Winter Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

When creating a Search workflow action, which field is required?

A.

Search string

B.

Data model name

C.

Permission setting

D.

An eval statement

Full Access
Question # 5

What does the transaction command do?

A.

Groups a set of transactions based on time.

B.

Creates a single event from a group of events.

C.

Separates two events based on one or more values.

D.

Returns the number of credit card transactions found in the event logs.

Full Access
Question # 6

In which of the following scenarios is an event type more effective than a saved search?

A.

When a search should always include the same time range.

B.

When a search needs to be added to other users' dashboards.

C.

When the search string needs to be used in future searches.

D.

When formatting needs to be included with the search string.

Full Access
Question # 7

Which of the following data model are included In the Splunk Common Information Model (CIM) add-on? (select all that apply)

A.

Alerts

B.

Email

C.

Database

D.

User permissions

Full Access
Question # 8

When using timechart, how many fields can be listed after a by clause?

A.

because timechart doesn't support using a by clause.

B.

because _time is already implied as the x-axis.

C.

because one field would represent the x-axis and the other would represent the y-axis.

D.

There is no limit specific to timechart.

Full Access
Question # 9

Calculated fields can be based on which of the following?

A.

Tags

B.

Extracted fields

C.

Output fields for a lookup

D.

Fields generated from a search string

Full Access
Question # 10

What is the correct syntax to search for a tag associated with a value on a specific fields?

A.

Tag-

B.

Tag

C.

Tag=::

D.

Tag::=

Full Access
Question # 11

A space is an implied _____ in a search string.

A.

OR

B.

AND

C.

()

D.

NOT

Full Access
Question # 12

A calculated field maybe based on which of the following?

A.

Lookup tables

B.

Extracted fields

C.

Regular expressions

D.

Fields generated within a search string

Full Access
Question # 13

Data model fields can be added using the Auto-Extracted method. Which of the following statements describe Auto-Extracted fields? (select all that apply)

A.

Auto-Extracted fields can be hidden in Pivot.

B.

Auto-Extracted fields can have their data type changed.

C.

Auto-Extracted fields can be given a friendly name for use in Pivot.

D.

Auto-Extracted fields can be added if they already exist in the dataset with constraints.

Full Access
Question # 14

Which of the following is the correct way to use the data model command to search field in the data model within the web dataset?

A.

| datamodel web search | filed web *

B.

| Search datamodel web web | filed web*

C.

| datamodel web web field | search web*

D.

Datamodel=web | search web | filed web*

Full Access
Question # 15

Which group of users would most likely use pivots?

A.

Users

B.

Architects

C.

Administrators

D.

Knowledge Managers

Full Access
Question # 16

Which one of the following statements about the search command is true?

A.

It does not allow the use of wildcards.

B.

It treats field values in a case-sensitive manner.

C.

It can only be used at the beginning of the search pipeline.

D.

It behaves exactly like search strings before the first pipe.

Full Access
Question # 17

Selected fields are displayed ______each event in the search results.

A.

below

B.

interesting fields

C.

other fields

D.

above

Full Access
Question # 18

Which of the following statements describes macros?

A.

A macro is a reusable search string that must contain the full search.

B.

A macro is a reusable search string that must have a fixed time range.

C.

A macro Is a reusable search string that may have a flexible time range.

D.

A macro Is a reusable search string that must contain only a portion of the search.

Full Access
Question # 19

Which of the following file formats can be extracted using a delimiter field extraction?

A.

CSV

B.

PDF

C.

XML

D.

JSON

Full Access
Question # 20

Which of the following statements is true, especially in large environments?

A.

Use the scats command when you next to group events by two or more fields.

B.

The stats command is faster and more efficient than the transaction command

C.

The transaction command is faster and more efficient than the stats command.

D.

Use the transaction command when you want to see the results of a calculation.

Full Access
Question # 21

Which of the following statements describes this search?

sourcetype=access_combined I transaction JSESSIONID | timechart avg (duration)

A.

This is a valid search and will display a timechart of the average duration, of each transaction event.

B.

This is a valid search and will display a stats table showing the maximum pause among transactions.

C.

No results will be returned because the transaction command must include the startswith and endswith options.

D.

No results will be returned because the transaction command must be the last command used in the search pipeline.

Full Access
Question # 22

Which delimiters can the Field Extractor (FX) detect? (select all that apply)

A.

Tabs

B.

Pipes

C.

Spaces

D.

Commas

Full Access
Question # 23

Which of the following eval command function is valid?

A.

Int ()

B.

Count ( )

C.

Print ()

D.

Tostring ()

Full Access
Question # 24

Which of the following Statements about macros is true? (select all that apply)

A.

Arguments are defined at execution time.

B.

Arguments are defined when the macro is created.

C.

Argument values are used to resolve the search string at execution time.

D.

Argument values are used to resolve the search string when the macro is created.

Full Access
Question # 25

Which of the following statements describes Search workflow actions?

A.

By default. Search workflow actions will run as a real-time search.

B.

Search workflow actions can be configured as scheduled searches,

C.

The user can define the time range of the search when created the workflow action.

D.

Search workflow actions cannot be configured with a search string that includes the transaction command

Full Access
Question # 26

When should you use the transaction command instead of the scats command?

A.

When you need to group on multiple values.

B.

When duration is irrelevant in search results. .

C.

When you have over 1000 events in a transaction.

D.

When you need to group based on start and end constraints.

Full Access
Question # 27

Which of the following statements describe GET workflow actions?

A.

GET workflow actions must be configured with POST arguments.

B.

Configuration of GET workflow actions includes choosing a sourcetype.

C.

Label names for GET workflow actions must include a field name surrounded by dollar signs.

D.

GET workflow actions can be configured to open the URT link in the current window or in a new window

Full Access
Question # 28

How does a user display a chart in stack mode?

A.

By using the stack command.

B.

By turning on the Use Trellis Layout option.

C.

By changing Stack Mode in the Format menu.

D.

You cannot display a chart in stack mode, only a timechart.

Full Access
Question # 29

Given the macro definition below, what should be entered into the Name and Arguments fileds to correctly configured the macro?

A.

The macro name is sessiontracker and the arguments are action, JESSIONID.

B.

The macro name is sessiontracker(2) and the arguments are action, JESSIONID.

C.

The macro name is sessiontracker and the arguments are $action$, $JESSIONID$.

D.

The macro name is sessiontracker(2) and the Arguments are $action$, $JESSIONID$.

Full Access
Question # 30

After manually editing; a regular expression (regex), which of the following statements is true?

A.

Changes made manually can be reverted in the Field Extractor (FX) UI.

B.

It is no longer possible to edit the field extraction in the Field Extractor (FX) UI.

C.

It is not possible to manually edit a regular expression (regex) that was created using the Field Extractor (FX) UI.

D.

The Field Extractor (FX) UI keeps its own version of the field extraction in addition to the one that was manually edited.

Full Access
Question # 31

Which of the following statements describes POST workflow actions?

A.

POST workflow actions are always encrypted.

B.

POST workflow actions cannot use field values in their URI.

C.

POST workflow actions cannot be created on custom sourcetypes.

D.

POST workflow actions can open a web page in either the same window or a new .

Full Access
Question # 32

What is required for a macro to accept three arguments?

A.

The macro's name ends with (3).

B.

The macro's name starts with (3).

C.

The macro's argument count setting is 3 or more.

D.

Nothing, all macros can accept any number of arguments.

Full Access
Question # 33

What are the two parts of a root event dataset?

A.

Fields and variables.

B.

Fields and attributes.

C.

Constraints and fields.

D.

Constraints and lookups.

Full Access
Question # 34

Based on the macro definition shown below, what is the correct way to execute the macro in a search string?

A.

Convert_sales (euro, €, 79)”

B.

Convert_sales (euro, €, .79)

C.

Convert_sales ($euro,$€$,s79$

D.

Convert_sales ($euro, $€$,S,79$)

Full Access
Question # 35

Which of the following statements describe the search below? (select all that apply)

Index=main I transaction clientip host maxspan=30s maxpause=5s

A.

Events in the transaction occurred within 5 seconds.

B.

It groups events that share the same clientip and host.

C.

The first and last events are no more than 5 seconds apart.

D.

The first and last events are no more than 30 seconds apart.

Full Access
Question # 36

When using the Field Extractor (FX), which of the following delimiters will work? (select all that apply)

A.

Tabs

B.

Pipes

C.

Colons

D.

Spaces

Full Access
Question # 37

Which of the following statements describes field aliases?

A.

Field alias names replace the original field name.

B.

Field aliases can be used in lookup file definitions.

C.

Field aliases only normalize data across sources and sourcetypes.

D.

Field alias names are not case sensitive when used as part of a search.

Full Access
Question # 38

Which of the following statements describes the command below (select all that apply)

Sourcetype=access_combined | transaction JSESSIONID

A.

An additional filed named maxspan is created.

B.

An additional field named duration is created.

C.

An additional field named eventcount is created.

D.

Events with the same JSESSIONID will be grouped together into a single event.

Full Access
Question # 39

Which of the following statements describe the Common Information Model (CIM)? (select all that apply)

A.

CIM is a methodology for normalizing data.

B.

CIM can correlate data from different sources.

C.

The Knowledge Manager uses the CIM to create knowledge objects.

D.

CIM is an app that can coexist with other apps on a single Splunk deployment.

Full Access
Question # 40

To identify all of the contributing events within a transaction that contains at least one REJECT event, which syntax is correct?

A.

Index-main | REJECT trans sessionid

B.

Index-main | transaction sessionid | search REJECT

C.

Index=main | transaction sessionid | whose transaction=reject

D.

Index=main | transaction sessionid | where transaction=reject’’

Full Access
Question # 41

What functionality does the Splunk Common Information Model (CIM) rely on to normalize fields with different names?

A.

Macros.

B.

Field aliases.

C.

The rename command.

D.

CIM does not work with different names for the same field.

Full Access
Question # 42

Which of the following statements describe the search string below?

| datamodel Application_State All_Application_State search

A.

Evenrches would return a report of sales by state.

B.

Events will be returned from the data model named Application_State.

C.

Events will be returned from the data model named All_Application_state.

D.

No events will be returned because the pipe should occur after the datamodel command

Full Access
Question # 43

Which of these stats commands will show the total bytes for each unique combination of page and server?

A.

index=web | stats sum (bytes) BY page BY server

B.

index=web | stats sum (bytes) BY page server

C.

index=web | stats sum(bytes) BY page AND server

D.

index=web | stats sum(bytes) BY values (page) values (server)

Full Access
Question # 44

What does the following search do?

A.

Creates a table of the total count of users and split by corndogs.

B.

Creates a table of the total count of mysterymeat corndogs split by user.

C.

Creates a table with the count of all types of corndogs eaten split by user.

D.

Creates a table that groups the total number of users by vegetarian corndogs.

Full Access
Question # 45

Which knowledge Object does the Splunk Common Information Model (CIM) use to normalize data. in addition to field aliases, event types, and tags?

A.

Macros

B.

Lookups

C.

Workflow actions

D.

Field extractions

Full Access
Question # 46

Where are the results of eval commands stored?

A.

In a field.

B.

In an index.

C.

In a KV Store.

D.

In a database.

Full Access
Question # 47

Which tool uses data models to generate reports and dashboard panels without using SPL?

A.

Visualization tab

B.

Pivot

C.

Datasets

D.

splunk CIM

Full Access
Question # 48

Which of the following statements best describes a macro?

A.

A macro is a method of categorizing events based on a search.

B.

A macro is a way to associate an additional (new) name with an existing field name.

C.

A macro is a portion of a search that can be reused in multiple place

D.

A macro is a knowledge object that enables you to schedule searches for specific events.

Full Access
Question # 49

What are the expected search results from executing the following SPL command?

index=network NOT StatusCode=200

A.

Every event in the network index that does not have a value in this field.

B.

Every event in the network index that does not contain a StatusCode of 200 and excluding events that do not have a value in this field.

C.

Every event in the network index that does not contain a StatusCode of 200, including events that do not have a value in this field.

D.

No results as the syntax is incorrect, the != field expression needs to be used instead of the NOT operator.

Full Access
Question # 50

When performing a regex field extraction with the Field Extractor (FX), a data type must be chosen before a sample event can be selected. Which of the following data types are supported?

A.

index or source

B.

sourcetype or host

C.

index or sourcetype

D.

sourcetype or source

Full Access
Question # 51

The gauge command:

A.

creates a single-value visualization

B.

allows you to set colored ranges for a single-value visualization

C.

creates a radial gauge visualization

Full Access
Question # 52

Which workflow action method can be used the action type is set to link?

A.

GET

B.

PUT

C.

Search

D.

UPDATE

Full Access
Question # 53

When using the transaction command, what does the argument maxspan do?

A.

Sets the maximum total time between events in a transaction.

B.

Sets the maximum length of all events within a transaction.

C.

Sets the maximum total time between the earliest and latest events in a transaction.

D.

Sets the maximum length that any single event can reach to be included in the transaction.

Full Access
Question # 54

What is the correct format for naming a macro with multiple arguments?

A.

monthly_sales(argument 1, argument 2, argument 3)

B.

monthly_sales(3)

C.

monthly_sales[3]

D.

monthly_sales[argument 1, argument 2, argument 3)

Full Access
Question # 55

What is the Splunk Common Information Model (CIM)?

A.

The CIM is a prerequisite that any data source must meet to be successfully onboarded into Splunk.

B.

The CIM provides a methodology to normalize data from different sources and source types.

C.

The CIM defines an ecosystem of apps that can be fully supported by Splunk.

D.

The CIM is a data exchange initiative between software vendors.

Full Access
Question # 56

Which of the following examples would use a POST workflow action?

A.

Perform an external IP lookup based on a domain value found in events.

B.

Use the field values in an HTTP error event to create a new ticket in an external system.

C.

Launch secondary Splunk searches that use one or more field values from selected events.

D.

Open a web browser to look up an HTTP status code.

Full Access
Question # 57

Which of the following statements describes the use of the Filed Extractor (FX)?

A.

The Field Extractor automatically extracts all field at search time.

B.

The Field Extractor uses PERL to extract field from the raw events.

C.

Field extracted using the Extracted persist as knowledge objects.

D.

Fields extracted using the Field Extractor do not persist and must be defined for each search.

Full Access
Question # 58

Which of the following statements describes calculated fields?

A.

Calculated fields are only used on fields added by lookups.

B.

Calculated fields are a shortcut for repetitive and complex eval commands.

C.

Calculated fields are a shortcut for repetitive and complex calc commands.

D.

Calculated fields automatically calculate the simple moving average for indexed fields.

Full Access
Question # 59

In this search, __________ will appear on the y-axis. SEARCH: sourcetype=access_combined status!=200 | chart count over host

A.

status

B.

host

C.

count

Full Access
Question # 60

If a calculated field has the same name as an extracted field, what happens to the extracted field?

A.

The calculated field will override the extracted field.

B.

The calculated and extracted fields will be combined.

C.

The calculated field will duplicate the extracted field.

D.

An error will be returned and the search will fail.

Full Access
Question # 61

The timechart command is an example of which of the following command types?

A.

Orchestrating

B.

Transforming

C.

Statistical

D.

Generating

Full Access
Question # 62

For the following search, which field populates the x-axis?

index=security sourcetype=linux secure | timechart count by action

A.

action

B.

source type

C.

_time

D.

time

Full Access
Question # 63

A macro has another macro nested within it, and this inner macro requires an argument. How can the user pass this argument into the SPL?

A.

An argument can be passed through the outer macro.

B.

An argument can be passed to the outer macro by nesting parentheses.

C.

There is no way to pass an argument to the inner macro.

D.

An argument can be passed to the inner macro by nesting parentheses.

Full Access
Question # 64

When creating an event type, which is allowed in the search string?

A.

Tags

B.

Joins

C.

Subsearches

D.

Pipes

Full Access
Question # 65

Tags can reference which of the following knowledge objects?

A.

Lookups and event types only.

B.

Extracted fields, field aliases, calculated fields, lookups, and event types.

C.

Tags cannot reference any of these knowledge objects because tags are the last knowledge objects generated in the search-time operation sequence.

D.

Extracted fields, calculated fields, and field aliases only.

Full Access
Question # 66

When does the CIM add-on apply preconfigured data models to the data?

A.

Search time

B.

Index time

C.

On a cron schedule

D.

At midnight

Full Access
Question # 67

Which method in the Field Extractor would extract the port number from the following event? |

10/20/2022 - 125.24.20.1 ++++ port 54 - user: admin

A.

Delimiter

B.

rex command

C.

The Field Extractor tool cannot extract regular expressions.

D.

Regular expression

Full Access
Question # 68

Which of the following definitions describes a macro named "samplemacro" that accepts two arguments?

A.

Examplemacro [1,2]

B.

samplemacro(1,2)

C.

u amp -CJEUCXG (2)

D.

samplemacro[2]

Full Access
Question # 69

Using the Field Extractor (FX) tool, a value is highlighted to extract and give a name to a new field. Splunk has not successfully extracted that value from all appropriate events. What steps can be taken so Splunk successfully extracts the value from all appropriate events? (select all that apply)

A.

Select an additional sample event with the Field Extractor (FX) and highlight the missing value in the event.

B.

Re-ingest the data and attempt to extract from a new dataset.

C.

Click on the event where the field was not extracted and choose “Change to Delimited".

D.

Edit the regular expression manually.

Full Access
Question # 70

Which of the following searches will return all clientip addresses that start with 108?

A.

… | where like (clientip, “108.% )

B.

… | where (clientip, "108. %")

C.

… | where (clientip=108. % )

D.

… | search clientip=108

Full Access
Question # 71

What is a limitation of searches generated by workflow actions?

A.

Searches generated by workflow action cannot use macros.

B.

Searches generated by workflow actions must be less than 256 characters long.

C.

Searches generated by workflow action must run in the same app as the workflow action.

D.

Searches generated by workflow action run with the same permissions as the user running them.

Full Access
Question # 72

To create a tag, which of the following conditions must be met by the user?

A.

Identify at least one field:value pair.

B.

Have the Power role at a minimum.

C.

Be able to edit the sourcetype the tag applies to.

D.

Must have the tag capability associated with their user role.

Full Access
Question # 73

What are the expected results for a search that contains the command | where A=B?

A.

Events that contain the string value where A=B.

B.

Events that contain the string value A=B.

C.

Events where values of field are equal to values of field B.

D.

Events where field A contains the string value B.

Full Access
Question # 74

How is a macro referenced in a search?

A.

By using the macroname command.

B.

By using the macro command.

C.

By enclosing the macro name in backtick characters (‘).

D.

By enclosing the macro name in single-quote characters (‘).

Full Access
Question # 75

When using the timechart command, how can a user group the events into buckets based on time?

A.

Using the span argument.

B.

Using the duration argument.

C.

Using the interval argument.

D.

Adjusting the fieldformat options.

Full Access
Question # 76

This clause is used to group the output of a stats command by a specific name.

A.

Rex

B.

As

C.

List

D.

By

Full Access
Question # 77

Which of the following searches will show the number of categoryld used by each host?

A.

Sourcetype=access_* |sum bytes by host

B.

Sourcetype=access_* |stats sum(categorylD. by host

C.

Sourcetype=access_* |sum(bytes) by host

D.

Sourcetype=access_* |stats sum by host

Full Access
Question # 78

If there are fields in the data with values that are " " or empty but not null, which of the following would add a value?

A.

| eval notNULL = if(isnull (notNULL), “0” notNULL)

B.

| eval notNULL = if(isnull (notNULL), “0”

C.

| eval notNULL = “” | nullfill value=0 notNULL

D.

| eval notNULL = “” fillnull value=0 notNULL

Full Access
Question # 79

Which of the following is true about data sets used in the Pivot tool?

A.

They can only be created from data models.

B.

They can only be created by users with the Admin role.

C.

They can only be created from summary indexes.

D.

They can only be created from saved reports.

Full Access
Question # 80

When creating a data model, which root dataset requires at least one constraint?

A.

Root transaction dataset

B.

Root event dataset

C.

Root child dataset

D.

Root search dataset

Full Access
Question # 81

When should the regular expression mode of Field Extractor (FX) be used? (select all that apply)

A.

For data cleanly separated by a space, a comma, or a pipe character.

B.

For data in a CSV (comma-separated value) file.

C.

For data with multiple, different characters separating fields.

D.

For unstructured data.

Full Access
Question # 82

What does the fillnull command replace null values with, if the value argument is not specified?

A.

0

B.

N/A

C.

NaN

D.

NULL

Full Access
Question # 83

What is the correct way to name a macro with two arguments?

A.

us_sales2

B.

us_sales(1,2)

C.

us_sale,2

D.

us_sales(2)

Full Access
Question # 84

When a search returns __________, you can view the results as a list.

A.

a list of events

B.

transactions

C.

statistical values

Full Access
Question # 85

Which of the following are valid options to speed up reports? (Select all the apply.)

A.

Edit permissions

B.

Edit description

C.

Edit acceleration

D.

Edit schedule

Full Access
Question # 86

Which of the following search modes automatically returns all extracted fields in the fields sidebar?

A.

Fast

B.

Smart 

C.

C. Verbose

Full Access