Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

SPLK-1002 Exam Dumps - Splunk Core Certified Power User Exam

Question # 4

Which of the following data model are included In the Splunk Common Information Model (CIM) add-on? (select all that apply)

A.

Alerts

B.

Email

C.

Database

D.

User permissions

Full Access
Question # 5

Which of the following is the correct way to use the data model command to search field in the data model within the web dataset?

A.

| datamodel web search | filed web *

B.

| Search datamodel web web | filed web*

C.

| datamodel web web field | search web*

D.

Datamodel=web | search web | filed web*

Full Access
Question # 6

What functionality does the Splunk Common Information Model (CIM) rely on to normalize fields with different names?

A.

Macros.

B.

Field aliases.

C.

The rename command.

D.

CIM does not work with different names for the same field.

Full Access
Question # 7

Data model fields can be added using the Auto-Extracted method. Which of the following statements describe Auto-Extracted fields? (select all that apply)

A.

Auto-Extracted fields can be hidden in Pivot.

B.

Auto-Extracted fields can have their data type changed.

C.

Auto-Extracted fields can be given a friendly name for use in Pivot.

D.

Auto-Extracted fields can be added if they already exist in the dataset with constraints.

Full Access
Question # 8

When using timechart, how many fields can be listed after a by clause?

A.

because timechart doesn't support using a by clause.

B.

because _time is already implied as the x-axis.

C.

because one field would represent the x-axis and the other would represent the y-axis.

D.

There is no limit specific to timechart.

Full Access
Question # 9

How does a user display a chart in stack mode?

A.

By using the stack command.

B.

By turning on the Use Trellis Layout option.

C.

By changing Stack Mode in the Format menu.

D.

You cannot display a chart in stack mode, only a timechart.

Full Access
Question # 10

After manually editing; a regular expression (regex), which of the following statements is true?

A.

Changes made manually can be reverted in the Field Extractor (FX) UI.

B.

It is no longer possible to edit the field extraction in the Field Extractor (FX) UI.

C.

It is not possible to manually edit a regular expression (regex) that was created using the Field Extractor (FX) UI.

D.

The Field Extractor (FX) UI keeps its own version of the field extraction in addition to the one that was manually edited.

Full Access
Question # 11

A space is an implied _____ in a search string.

A.

OR

B.

AND

C.

()

D.

NOT

Full Access
Question # 12

When creating a Search workflow action, which field is required?

A.

Search string

B.

Data model name

C.

Permission setting

D.

An eval statement

Full Access
Question # 13

Which one of the following statements about the search command is true?

A.

It does not allow the use of wildcards.

B.

It treats field values in a case-sensitive manner.

C.

It can only be used at the beginning of the search pipeline.

D.

It behaves exactly like search strings before the first pipe.

Full Access
Question # 14

Which are valid ways to create an event type? (select all that apply)

A.

By using the searchtypes command in the search bar.

B.

By editing the event_type stanza in the props.conf file.

C.

By going to the Settings menu and clicking Event Types > New.

D.

By selecting an event in search results and clicking Event Actions > Build Event Type.

Full Access
Question # 15

Selected fields are displayed ______each event in the search results.

A.

below

B.

interesting fields

C.

other fields

D.

above

Full Access
Question # 16

The Field Extractor (FX) is used to extract a custom field. A report can be created using this custom field. The created report can then be shared with other people in the organization. If another person in the organization runs the shared report and no results are returned, why might this be? (select all that apply)

A.

Fast mode is enabled.

B.

The dashboard is private.

C.

The extraction is private-

D.

The person in the organization running the report does not have access to the index.

Full Access
Question # 17

Which of the following statements describes this search?

sourcetype=access_combined I transaction JSESSIONID | timechart avg (duration)

A.

This is a valid search and will display a timechart of the average duration, of each transaction event.

B.

This is a valid search and will display a stats table showing the maximum pause among transactions.

C.

No results will be returned because the transaction command must include the startswith and endswith options.

D.

No results will be returned because the transaction command must be the last command used in the search pipeline.

Full Access
Question # 18

Which of the following searches show a valid use of macro? (Select all that apply)

A.

index=main source=mySource oldField=* |'makeMyField(oldField)'| table _time newField

B.

index=main source=mySource oldField=* | stats if('makeMyField(oldField)') | table _time newField

C.

index=main source=mySource oldField=* | eval newField='makeMyField(oldField)'| table _time newField

D.

index=main source=mySource oldField=* | "'newField('makeMyField(oldField)')'" | table _time newField

Full Access
Question # 19

Which of the following knowledge objects represents the output of an eval expression?

A.

Eval fields

B.

Calculated fields

C.

Field extractions

D.

Calculated lookups

Full Access
Question # 20

Which of the following statements describes macros?

A.

A macro is a reusable search string that must contain the full search.

B.

A macro is a reusable search string that must have a fixed time range.

C.

A macro Is a reusable search string that may have a flexible time range.

D.

A macro Is a reusable search string that must contain only a portion of the search.

Full Access
Question # 21

Based on the macro definition shown below, what is the correct way to execute the macro in a search string?

A.

Convert_sales (euro, €, 79)”

B.

Convert_sales (euro, €, .79)

C.

Convert_sales ($euro,$€$,s79$

D.

Convert_sales ($euro, $€$,S,79$)

Full Access
Question # 22

Which of the following workflow actions can be executed from search results? (select all that apply)

A.

GET

B.

POST

C.

LOOKUP

D.

Search

Full Access
Question # 23

Which of the following searches will return events contains a tag name Privileged?

A.

Tag= Priv

B.

Tag= Pri*

C.

Tag= Priv*

D.

Tag= Privileged

Full Access
Question # 24

Which of the following statements about data models and pivot are true? (select all that apply)

A.

They are both knowledge objects.

B.

Data models are created out of datasets called pivots.

C.

Pivot requires users to input SPL searches on data models.

D.

Pivot allows the creation of data visualizations that present different aspects of a data model.

Full Access
Question # 25

A user wants to convert numeric field values to strings and also to sort on those values.

Which command should be used first, the eval or the sort?

A.

It doesn't matter whether eval or sort is used first.

B.

Convert the numeric to a string with eval first, then sort.

C.

Use sort first, then convert the numeric to a string with eval.

D.

You cannot use the sort command and the eval command on the same field.

Full Access
Question # 26

Which of the following statements describes the command below (select all that apply)

Sourcetype=access_combined | transaction JSESSIONID

A.

An additional filed named maxspan is created.

B.

An additional field named duration is created.

C.

An additional field named eventcount is created.

D.

Events with the same JSESSIONID will be grouped together into a single event.

Full Access
Question # 27

Which of the following statements describe the search string below?

| datamodel Application_State All_Application_State search

A.

Evenrches would return a report of sales by state.

B.

Events will be returned from the data model named Application_State.

C.

Events will be returned from the data model named All_Application_state.

D.

No events will be returned because the pipe should occur after the datamodel command

Full Access
Question # 28

Which of the following statements describes POST workflow actions?

A.

POST workflow actions are always encrypted.

B.

POST workflow actions cannot use field values in their URI.

C.

POST workflow actions cannot be created on custom sourcetypes.

D.

POST workflow actions can open a web page in either the same window or a new .

Full Access
Question # 29

Which of the following are required to create a POST workflow action?

A.

Label, URI, search string.

B.

XMI attributes, URI, name.

C.

Label, URI, post arguments.

D.

URI, search string, time range picker.

Full Access
Question # 30

Which delimiters can the Field Extractor (FX) detect? (select all that apply)

A.

Tabs

B.

Pipes

C.

Spaces

D.

Commas

Full Access
Question # 31

Which of the following statements describe GET workflow actions?

A.

GET workflow actions must be configured with POST arguments.

B.

Configuration of GET workflow actions includes choosing a sourcetype.

C.

Label names for GET workflow actions must include a field name surrounded by dollar signs.

D.

GET workflow actions can be configured to open the URT link in the current window or in a new window

Full Access
Question # 32

When should you use the transaction command instead of the scats command?

A.

When you need to group on multiple values.

B.

When duration is irrelevant in search results. .

C.

When you have over 1000 events in a transaction.

D.

When you need to group based on start and end constraints.

Full Access
Question # 33

Which of the following describes the Splunk Common Information Model (CIM) add-on?

A.

The CIM add-on uses machine learning to normalize data.

B.

The CIM add-on contains dashboards that show how to map data.

C.

The CIM add-on contains data models to help you normalize data.

D.

The CIM add-on is automatically installed in a Splunk environment.

Full Access
Question # 34

What does the following search do?

A.

Creates a table of the total count of users and split by corndogs.

B.

Creates a table of the total count of mysterymeat corndogs split by user.

C.

Creates a table with the count of all types of corndogs eaten split by user.

D.

Creates a table that groups the total number of users by vegetarian corndogs.

Full Access
Question # 35

Which of the following statements describe the search below? (select all that apply)

Index=main I transaction clientip host maxspan=30s maxpause=5s

A.

Events in the transaction occurred within 5 seconds.

B.

It groups events that share the same clientip and host.

C.

The first and last events are no more than 5 seconds apart.

D.

The first and last events are no more than 30 seconds apart.

Full Access
Question # 36

What are the two parts of a root event dataset?

A.

Fields and variables.

B.

Fields and attributes.

C.

Constraints and fields.

D.

Constraints and lookups.

Full Access
Question # 37

Which of the following eval command function is valid?

A.

Int ()

B.

Count ( )

C.

Print ()

D.

Tostring ()

Full Access
Question # 38

Which of the following can be used with the eval command tostring function (select all that apply)

A.

‘’hex’’

B.

‘’commas’’

C.

‘’Decimal’’

D.

‘’duration’’

Full Access
Question # 39

Data model are composed of one or more of which of the following datasets? (select all that apply.)

A.

Events datasets

B.

Search datasets

C.

Transaction datasets

D.

Any child of event, transaction, and search datasets

Full Access
Question # 40

Which of the following expressions could be used to create a calculated field called gigabytes?

A.

eval sc_bytes(1024/1024)

B.

| eval negabytes=sc_bytes(1024/1024)

C.

megabytes=sc_bytes(1024/1024)

D.

sc_bytas(1024/1024)

Full Access
Question # 41

Which workflow uses field values to perform a secondary search?

A.

POST

B.

Action

C.

Search

D.

Sub-Search

Full Access
Question # 42

Which of the following describes the I transaction command?

A.

It is an SPL command that groups at least two events together based on shared values in selected fields.

B.

It allows an exchange of data from one Splunk index to another Splunk index.

C.

It is an SPL command that groups events together with shared values in selected fields.

D.

It allows an exchange of data from one Splunk system to another Splunk system.

Full Access
Question # 43

The gauge command:

A.

creates a single-value visualization

B.

allows you to set colored ranges for a single-value visualization

C.

creates a radial gauge visualization

Full Access
Question # 44

Which is not a comparison operator in Splunk

A.

<=

B.

=

C.

!=

D.

>

E.

?=

Full Access
Question # 45

Which statement is true?

A.

Pivot is used for creating datasets.

B.

Data models are randomly structured datasets.

C.

Pivot is used for creating reports and dashboards.

D.

In most cases, each Splunk user will create their own data model.

Full Access
Question # 46

How is a macro referenced in a search?

A.

By using the macroname command.

B.

By using the macro command.

C.

By enclosing the macro name in backtick characters (‘).

D.

By enclosing the macro name in single-quote characters (‘).

Full Access
Question # 47

This function of the stats command allows you to identify the number of values a field has.

A.

max

B.

distinct_count

C.

fields

D.

count

Full Access
Question # 48

There are several ways to access the field extractor. Which option automatically identifies data type, source type, and sample event?

A.

Event Actions > Extract Fields

B.

Fields sidebar > Extract New Field

C.

Settings > Field Extractions > New Field Extraction

D.

Settings > Field Extractions > Open Field Extraction

Full Access
Question # 49

Using the Field Extractor (FX) tool, a value is highlighted to extract and give a name to a new field. Splunk has not successfully extracted that value from all appropriate events. What steps can be taken so Splunk successfully extracts the value from all appropriate events? (select all that apply)

A.

Select an additional sample event with the Field Extractor (FX) and highlight the missing value in the event.

B.

Re-ingest the data and attempt to extract from a new dataset.

C.

Click on the event where the field was not extracted and choose “Change to Delimited".

D.

Edit the regular expression manually.

Full Access
Question # 50

When using | timchart by host, which filed is representted in the x-axis?

A.

date

B.

host

C.

time

D.

-time

Full Access
Question # 51

Which of the following searches will show the number of categoryld used by each host?

A.

Sourcetype=access_* |sum bytes by host

B.

Sourcetype=access_* |stats sum(categorylD. by host

C.

Sourcetype=access_* |sum(bytes) by host

D.

Sourcetype=access_* |stats sum by host

Full Access
Question # 52

What approach is recommended when using the Splunk Common Information Model (CIM) add-on to normalize data?

A.

Consult the CIM data model reference tables.

B.

Run a search using the authentication command.

C.

Consult the CIM event type reference tables.

D.

Run a search using the correlation command.

Full Access
Question # 53

What commands can be used to group events from one or more data sources?

A.

eval, coalesce

B.

transaction, stats

C.

stats, format

D.

top, rare

Full Access
Question # 54

What is the correct format for naming a macro with multiple arguments?

A.

monthly_sales(argument 1, argument 2, argument 3)

B.

monthly_sales(3)

C.

monthly_sales[3]

D.

monthly_sales[argument 1, argument 2, argument 3)

Full Access
Question # 55

Which syntax will find events where the values for the 1 field match the values for the Renewal-MonthYear field?

A.

| where 10yearAnnerversary=Renewal-MonthYear

B.

| where ‘10yearAnnerversary=Renewal-MonthYear

C.

| where 10yearAnnerversary=’Renewal-MonthYear’

D.

| where ‘10yearAnnerversary’=’Renewal-MonthYear’

Full Access
Question # 56

We can use the rename command to _____ (Select all that apply.)

A.

Change indexed fields

B.

Exclude fields from our search results

C.

Extract new fields from our data using regular expressions

D.

Give a field a new name at search time

Full Access
Question # 57

When is a GET workflow action needed?

A.

To send field values to an external resource.

B.

To retrieve information from an external resource.

C.

To use field values to perform a secondary search.

D.

To define how events flow from forwarders to indexes.

Full Access
Question # 58

Use the dedup command to _____.

A.

Rename a field in the index

B.

remove duplicate values

C.

provide an additional alias for the field that can D.be used in the search criteria

Full Access
Question # 59

Field aliases are used to __________ data

A.

clean

B.

transform

C.

calculate

D.

normalize

Full Access
Question # 60

Why are tags useful in Splunk?

A.

Tags look for less specific data.

B.

Tags visualize data with graphs and charts.

C.

Tags group related data together.

D.

Tags add fields to the raw event data.

Full Access
Question # 61

Which of these search strings is NOT valid:

A.

index=web status=50* | chart count over host, status

B.

index=web status=50* | chart count over host by status

C.

index=web status=50* | chart count by host, status

Full Access
Question # 62

How are arguments defined within the macro search string?

A.

Åžarg$

B.

'arg'

C.

%arg%

D.

"arg"

Full Access
Question # 63

What other syntax will produce exactly the same results as | chart count over vendor_action by user?

A.

| chart count by vendor_action, user

B.

| chart count over vendor_action, user

C.

| chart count by vendor_action over user

D.

| chart count over user by vendor_action

Full Access
Question # 64

Which of the following statements best describes a macro?

A.

A macro is a method of categorizing events based on a search.

B.

A macro is a way to associate an additional (new) name with an existing field name.

C.

A macro is a portion of a search that can be reused in multiple place

D.

A macro is a knowledge object that enables you to schedule searches for specific events.

Full Access
Question # 65

Consider the following search:

index=web sourcetype=access_combined

The log shows several events that share the same JSESSIONID value (SD470K92802F117). View the events as a group.

From the following list, which search groups events by JSESSIONID?

A.

index=web sourcetype=access_combined | highlight JSESSIONID | search SD470K92802F117

B.

index=web sourcetype=access_combined | transaction JSESSIONID | search SD470K92802F117

C.

index=web sourcetype=access_combined SD470K92802F117 | table JSESSIONID

D.

index=web sourcetype=access_combined JSESSIONID

Full Access
Question # 66

Which field extraction method should be selected for comma-separated data?

A.

Regular expression

B.

Delimiters

C.

eval expression

D.

table extraction

Full Access
Question # 67

These users can create global knowledge objects. (Select all that apply.)

A.

users

B.

power users

C.

administrators

Full Access
Question # 68

Which of the following describes this search?

New Search

'third_party_outages(EMEA,-24h)'

A.

This search will find all events for the third_party_outages event type that have "EMEA" or "-24h" in the raw event data.

B.

This search will run the third_party_outages saved search and filter for events containing "EMEA" and "-24h" in the raw event data.

C.

This search will run the third_party_outages macro and pass the arguments EMEA and -24h to the macro definition.

D.

This search will find all events in the third_party_outages index with the tags EMEA and -24h.

Full Access
Question # 69

A data model can consist of what three types of datasets?

A.

Pivot, searches, and events.

B.

Pivot, events, and transactions.

C.

Searches, transactions, and pivot.

D.

Events, searches, and transactions.

Full Access
Question # 70

How is a Search Workflow Action configured to run at the same time range as the original search?

A.

Set the earliest time to match the original search.

B.

Select the same time range from the time-range picker.

C.

Select the "Use the same time range as the search that created the field listing" checkbox.

D.

Select the "Overwrite time range with the original search" checkbox.

Full Access
Question # 71

Which of the following commands will show the maximum bytes?

A.

sourcetype=access_* | maximum totals by bytes

B.

sourcetype=access_* | avg (bytes)

C.

sourcetype=access_* | stats max(bytes)

D.

sourcetype=access_* | max(bytes)

Full Access
Question # 72

Which of the following is included with the Common Information Model (CIM) add-on?

A.

Search macros

B.

Event category tags

C.

Workflow actions

D.

tsidx files

Full Access
Question # 73

Which of these stats commands will show the total bytes for each unique combination of page and server?

A.

index=web | stats sum (bytes) BY page BY server

B.

index=web | stats sum (bytes) BY page server

C.

index=web | stats sum(bytes) BY page AND server

D.

index=web | stats sum(bytes) BY values (page) values (server)

Full Access
Question # 74

The macro weekly_sales (2) contains the search string:

index=games | eval ProductSales = $Price$ * $AmountSold$

Which of the following will return results?

A.

‘weekly sales (3)’

B.

‘weekly_sales($3.995, $108)’

C.

'weekly_sales (3.99, 10)’

D.

‘weekly sales (3.99, 10)’

Full Access
Question # 75

Which of the following transforming commands can be used with transactions?

A.

chart, timechart, stats, eventstats

B.

chart, timechart, stats, diff

C.

chart, timeehart, datamodel, pivot

D.

chart, timecha:t, stats, pivot

Full Access
Question # 76

What are search macros?

A.

Lookup definitions in lookup tables.

B.

Reusable pieces of search processing language.

C.

A method to normalize fields.

D.

Categories of search results.

Full Access
Question # 77

__________ datasets can be added to root dataset to narrow down the search

A.

parent

B.

extracted

C.

event

D.

child

Full Access