administrative permissions or the accelerate_dacamodel capability to accelerate a data model.

Full Access
Question # 54

When creating a Search workflow action, which field is required?

A.

Search string

B.

Data model name

C.

Permission setting

D.

An eval statement

Full Access
Question # 55

A field alias has been created based on an original field. A search without any transforming commands is then executed in Smart Mode. Which field name appears in the results?

A.

Both will appear in the All Fields list, but only if the alias is specified in the search.

B.

Both will appear in the Interesting Fields list, but only if they appear in at least 20 percent of events.

C.

The original field only appears in All Fields list and the alias only appears in the Interesting Fields list.

D.

The alias only appears in the All Fields list and the original field only appears in the Interesting Fields list.

Full Access
Question # 56

Which of the following statements describes this search?

sourcetype=access_combined I transaction JSESSIONID | timechart avg (duration)

A.

This is a valid search and will display a timechart of the average duration, of each transaction event.

B.

This is a valid search and will display a stats table showing the maximum pause among transactions.

C.

No results will be returned because the transaction command must include the startswith and endswith options.

D.

No results will be returned because the transaction command must be the last command used in the search pipeline.

Full Access
Question # 57

To identify all of the contributing events within a transaction that contains at least one REJECT event, which syntax is correct?

A.

Index-main | REJECT trans sessionid

B.

Index-main | transaction sessionid | search REJECT

C.

Index=main | transaction sessionid | whose transaction=reject

D.

Index=main | transaction sessionid | where transaction=reject’’

Full Access
Question # 58

Which of the following describes the Splunk Common Information Model (CIM) add-on?

A.

The CIM add-on uses machine learning to normalize data.

B.

The CIM add-on contains dashboards that show how to map data.

C.

The CIM add-on contains data models to help you normalize data.

D.

The CIM add-on is automatically installed in a Splunk environment.

Full Access
Question # 59

Which of the following statements describe the search string below?

| datamodel Application_State All_Application_State search

A.

Evenrches would return a report of sales by state.

B.

Events will be returned from the data model named Application_State.

C.

Events will be returned from the data model named All_Application_state.

D.

No events will be returned because the pipe should occur after the datamodel command

Full Access
Question # 60

Which of the following Statements about macros is true? (select all that apply)

A.

Arguments are defined at execution time.

B.

Arguments are defined when the macro is created.

C.

Argument values are used to resolve the search string at execution time.

D.

Argument values are used to resolve the search string when the macro is created.

Full Access
Question # 61

Which of the following actions can the eval command perform?

A.

Remove fields from results.

B.

Create or replace an existing field.

C.

Group transactions by one or more fields.

D.

Save SPL commands to be reused in other searches.

Full Access
Question # 62

Which of the following statements is true, especially in large environments?

A.

Use the scats command when you next to group events by two or more fields.

B.

The stats command is faster and more efficient than the transaction command

C.

The transaction command is faster and more efficient than the stats command.

D.

Use the transaction command when you want to see the results of a calculation.

Full Access
Question # 63

In what order arc the following knowledge objects/configurations applied?

A.

Field Aliases, Field Extractions, Lookups

B.

Field Extractions, Field Aliases, Lookups

C.

Field Extractions, Lookups, Field Aliases

D.

Lookups, Field Aliases, Field Extractions

Full Access
Question # 64

What is the relationship between data models and pivots?

A.

Data models provide the datasets for pivots.

B.

Pivots and data models have no relationship.

C.

Pivots and data models are the same thing.

D.

Pivots provide the datasets for data models.

Full Access
Question # 65

Which of the following statements describe GET workflow actions?

A.

GET workflow actions must be configured with POST arguments.

B.

Configuration of GET workflow actions includes choosing a sourcetype.

C.

Label names for GET workflow actions must include a field name surrounded by dollar signs.

D.

GET workflow actions can be configured to open the URT link in the current window or in a new window

Full Access
Question # 66

Which of the following data model are included In the Splunk Common Information Model (CIM) add-on? (select all that apply)

A.

Alerts

B.

Email

C.

Database

D.

User permissions

Full Access
Question # 67

Which of the following statements describes macros?

A.

A macro is a reusable search string that must contain the full search.

B.

A macro is a reusable search string that must have a fixed time range.

C.

A macro Is a reusable search string that may have a flexible time range.

D.

A macro Is a reusable search string that must contain only a portion of the search.

Full Access
Question # 68

Which of the following statements describes POST workflow actions?

A.

POST workflow actions are always encrypted.

B.

POST workflow actions cannot use field values in their URI.

C.

POST workflow actions cannot be created on custom sourcetypes.

D.

POST workflow actions can open a web page in either the same window or a new .

Full Access
Question # 69

Which of the following file formats can be extracted using a delimiter field extraction?

A.

CSV

B.

PDF

C.

XML

D.

JSON

Full Access
Question # 70

Which group of users would most likely use pivots?

A.

Users

B.

Architects

C.

Administrators

D.

Knowledge Managers

Full Access
Question # 71

When multiple event types with different color values are assigned to the same event, what determines the color displayed for the events?

A.

Rank

B.

Weight

C.

Priority

D.

Precedence

Full Access
Question # 72

When using timechart, how many fields can be listed after a by clause?

A.

because timechart doesn't support using a by clause.

B.

because _time is already implied as the x-axis.

C.

because one field would represent the x-axis and the other would represent the y-axis.

D.

There is no limit specific to timechart.

Full Access
Question # 73

What is required for a macro to accept three arguments?

A.

The macro's name ends with (3).

B.

The macro's name starts with (3).

C.

The macro's argument count setting is 3 or more.

D.

Nothing, all macros can accept any number of arguments.

Full Access
Question # 74

Which of the following statements describes the command below (select all that apply)

Sourcetype=access_combined | transaction JSESSIONID

A.

An additional filed named maxspan is created.

B.

An additional field named duration is created.

C.

An additional field named eventcount is created.

D.

Events with the same JSESSIONID will be grouped together into a single event.

Full Access
Question # 75

A user wants to convert numeric field values to strings and also to sort on those values.

Which command should be used first, the eval or the sort?

A.

It doesn't matter whether eval or sort is used first.

B.

Convert the numeric to a string with eval first, then sort.

C.

Use sort first, then convert the numeric to a string with eval.

D.

You cannot use the sort command and the eval command on the same field.

Full Access
Question # 76

Which of the following statements describe the Common Information Model (CIM)? (select all that apply)

A.

CIM is a methodology for normalizing data.

B.

CIM can correlate data from different sources.

C.

The Knowledge Manager uses the CIM to create knowledge objects.

D.

CIM is an app that can coexist with other apps on a single Splunk deployment.

Full Access
Question # 77

What is the correct syntax to search for a tag associated with a value on a specific fields?

A.

Tag-

B.

Tag

C.

Tag=::

D.

Tag::=

Full Access
Question # 78

When performing a regular expression (regex) field extraction using the Field Extractor (FX), what happens when the require option is used?

A.

The regex can no longer be edited.

B.

The field being extracted will be required for all future events.

C.

The events without the required field will not display in searches.

D.

Only events with the required string will be included in the extraction.

Full Access
Question # 79

Which of the following searches can be used to define an event type?

A.

index=games sourcetype=score [search index=players | fields player_id]

B.

index=games sourcetype=score I where score>9999

C.

index=games sourcetype=score player=* score>9999

D.

index=games sourcetype=score I stats count by player

Full Access
Question # 80

What will you learn from the results of the following search?

sourcetype=cisco_esa | transaction mid, dcid, icid | timechart avg(duration)

A.

The average time elapsed during each transaction for all transactions

B.

The average time for each event within each transaction

C.

The average time between each transaction

Full Access
Question # 81

Which of the following commands support the same set of functions?

A.

stats, eval, table

B.

search, where, eval

C.

stats, chart, timechart

D.

transaction, chart, timechart

Full Access
Question # 82

What approach is recommended when using the Splunk Common Information Model (CIM) add-on to normalize data?

A.

Consult the CIM data model reference tables.

B.

Run a search using the authentication command.

C.

Consult the CIM event type reference tables.

D.

Run a search using the correlation command.

Full Access
Question # 83

How is an event type created from the search window? (select all that apply)

A.

In the top right corner, click Save As > Event Type.

B.

In an event's detail dropdown, click Event Actions > Build Event Type.

C.

Edit eventtypes.conf and add a new stanza.

D.

Add | eventtype to the SPL and execute the search.

Full Access
Question # 84

Consider the following search:

index=web sourcetype=access_combined

The log shows several events that share the same JSESSIONID value (SD470K92802F117). View the events as a group.

From the following list, which search groups events by JSESSIONID?

A.

index=web sourcetype=access_combined | highlight JSESSIONID | search SD470K92802F117

B.

index=web sourcetype=access_combined | transaction JSESSIONID | search SD470K92802F117

C.

index=web sourcetype=access_combined SD470K92802F117 | table JSESSIONID

D.

index=web sourcetype=access_combined JSESSIONID

Full Access
Question # 85

In the following eval statement, what is the value of description if the status is 503? index=main | eval description=case(status==200, "OK", status==404, "Not found", status==500, "Internal Server Error")

A.

The description field would contain no value.

B.

The description field would contain the value 0.

C.

The description field would contain the value "Internal Server Error".

D.

This statement would produce an error in Splunk because it is incomplete.

Full Access
Question # 86

Which of the following expressions could be used to create a calculated field called gigabytes?

A.

eval sc_bytes(1024/1024)

B.

| eval negabytes=sc_bytes(1024/1024)

C.

megabytes=sc_bytes(1024/1024)

D.

sc_bytas(1024/1024)

Full Access