1001

A digital illustration of a dashboard interface with charts, graphs, and filter options, representing data analysis and visualization in a modern cloud-based software environment.

Splunk Search Mastery Quiz

Test your Splunk knowledge with our interactive quiz! Designed for beginners and seasoned users alike, this quiz covers essential concepts, commands, and best practices related to Splunk search functionality.

Participate in this quiz to:

  • Enhance your understanding of Splunk.
  • Identify gaps in your knowledge.
  • Prepare for certifications and real-world applications.
195 Questions49 MinutesCreated by QueryMaster42
Which search string only returns events from hostWWW3?
Host=*
Host=WWW3
Host=WWW*
Host=WWW3
By default, how long does Splunk retain a search job?
10 Minutes
15 Minutes
1 Day
7 Days
What must be done before an automatic lookup can be created? (Choose all that apply.)
The lookup command must be used.
The lookup definition must be created.
The lookup file must be uploaded to Splunk.
The lookup file must be verified using the inputlookup command.
Which of the following Splunk components typically resides on the machines where data originates?
Indexer
Forwarder
Search head
Deployment server
What determines the scope of data that appears in a scheduled report?
All data accessible to the User role will appear in the report.
All data accessible to the owner of the report will appear in the report.
All data accessible to all users will appear in the report until the next time the report is run.
The owner of the report can configure permissions so that the report uses either the User role or the owner's profile at run time.
When writing searches in Splunk, which of the following is true about Booleans?
They must be lowercase.
They must be uppercase.
They must be in quotations.
They must be in parentheses.
Which of the following searches would return events with failure in index netfw or warn or critical in index netops?
(index=netfw failure) AND index=netops warn OR critical
(index=netfw failure) OR (index=netops (warn OR critical))
(index=netfw failure) AND (index=netops (warn OR critical))
(index=netfw failure) OR index=netops OR (warn OR critical)
Select the answer that displays the accurate placing of the pipe in the following search string: index=security sourcetype=access_* status=200 stats count by price
Index=security sourcetype=access_* status=200 stats | count by price
Index=security sourcetype=access_* status=200 | stats count by price
Index=security sourcetype=access_* status=200 | stats count | by price
Index=security sourcetype=access_* | status=200 | stats count by price
Which of the following constraints can be used with the top command?
Limit
Useperc
Addtotals
Fieldcount
When editing a dashboard, which of the following are possible options? (Choose all that apply.)
Add an output.
Export a dashboard panel.
Modify the chart type displayed in a dashboard panel.
Drag a dashboard panel to a different location on the dashboard.
When running searches, command modifiers in the search string are displayed in what color?
Red
Blue
Orange
Highlighted
Which of the following represents the Splunk recommended naming convention for dashboards?
Description_Group_Object
Group_Description_Object
Group_Object_Description
Object_Group_Description
How can search results be kept longer than 7 days?
By scheduling a report.
By creating a link to the job.
By changing the job settings.
By changing the time range picker to more than 7 days.
Which of the following is a Splunk search best practice?
Filter as early as possible.
Never specify more than one index.
Include as few search terms as possible.
Use wildcards to return more search results.
When looking at a dashboard panel that is based on a report, which of the following is true?
You can modify the search string in the panel, and you can change and configure the visualization.
You can modify the search string in the panel, but you cannot change and configure the visualization.
You cannot modify the search string in the panel, but you can change and configure the visualization.
You cannot modify the search string in the panel, and you cannot change and configure the visualization.
Which of the following are common constraints of the top command?
Limit, count
Limit, showpercent
Limits, countfield
Showperc, countfield
When displaying results of a search, which of the following is true about line charts?
Line charts are optimal for single and multiple series.
Line charts are optimal for single series when using Fast mode.
Line charts are optimal for multiple series with 3 or more columns.
Line charts are optimal for multiseries searches with at least 2 or more columns.
How are events displayed after a search is executed?
In chronological order.
Randomly by default.
In reverse chronological order.
Alphabetically according to field name.
Which of the following is true about user account settings and preferences?
Search & Reporting is the only app that can be set as the default application.
Full names can only be changed by accounts with a Power User or Admin role.
Time zones are automatically updated based on the setting of the computer accessing Splunk.
Full name, time zone, and default app can be defined by clicking the login name in the Splunk bar.
What is a primary function of a scheduled report?
Auto-detect changes in performance.
Auto-generated PDF reports of overall data trends.
Regularly scheduled archiving to keep disk space use low.
Triggering an alert in your Splunk instance when certain conditions are met.
After running a search, what effect does clicking and dragging across the timeline have?
Executes a new search.
Filters current search results.
Moves to past or future events.
Expands the time range of the search.
Which command is used to review the contents of a specified static lookup file?
Lookup
Csvlookup
Inputlookup
Outputlookup
What must be done in order to use a lookup table in Splunk?
The lookup must be configured to run automatically.
The contents of the lookup file must be copied and pasted into the search bar.
The lookup file must be uploaded to Splunk and a lookup definition must be created.
The lookup file must be uploaded to the etc/apps/lookups folder for automatic ingestion.
When sorting on multiple fields with the sort command, what delimiter can be used between the field names in the search?
|
$
!
,
Which time range picker configuration would return real-time events for the past 30 seconds?
Preset - Relative: 30-seconds ago
Relative - Earliest: 30-seconds ago, Latest: Now
Real-time - Earliest: 30-seconds ago, Latest: Now
Advanced - Earliest: 30-seconds ago, Latest: Now
What is the correct syntax to count the number of events containing a vendor_action field?
Count stats vendor_action
Count stats (vendor_action)
Stats count (vendor_action)
Stats vendor_action (count)
What is one benefit of creating dashboard panels from reports?
Any newly created dashboard will include that report.
There are no benefits to creating dashboard panels from reports.
It makes the dashboard more efficient because it only has to run one search string.
Any change to the underlying report will affect every dashboard that utilizes that report.
By default, which of the following fields would be listed in the fields sidebar under interesting Fields?
Host
Index
Source
Sourcetype
Which of the following statements about case sensitivity is true?
Both field names and field values ARE case sensitive.
Field names ARE case sensitive; field values are NOT.
Field values ARE case sensitive; field names ARE NOT.
Both field names and field values ARE NOT case sensitive.
What does the rare command do?
Returns the least common field values of a given field in the results.
Returns the most common field values of a given field in the results.
Returns the top 10 field values of a given field in the results.
Returns the lowest 10 field values of a given field in the results.
When an alert action is configured to run a script, Splunk must be able to locate the script. Which is one of the directories Splunk will look in to find the script?
$SPLUNK_HOME/bin/scripts
$SPLUNK_HOME/etc/scripts
$SPLUNK_HOME/bin/etc/scripts
$SPLUNK_HOME/etc/scripts/bin
Which Boolean operator is always implied between two search terms, unless otherwise specified?
OR
NOT
AND
XOR
What does the values function of the stats command do?
Lists all values of a given field.
Lists unique values of a given field.
Returns a count of unique values for a given field.
Returns the number of events that match the search.
Which stats command function provides a count of how many unique values exist for a given field in the result set?
Dc(field)
Count(field)
Count-by(field)
Distinct-count(field)
A collection of items containing things such as data inputs, UI elements, and knowledge objects is known as what?
An app
JSON
A role
An enhanced solution
Which statement is true about Splunk alerts?
Alerts are based on searches that are either run on a scheduled interval or in real-time.
Alerts are based on searches and when triggered will only send an email notification.
Alerts are based on searches and require cron to run on scheduled interval.
Alerts are based on searches that are run exclusively as real-time.
What is the purpose of using a by clause with the stats command?
To group the results by one or more fields.
To compute numerical statistics on each field.
To specify how the values in a list are delimited.
To partition the input data based on the split-by fields.
How do you add or remove fields from search results?
Use field +to add and field -to remove.
Use table +to add and table -to remove.
Use fields +to add and fields -to remove.
Use fields Plus to add and fields Minus to remove.
A field exists in search results, but isn't being displayed in the fields sidebar. How can it be added to the fields sidebar?
Click All Fields and select the field to add it to Selected Fields.
Click Interesting Fields and select the field to add it to Selected Fields.
Click Selected Fields and select the field to add it to Interesting Fields.
This scenario isn't possible because all fields returned from a search always appear in the fields sidebar.
In the fields sidebar, which character denotes alphanumeric field values?
#
%
A
A#
What is the main requirement for creating visualizations using the Splunk UI?
Your search must transform event data into Excel file format first.
Your search must transform event data into XML formatted data first.
Your search must transform event data into statistical data tables first.
Your search must transform event data into JSON formatted data first.
What syntax is used to link key/value pairs in search strings?
Action+purchase
Action=purchase
Action | purchase
Action equal purchase
What user interface component allows for time selection?
Time summary
Time range picker
Search time picker
Data source time statistics
Which of the following searches will return results where fail, 400, and error exist in every event?
Error AND (fail AND 400)
Error OR (fail and 400)
Error AND (fail OR 400)
Error OR fail OR 400
When placed early in a search, which command is most effective at reducing search execution time?
Dedup
Rename
Sort -
Fields +
Which of the following is the most efficient filter for running searches in Splunk?
Time
Fast mode
Sourcetype
Selected Fields
How does Splunk determine which fields to extract from data?
Splunk only extracts the most interesting data from the last 24 hours.
Splunk only extracts fields users have manually specified in their data.
Splunk automatically extracts any fields that generate interesting visualizations.
Splunk automatically discovers many fields based on sourcetype and key/value pairs found in the data.
Which of the following file types is an option for exporting Splunk search results?
PDF
JSON
XLS
RTF
What syntax is used to link key/value pairs in search strings?
Parentheses
@ or # symbols
Quotation marks
Relational operators such as =, <, or >
Which search string returns a filed containing the number of matching events and names that field Event Count?
Index=security failure | stats sum as "Event Count"
Index=security failure | stats count as "Event Count"
Index=security failure | stats count by "Event Count"
Index=security failure | stats dc(count) as "Event Count"
Which search would return events from the access_combined sourcetype?
Sourcetype=access_combined
Sourcetype=Access_Combined
Sourcetype=Access_Combined
SOURCETYPE=access_combined
Which of the following index searches would provide the most efficient search performance?
Index=*
Index=web OR index=s*
(index=web OR index=sales)
*index=sales AND index=web*
What is a suggested Splunk best practice for naming reports?
Reports are best named using many numbers so they can be more easily sorted.
Use a consistent naming convention so they are easily separated by characteristics such as group and object.
Name reports as uniquely as possible with no overlap to differentiate them from one another.
Any naming convention is fine as long as you keep an external spreadsheet to keep track.
In a deployment with multiple indexes, what will happen when a search is run and an index is not specified in the search string?
No events will be returned.
Splunk will prompt you to specify an index.
All non-indexed events to which the user has access will be returned.
Events from every index searched by default to which the user has access will be returned.
When looking at a statistics table, what is one way to drill down to see the underlying events?
Creating a pivot table.
Clicking on the visualizations tab.
Viewing your report in a dashboard.
Clicking on any field value in the table.
In the Splunk interface, the list of alerts can be filtered based on which characteristics?
App, Owner, Severity, and Type
App, Owner, Priority, and Status
App, Dashboard, Severity, and Type
App, Time Window, Type, and Severity
What are the steps to schedule a report?
After saving the report, click Schedule.
After saving the report, click Event Type.
After saving the report, click Scheduling.
After saving the report, click Dashboard Panel.
In the fields sidebar, what indicates that a field is numeric?
A number to the right of the field name.
A # symbol to the left of the field name.
A lowercase n to the left of the field name.
A lowercase n to the right of the field name.
Which of the following are functions of the stats command?
Count, sum, add
Count, sum, less
Sum, avg, values
Sum, values, table
At index time, in which field does Splunk store the timestamp value?
Time
_time
EventTime
Timestamp
Which of the following is a best practice when writing a search string?
Include all formatting commands before any search terms.
Include at least one function as this is a search requirement.
Include the search terms at the beginning of the search string.
Avoid using formatting clauses, as they add too much overhead.
What type of search can be saved as a report?
Any search can be saved as a report.
Only searches that generate visualizations.
Only searches containing a transforming command.
Only searches that generate statistics or visualizations.
What can be included in the All Fields option in the sidebar?
Dashboards
Metadata only
Non-interesting fields
Field descriptions
When viewing the results of a search, what is an Interesting Field?
A field that appears in any event.
A field that appears in every event.
A field that appears in the top 10 events.
A field that appears in at least 20% of the events.
When a Splunk search generates calculated data that appears in the Statistics tab, in what formats can the results be exported?
CSV, JSON, PDF
CSV, XML, JSON
Raw Events, XML, JSON
Raw Events, CSV, XML, JSON
Which search matches the events containing the terms "error" and "fail"?
Index=security Error Fail
Index=security error OR fail
Index=security "error failure"
Index=security NOT error NOT fail
Which of the following is an option after clicking an item in search results?
Saving the item to a report.
Adding the item to the search.
Adding the item to a dashboard.
Saving the Search to a JSON file.
Which of the following fields is stored with the events in the index?
User
Source
Location
SourceIp
Which of the following is the recommended way to create multiple dashboards displaying data from the same search?
Save the search as a report and use it in multiple dashboards as needed.
Save the search as a dashboard panel for each dashboard that needs the data.
Save the search as a scheduled alert and use it in multiple dashboards as needed.
Export the results of the search to an XML file and use the file as the basis of the dashboards.
What does the following specified time range do?
earliest=-72h@h latest=@d
Look back 3 days ago and prior.
Look back 72 hours, up to one day ago.
Look back 72 hours, up to the end of today.
Look back from 3 days ago, up to the beginning of today.
Which events will be returned by the following search string?
host=www3 status=503
All events that either have a host of www3 or a status of 503.
All events with a host of www3 that also have a status of 503.
We need more information; we cannot tell without knowing the time range.
We need more information; a search cannot be run without specifying an index.
What does the stats command do?
Automatically correlates related fields.
Converts field values into numerical values.
Calculates statistics on data that matches the search criteria.
Analyzes numerical fields for their ability to predict another discrete field.
Which is primary function of the timeline located under the search bar?
To differentiate between structured and unstructured events in the data.
To sort the events returned by the search command in chronological order.
To zoom in and zoom out, although this does not change the scale of the chart.
To show peaks and/or valleys in the timeline, which can indicate spikes in activity or downtime.
What can be configured using the Edit Job Settings menu?
Export the result to CSV format.
Add the Job results to a dashboard.
Schedule the Job to re-run in 10 minutes.
Change Job Lifetime from 10 minutes to 7 days.
Which command is used to validate a lookup file?
| lookup products.csv
Inputlookup products.csv
| inputlookup products.csv
| lookup_definition products.csv
Which statement is true about the top command?
It returns the top 10 results.
It displays the output in table format.
It returns the count and percent columns per row.
All of them.
How can another user gain access to a saved report?
The owner of the report can edit permissions from the Edit dropdown.
Only users with an Admin or Power User role can access other users' reports.
Anyone can access any reports marked as public within a shared Splunk deployment.
The owner of the report must clone the original report and save it to their user account.
What is the primary use for the rare command?
To sort field values in descending order.
To return only fields containing five of fewer values.
To find the least common values of a field in a dataset.
To find the fields with the fewest number of values across a dataset.
What happens when a field is added to the Selected Fields list in the fields sidebar?
Splunk will re-run the search job in Verbose Mode to prioritize the new Selected Field.
Splunk will highlight related fields as a suggestion to add them to the Selected Fields list.
Custom selections will replace the Interesting Fields that Splunk populated into the list at search time.
The selected field and its corresponding values will appear underneath the events in the search results.
By default, which of the following is a Selected Field?
Action
Clientip
CategoryId
Sourcetype
According to Splunk best practices, which placement of the wildcard results in the most efficient search?
F*il
*fail
Fail*
*fail*
Which command automatically returns percent and count columns when executing searches?
Top
Stats
Table
Percent
Which of the following describes lookup files?
Lookup fields cannot be used in searches.
Lookups contain static data available in the index.
Lookups add more fields to results returned by a search.
Lookups pull data at index time and add them to search results.
Which search string is the most efficient?
"failed password"
"failed password"*
Index=* "failed password"
Index=security "failed password"
Which search string matches only events with the status_code of 404?
Status_code!=404
Status_code>=400
Status_code<=404
Status_code>403 status_code<405
_______________ transforms raw data into events and distributes the results into an index.
Index
Search Head
Indexer
Forwarder
Documentations for Splunk can be found at docs.splunk.com
True
False
Which component of Splunk is primarily responsible for saving data?
Search Head
Heavy Forwarder
Indexer
Universal Forwarder
Universal forwarder is recommended for forwarding the logs to indexers.
False
True
Splunk apps are used for following (Choose three.):
Designed to cater numerous use cases and empower Splunk.
We can not install Splunk App.
Allows multiple workspaces for different use cases/user roles.
It is collection of different Splunk config files like data inputs, UI and Knowledge Object.
Three basic components of Splunk are (Choose three.):
Forwarders
Deployment Server
Indexer
Knowledge Objects
Index
Search Head
What is Splunk?
Splunk is a software platform to search, analyze and visualize the machine-generated data.
Database management tool.
Security Information and Event Management (SIEM).
Cloud based application that help in analyzing logs.
We should use heavy forwarder for sending event-based data to Indexers.
False
True
Splunk Enterprise is used as a Scalable service in Splunk Cloud.
True
False
Which component of Splunk let us write SPL query to find the required data?
Forwarders
Indexer
Heavy Forwarders
Search head
All components are installed and administered in Splunk Enterprise on-premise.
True
False
Log filtering/parsing can be done from _____________.
Index Forwarders (IF)
Universal Forwarders (UF)
Super Forwarder (SF)
Heavy Forwarders (HF)
Which is the default app for Splunk Enterprise?
Splunk Enterprise Security Suite
Searching and Reporting
Reporting and Searching
Splunk apps for Security
What kind of logs can Splunk Index?
Only Router and Switch Logs, Firewall and Web Server Logs
Router and Switch Logs
Firewall and Web Server Logs
Database logs
All firewall, web server, database, router and switch logs
Portal for Splunk apps can be accessed through www.splunkbase.com
False
True
Splunk shows data in __________________.
ASCII Character order.
Reverse chronological order.
Alphanumeric order.
Chronological order.
Which of the following can be used as wildcard search in Splunk?
=
>
!
*
What result will you get with following search index=test sourcetype="The_Questionnaire_P*" ?
The_questionnaire _pedia
The_questionnaire pedia
The_questionnaire_pedia
The_questionnaire Pedia
Prefix wildcards might cause performance issues.
False
True
Machine data can be in structured and unstructured format.
False
True
Field names are case sensitive.
True
False
Splunk internal fields contains general information about events and starts from underscore I.e. _ .
True
False
How many main user roles do you have in Splunk?
2
4
1
3
Which of the following are Splunk premium enhanced solutions? (Choose three.)
Splunk User Behavior Analytics (UBA)
Splunk IT Service Intelligence (ITSI)
Splunk Enterprise Security (ES)
Splunk Analytics Security (AS)
Fields are searchable name and value pairings that differentiates one event from another.
False
True
Splunk extracts fields from event data at index time and at search time.
True
False
Field values are case sensitive.
True
False
Splunk indexes the data on the basis of timestamps.
True
False
______________ is the default web port used by Splunk.
8089
8000
8080
443
Which of the following statements are correct about Search & Reporting App? (Choose three.)
Can be accessed by Apps > Search & Reporting.
Provides default interface for searching and analyzing logs.
Enables the user to create knowledge object, reports, alerts and dashboards.
It only gives us search functionality.
Parsing of data can happen both in HF and Indexer.
Only HF
No
Yes
Monitor option in Add Data provides _______________.
Only continuous monitoring.
Only One-time monitoring.
None of these.
Both One-time and continuous monitoring.
License Meter runs before data compression.
No
Yes
Forward Option gather and forward data to indexers over a receiving port from remote machines.
False
True
You can on-board data to Splunk using following means (Choose four.):
Props
CLI
Splunk Web
Savedsearches.conf
Splunk apps and add-ons
indexes.conf
Inputs.conf
metadata.conf
Data sources being opened and read applies to:
None of these
Indexing Phase
Parsing Phase
Input Phase
License Metering
Select the correct option that applies to Index time processing (Choose three.).
Indexing
Searching
Parsing
Settings
Input
Splunk automatically determines the source type for major data types.
False
True
Parsing of data can happen both in HF and UF.
Yes
No
Upload option creates inputs.conf
Yes
No
Splunk index time process can be broken down into __________ phases.
3
2
4
1
In monitor option you can select the following options in GUI.
Only HTTP Event Collector (HEC) and TCP/UDP
None of these
Only TCP/UDP
Only Scripts
Filed & Directories, HTTP Event Collector (HEC), TCP/UDP and Scripts
Uploading local files though Upload options index the file only once.
No
Yes
Which of the statements are correct about HF? (Choose three.)
Parsing
Masking
Searching
Forwarding
Where does Licensing meter happen?
Indexer
Parsing
Heavy Forwarder
Input
Matching search terms are highlighted.
Yes
No
Beginning parentheses is automatically highlighted to guide you on the presence of complimenting parentheses.
No
Yes
Zoom Out and Zoom to Selection re-executes the search.
No
Yes
Every Search in Splunk is also called _____________.
None of these
Job
Search Only
Matching of parentheses is a feature of Splunk Assistant.
No
Yes
Search Assistant is enabled by default in the SPL editor with compact settings.
No
Yes
What is Search Assistant in Splunk?
It is only available to Admins.
Such feature does not exist in Splunk.
Shows options to complete the search string.
@ Symbol can be used in advanced time unit option.
No
Yes
The new data uploaded in Splunk are shown in ________________.
Real-time
10 Minutes
Overnight Download
30 Minutes
You can use the following options to specify start and end time for the query range:
Earliest=
Latest=
Beginning=
Ending=
All these
You can change the App context in Input setting.
No
Yes
The default host name used in Inputs general settings can not be changed.
False
True
Events in Splunk are automatically segregated using data and time.
Yes
No
You are able to create new Index in Data Input settings.
No
Yes
There are three different search modes in Splunk (Choose three.):
Automatic
Smart
Fast
Verbose
Select the statements that are true for timeline in Splunk (Choose four.):
Timeline shows distribution of events specified in the time range in the form of bars.
Single click to see the result for particular time period.
You can click and drag across the bar for selecting the range.
This is default view and you can't make any changes to it.
You can hover your mouse for details like total events, time and date.
Keywords are highlighted when you mouse over search results and you can click this search result to (Choose three.):
Open new search.
Exclude the item from search.
None of these.
Add the item to search.
You can view the search result in following format (Choose three.):
Table
Raw
Pie Chart
List
Snapping rounds down to the nearest specified unit.
Yes
No
Data summary button just below the search bar gives you the following (Choose three.):
Hosts
Sourcetypes
Sources
Indexes
What options do you get after selecting timeline? (Choose four.)
Zoom to selection
Format Timeline
Deselect
Delete
Zoom Out
At the time of searching the start time is 03:35:08.
Will it look back to 03:00:00 if we use -30m@h in searching?
Yes
No
Can you stop or pause the searching?
No
Yes
You can also specify a time range in the search bar. You can use the following for beginning and ending for a time range (Choose two.):
Not possible to specify time manually in Search query
End=
Start=
Earliest=
Latest=
Which all time unit abbreviations can you include in Advanced time range picker? (Choose seven.)
h
day
mon
yr
y
w
week
d
s
m
Interesting fields are the fields that have at least 20% of resulting fields.
True
False
How to make Interesting field into a selected field?
Click field in field sidebar -> click YES on the pop-up dialog on upper right side -> check now field should be visible in the list of selected fields.
Not possible.
Only CLI changes will enable it.
Click Settings -> Find field option -> Drop down select field -> enable selected field -> check now field should be visible in the list of selected fields.
Field names are case sensitive and field value are not.
True
False
!= and NOT are same arguments.
True
False
Query - status != 100:
Will return event where status field exist but value of that field is not 100.
Will return event where status field exist but value of that field is not 100 and all events where status field doesn't exist.
Will get different results depending on data.
NOT status = 100:
Will display result depending on the data.
Will return event where status field exist but value of that field is not 100.
Will return event where status field exist but value of that field is not 100 and all events where status field doesn't exist.
Will the queries following below get the same result?
1. index=log sourcetype=error_log status !=100
2. index=log sourcetype=error_log NOT status =100
Yes
No
Select the best options for "search best practices" in Splunk: (Choose five.)
Select the time range always.
Try to specify index values.
Include as many search terms as possible.
Never select time range.
Try to use * with every search term.
Inclusion is generally better than exclusion.
Try to keep specific search terms.
The better way of writing search query for index is:
Index=a index=b
(index=a OR index=b)
Index=(a & b)
Index = a, b
Put query into separate lines where | (Pipes) are used by selecting following options.
CTRL + Enter
Shift + Enter
Space + Enter
ALT + Enter
Fields are searchable key value pairs in your event data.
True
False
Selected fields are a set of configurable fields displayed for each event.
True
False
Following are the time selection option while making search: (Choose all that apply.)
Date & Time Range
Advanced
Date Range
Presets
Relative
Search Language Syntax in Splunk can be broken down into the following components. (Choose all that apply.)
Search term
Command
Pipe
Functions
Arguments
Clause
When saving a search directly to a dashboard panel instead of saving as a report first, which of the following is created?
Cloned panel
Inline panel
Report panel
Prebuilt panel
Which of the following statements describes a search job?
Once a search job begins, it cannot be stopped
A search job can only be paused when less than 50% of events are returned
A search job can only be stopped when less than 50% of events are returned
Once a search job begins, it can be stopped or paused at any point in time
Which search will return only events containing the word "error" and display the results as a table that includes the fields named action, src, and dest?
error | table action, src, dest
Error | tabular action, src, dest
error | stats table action, src, dest
Error | table column=action column=src column=dest
Which of the following reports is available in the Fields window?
Top values by time
Rare values by time
Events with top value fields
Events with rare value fields
In the Search and Reporting app, which tab displays timecharts and bar charts?
Events
Patterns
Statistics
Visualization
What will always appear in the Selected Fields list?
index
action
clientip
sourcetype
What is the correct way to use a time range specifier in the search bar so that the search looks back 2 hours?
Latest=-2h
Earliest=-2h
Latest=-2hour@d
Earliest=-2hour@d
Which of the following is a Splunk internal field?
_raw
host
_host
index
Which command will rename action to Customer Action?
| rename action = CustomerAction
| rename Action as "Customer Action"
| rename Action to "Customer Action"
| rename action as "Customer Action"
Which of the following is the most efficient search?
index=* "failed password"
"failed password" index=*
(index=* OR index=security) "failed password"
Index=security "failed password"
Which of the following is a correct way to limit search results to display the 5 most common values of a field?
| rare top=5
| top rare=5
| top limit=5
| rare limit=5
When viewing results of a search job from the Activity menu, which of the following is displayed?
New events based on the current time range picker
The same events based on the current time range picker
The same events from when the original search was executed
New events in addition to the same events from the original search
What is a quick, comprehensive way to learn what data is present in a Splunk deployment?
Review Splunk reports
Run ./splunk show
Click Data Summary in Splunk Web
Search index=* sourcetype=* host=*
Assuming a user has the capability to edit reports, which of the following are editable?
Acceleration, schedule, permissions
The report's name, schedule, permissions
The report's name, acceleration, schedule
The report's name, acceleration, permissions
Which of the following is a metadata field assigned to every event in Splunk?
host
owner
bytes
action
What are the two most efficient search filters?
_time and host
_time and index
Host and sourcetype
Index and sourcetype
Which of the following is the best way to create a report that shows the last 24 hours of events?
Use earliest=-1d@d latest=@d
Set a real-time search over a 24-hour window
Use the time range picket to select "Yesterday"
Use the time range picker to select "Last 24 hours"
When is the pipe character, I, used in search strings?
Before clauses. For example: stats sum(bytes) | by host
Before commands. For example: | stats sum(bytes) by host
Before arguments. For example: stats sum| (bytes) by host
Before functions. For example: stats |sum(bytes) by host
How can results from a specified static lookup file be displayed?
lookup command
inputlookup command
Settings > Lookups > Input
Settings > Lookups > Upload
In the Fields sidebar, what does the number directly to the right of the field name indicate?
The value of the field
The number of values for the field
The number of unique values for the field
The numeric non-unique values of the field
What is the default lifetime of every Splunk search job?
All search jobs are saved for 10 days
All search jobs are saved for 10 hours
All search jobs are saved for 10 weeks
All search jobs are saved for 10 minutes
Which search will return the 15 least common field values for the dest_ip field?
Sourcetype=firewall | rare num=15 dest_ip
Sourcetype=firewall | rare last=15 dest_ip
Sourcetype=firewall | rare count=15 dest_ip
Sourcetype=firewall | rare limit=15 dest_ip
When is an alert triggered?
When Splunk encounters a syntax error in a search
When a trigger action meets the predefined conditions
When an event in a search matches up with a data model
When results of a search meet a specifically defined condition
What are the three main Splunk components?
Search head, GPU, streamer
Search head, indexer, forwarder
Search head, SQL database, forwarder
Search head, SSD, heavy weight agent
Which statement describes field discovery at search time?
Splunk automatically discovers only numeric fields
Splunk automatically discovers only alphanumeric fields
Splunk automatically discovers only manually configured fields
Splunk automatically discovers only fields directly related to the search results
Which Field/Value pair will return only events found in the index named security?
Index=Security
index=Security
Index=security
index!=Security
{"name":"1001", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Test your Splunk knowledge with our interactive quiz! Designed for beginners and seasoned users alike, this quiz covers essential concepts, commands, and best practices related to Splunk search functionality.Participate in this quiz to:Enhance your understanding of Splunk.Identify gaps in your knowledge.Prepare for certifications and real-world applications.","img":"https:/images/course8.png"}
Powered by: Quiz Maker