Winter Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

SPLK-1002 PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

SPLK-1002 PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: Splunk Core Certified Power User Exam
  • Last Update: Dec 3, 2024
  • Questions and Answers: 286
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

SPLK-1002 Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

SPLK-1002 Practice Exam Questions with Answers Splunk Core Certified Power User Exam Certification

Question # 6

The eval command 'if' function requires the following three arguments (in order):

A.

Boolean expression, result if true, result if false

B.

Result if true, result if false, boolean expression

C.

Result if false, result if true, boolean expression

D.

Boolean expression, result if false, result if true

Full Access
Question # 7

Which of the following statements about calculated fields in Splunk is true?

A.

Calculated fields cannot be chained together to create more complex fields

B.

Calculated fields can be chained together to create more complex fields.

C.

Calculated fields can only be used in dashboards.

D.

Calculated fields can only be used in saved reports.

Full Access
Question # 8

To create a tag, which of the following conditions must be met by the user?

A.

Identify at least one field:value pair.

B.

Have the Power role at a minimum.

C.

Be able to edit the sourcetype the tag applies to.

D.

Must have the tag capability associated with their user role.

Full Access
Question # 9

Which of the following searches will return events contains a tag name Privileged?

A.

Tag= Priv

B.

Tag= Pri*

C.

Tag= Priv*

D.

Tag= Privileged

Full Access
Question # 10

Which of the following workflow actions can be executed from search results? (select all that apply)

A.

GET

B.

POST

C.

LOOKUP

D.

Search

Full Access
Question # 11

What is the relationship between data models and pivots?

A.

Data models provide the datasets for pivots.

B.

Pivots and data models have no relationship.

C.

Pivots and data models are the same thing.

D.

Pivots provide the datasets for data models.

Full Access
Question # 12

Which of the following statements describe the search string below?

| datamodel Application_State All_Application_State search

A.

Evenrches would return a report of sales by state.

B.

Events will be returned from the data model named Application_State.

C.

Events will be returned from the data model named All_Application_state.

D.

No events will be returned because the pipe should occur after the datamodel command

Full Access
Question # 13

Data model fields can be added using the Auto-Extracted method. Which of the following statements describe Auto-Extracted fields? (select all that apply)

A.

Auto-Extracted fields can be hidden in Pivot.

B.

Auto-Extracted fields can have their data type changed.

C.

Auto-Extracted fields can be given a friendly name for use in Pivot.

D.

Auto-Extracted fields can be added if they already exist in the dataset with constraints.

Full Access
Question # 14

What does the following search do?

SPLK-1002 question answer

A.

Creates a table of the total count of users and split by corndogs.

B.

Creates a table of the total count of mysterymeat corndogs split by user.

C.

Creates a table with the count of all types of corndogs eaten split by user.

D.

Creates a table that groups the total number of users by vegetarian corndogs.

Full Access
Question # 15

Which group of users would most likely use pivots?

A.

Users

B.

Architects

C.

Administrators

D.

Knowledge Managers

Full Access
Question # 16

Calculated fields can be based on which of the following?

A.

Tags

B.

Extracted fields

C.

Output fields for a lookup

D.

Fields generated from a search string

Full Access
Question # 17

Which of the following searches show a valid use of macro? (Select all that apply)

A.

index=main source=mySource oldField=* |'makeMyField(oldField)'| table _time newField

B.

index=main source=mySource oldField=* | stats if('makeMyField(oldField)') | table _time newField

C.

index=main source=mySource oldField=* | eval newField='makeMyField(oldField)'| table _time newField

D.

index=main source=mySource oldField=* | "'newField('makeMyField(oldField)')'" | table _time newField

Full Access
Question # 18

To identify all of the contributing events within a transaction that contains at least one REJECT event, which syntax is correct?

A.

Index-main | REJECT trans sessionid

B.

Index-main | transaction sessionid | search REJECT

C.

Index=main | transaction sessionid | whose transaction=reject

D.

Index=main | transaction sessionid | where transaction=reject’’

Full Access
Question # 19

What does the transaction command do?

A.

Groups a set of transactions based on time.

B.

Creates a single event from a group of events.

C.

Separates two events based on one or more values.

D.

Returns the number of credit card transactions found in the event logs.

Full Access
Question # 20

How does a user display a chart in stack mode?

A.

By using the stack command.

B.

By turning on the Use Trellis Layout option.

C.

By changing Stack Mode in the Format menu.

D.

You cannot display a chart in stack mode, only a timechart.

Full Access
Question # 21

Which of the following describes the Splunk Common Information Model (CIM) add-on?

A.

The CIM add-on uses machine learning to normalize data.

B.

The CIM add-on contains dashboards that show how to map data.

C.

The CIM add-on contains data models to help you normalize data.

D.

The CIM add-on is automatically installed in a Splunk environment.

Full Access
Question # 22

What does the Splunk Common Information Model (CIM) add-on include? (select all that apply)

A.

Custom visualizations

B.

Pre-configured data models

C.

Fields and event category tags

D.

Automatic data model acceleration

Full Access
Question # 23

Which of the following file formats can be extracted using a delimiter field extraction?

A.

CSV

B.

PDF

C.

XML

D.

JSON

Full Access
Question # 24

What are the two parts of a root event dataset?

A.

Fields and variables.

B.

Fields and attributes.

C.

Constraints and fields.

D.

Constraints and lookups.

Full Access
Question # 25

Which delimiters can the Field Extractor (FX) detect? (select all that apply)

A.

Tabs

B.

Pipes

C.

Spaces

D.

Commas

Full Access
Question # 26

Which of the following data model are included In the Splunk Common Information Model (CIM) add-on? (select all that apply)

A.

Alerts

B.

Email

C.

Database

D.

User permissions

Full Access
Question # 27

A calculated field maybe based on which of the following?

A.

Lookup tables

B.

Extracted fields

C.

Regular expressions

D.

Fields generated within a search string

Full Access
Question # 28

Selected fields are displayed ______each event in the search results.

A.

below

B.

interesting fields

C.

other fields

D.

above

Full Access
Question # 29

Which of the following statements describes Search workflow actions?

A.

By default. Search workflow actions will run as a real-time search.

B.

Search workflow actions can be configured as scheduled searches,

C.

The user can define the time range of the search when created the workflow action.

D.

Search workflow actions cannot be configured with a search string that includes the transaction command

Full Access
Question # 30

What is required for a macro to accept three arguments?

A.

The macro's name ends with (3).

B.

The macro's name starts with (3).

C.

The macro's argument count setting is 3 or more.

D.

Nothing, all macros can accept any number of arguments.

Full Access
Question # 31

Which of the following is the correct way to use the data model command to search field in the data model within the web dataset?

A.

| datamodel web search | filed web *

B.

| Search datamodel web web | filed web*

C.

| datamodel web web field | search web*

D.

Datamodel=web | search web | filed web*

Full Access
Question # 32

Which of the following statements describes POST workflow actions?

A.

POST workflow actions are always encrypted.

B.

POST workflow actions cannot use field values in their URI.

C.

POST workflow actions cannot be created on custom sourcetypes.

D.

POST workflow actions can open a web page in either the same window or a new .

Full Access
Question # 33

Which of the following statements describe GET workflow actions?

A.

GET workflow actions must be configured with POST arguments.

B.

Configuration of GET workflow actions includes choosing a sourcetype.

C.

Label names for GET workflow actions must include a field name surrounded by dollar signs.

D.

GET workflow actions can be configured to open the URT link in the current window or in a new window

Full Access
Question # 34

Which are valid ways to create an event type? (select all that apply)

A.

By using the searchtypes command in the search bar.

B.

By editing the event_type stanza in the props.conf file.

C.

By going to the Settings menu and clicking Event Types > New.

D.

By selecting an event in search results and clicking Event Actions > Build Event Type.

Full Access
Question # 35

Which of these stats commands will show the total bytes for each unique combination of page and server?

A.

index=web | stats sum (bytes) BY page BY server

B.

index=web | stats sum (bytes) BY page server

C.

index=web | stats sum(bytes) BY page AND server

D.

index=web | stats sum(bytes) BY values (page) values (server)

Full Access
Question # 36

For the following search, which command would further filter for only IP addresses present more than five times?

A.

index=games I stats count as IP_count by IP B. | where IP_count > 5

B.

index=games | search IP_Count > 5

C.

index=games | where IP > 5

D.

index=games I search IP > 5

Full Access
Question # 37

Which of the following eval command functions is valid?

A.

int()

B.

count()

C.

print()

D.

tostring()

Full Access
Question # 38

Which syntax is used to represent an argument in a macro definition?

A.

"argument"

B.

%argument%

C.

‘argument’

D.

$argument$

Full Access
Question # 39

Which knowledge object is used to normalize field names to comply with the Splunk Common Information Model (CIM)?

A.

Field alias

B.

Event types

C.

Search workflow action

D.

Tags

Full Access
Question # 40

Using the Field Extractor (FX) tool, a value is highlighted to extract and give a name to a new field. Splunk has not successfully extracted that value from all appropriate events. What steps can be taken so Splunk successfully extracts the value from all appropriate events? (select all that apply)

A.

Select an additional sample event with the Field Extractor (FX) and highlight the missing value in the event.

B.

Re-ingest the data and attempt to extract from a new dataset.

C.

Click on the event where the field was not extracted and choose “Change to Delimited".

D.

Edit the regular expression manually.

Full Access
Question # 41

Which of the following knowledge objects can reference field aliases?

A.

Calculated fields, lookups, event types, and tags.

B.

Calculated fields and tags only.

C.

Calculated fields and event types only.

D.

Calculated fields, lookups, event types, and extracted fields.

Full Access
Question # 42

These kinds of charts represent a series in a single bar with multiple sections

A.

Multi-Series

B.

Split-Series

C.

Omit nulls

D.

Stacked

Full Access
Question # 43

There are several ways to access the field extractor. Which option automatically identifies data type, source type, and sample event?

A.

Event Actions > Extract Fields

B.

Fields sidebar > Extract New Field

C.

Settings > Field Extractions > New Field Extraction

D.

Settings > Field Extractions > Open Field Extraction

Full Access
Question # 44

Splunk alerts can be based on search that run______. (Select all that apply.)

A.

in real-time

B.

on a regular schedule

C.

and have no matching events

Full Access
Question # 45

What is the correct format for naming a macro with multiple arguments?

A.

monthly_sales(argument 1, argument 2, argument 3)

B.

monthly_sales(3)

C.

monthly_sales[3]

D.

monthly_sales[argument 1, argument 2, argument 3)

Full Access
Question # 46

Which of the following statements describes POST workflow actions?

A.

Configuration of a POST workflow action includes choosing a sourcetype.

B.

POST workflow actions can be configured to send email to the URI location.

C.

By default, POST workflow action are shown in both the event and field menus.

D.

POST workflow actions can be configured to send POST arguments to the URI location.

Full Access
Question # 47

The eval command allows you to do which of the following? (Choose all that apply.)

A.

Format values

B.

Convert values

C.

Perform calculations

D.

Use conditional statements

Full Access
Question # 48

What is the purpose of a calculated field?

A.

To automatically add fields to the index using an eval expression rather than manually including an eval command.

B.

To manually add and remove fields at search time related to statistical functions.

C.

To automatically add fields at search time using an eval expression rather than manually including an eval command.

D.

To manually add fields at search time and check for syntax errors.

Full Access
Question # 49

Which of the following statements about tags is true?

A.

Tags are case insensitive.

B.

Tags can make your data more understandable.

C.

Tags are created at index time.

D.

Tags are searched by using the syntax tag :: .

Full Access
Question # 50

What is the purpose of the fillnull command?

A.

Replace empty values with a specified value.

B.

Create a new field based on the values in an existing field.

C.

Rename a specific field in the search results.

D.

Replace all values in a specific field with a default value.

Full Access
Question # 51

Which of the following is one of the pre-configured data models included in the Splunk Common Information Model (CIM) add-on?

A.

Access

B.

Accounting

C.

Authorization

D.

Authentication

Full Access
Question # 52

Which search would limit an "alert" tag to the "host" field?

A.

tag=alert

B.

host::tag::alert

C.

tag==alert

D.

tag::host=alert

Full Access
Question # 53

Which of the following eval commands will provide a new value for host from src if it exists?

A.

| eval host = if (isnu11 (src), src, host)

B.

| eval host = if (NOT src = host, src, host)

C.

| eval host = if (src = host, src, host)

D.

| eval host = if (isnotnull (src), src, host)

Full Access
Question # 54

Which option of the transaction command would be used to specify the maximum time between events in a transaction?

A.

maxpause

B.

maxspan

C.

duration

D.

 eventcount

Full Access
Question # 55

When creating a data model, which root dataset requires at least one constraint?

A.

Root transaction dataset

B.

Root event dataset

C.

Root child dataset

D.

Root search dataset

Full Access
Question # 56

In this search, __________ will appear on the y-axis. SEARCH: sourcetype=access_combined status!=200 | chart count over host

A.

status

B.

host

C.

count

Full Access
Question # 57

When used with the timechart command, which value of the limit argument returns all values?

A.

limit=*

B.

limit=all

C.

limit=none

D.

limit=0

Full Access
Question # 58

Which syntax will find events where the values for the 1 field match the values for the Renewal-MonthYear field?

A.

| where 10yearAnnerversary=Renewal-MonthYear

B.

| where ‘10yearAnnerversary=Renewal-MonthYear

C.

| where 10yearAnnerversary=’Renewal-MonthYear’

D.

| where ‘10yearAnnerversary’=’Renewal-MonthYear’

Full Access
Question # 59

How is a Search Workflow Action configured to run at the same time range as the original search?

A.

Set the earliest time to match the original search.

B.

Select the same time range from the time-range picker.

C.

Select the "Use the same time range as the search that created the field listing" checkbox.

D.

Select the "Overwrite time range with the original search" checkbox.

Full Access
Question # 60

After manually editing; a regular expression (regex), which of the following statements is true?

A.

Changes made manually can be reverted in the Field Extractor (FX) UI.

B.

It is no longer possible to edit the field extraction in the Field Extractor (FX) UI.

C.

It is not possible to manually edit a regular expression (regex) that was created using the Field Extractor (FX) UI.

D.

The Field Extractor (FX) UI keeps its own version of the field extraction in addition to the one that was manually edited.

Full Access
Question # 61

When using timechart, how many fields can be listed after a by clause?

A.

because timechart doesn't support using a by clause.

B.

because _time is already implied as the x-axis.

C.

because one field would represent the x-axis and the other would represent the y-axis.

D.

There is no limit specific to timechart.

Full Access
Question # 62

What functionality does the Splunk Common Information Model (CIM) rely on to normalize fields with different names?

A.

Macros.

B.

Field aliases.

C.

The rename command.

D.

CIM does not work with different names for the same field.

Full Access
Question # 63

Which of the following describes this search?

New Search

'third_party_outages(EMEA,-24h)'

A.

This search will find all events for the third_party_outages event type that have "EMEA" or "-24h" in the raw event data.

B.

This search will run the third_party_outages saved search and filter for events containing "EMEA" and "-24h" in the raw event data.

C.

This search will run the third_party_outages macro and pass the arguments EMEA and -24h to the macro definition.

D.

This search will find all events in the third_party_outages index with the tags EMEA and -24h.

Full Access
Question # 64

A data model consists of which three types of datasets?

A.

Constraint, field, value.

B.

Events, searches, transactions.

C.

Field extraction, regex, delimited.

D.

Transaction, session ID, metadata.

Full Access
Question # 65

Which of the following is true about Pivot?

A.

Users can save reports from Pivot.

B.

Users cannot share visualizations created with Pivot.

C.

Users must use SPL to find events in a Pivot.

D.

Users cannot create visualizations with Pivot.

Full Access
Question # 66

Which of the following search control will not re-rerun the search? (Select all that apply.)

A.

zoom out

B.

selecting a bar on the timeline

C.

deselect

D.

selecting a range of bars on the timelines

Full Access
Question # 67

Which of the following describes the I transaction command?

A.

It is an SPL command that groups at least two events together based on shared values in selected fields.

B.

It allows an exchange of data from one Splunk index to another Splunk index.

C.

It is an SPL command that groups events together with shared values in selected fields.

D.

It allows an exchange of data from one Splunk system to another Splunk system.

Full Access
Question # 68

Using the export function, you can export search results as __________.( Select all that apply)

A.

Xml

B.

Json

C.

Html

D.

A php file

Full Access
Question # 69

Which of the following searches would return a report of sales by product-name?

A.

chart sales by product_name

B.

chart sum(price) as sales by product_name

C.

stats sum(price) as sales over product_name

D.

timechart list(sales), values(product_name)

Full Access
Question # 70

If a search returns ____________ it can be viewed as a chart.

A.

timestamps

B.

statistics

C.

events

D.

keywords

Full Access
Question # 71

In the following eval statement, what is the value of description if the status is 503? index=main | eval description=case(status==200, "OK", status==404, "Not found", status==500, "Internal Server Error")

A.

The description field would contain no value.

B.

The description field would contain the value 0.

C.

The description field would contain the value "Internal Server Error".

D.

This statement would produce an error in Splunk because it is incomplete.

Full Access
Question # 72

When using the transaction command, what does the argument maxspan do?

A.

Sets the maximum total time between events in a transaction.

B.

Sets the maximum length of all events within a transaction.

C.

Sets the maximum total time between the earliest and latest events in a transaction.

D.

Sets the maximum length that any single event can reach to be included in the transaction.

Full Access
Question # 73

Which of the following statements best describes a macro?

A.

A macro is a method of categorizing events based on a search.

B.

A macro is a way to associate an additional (new) name with an existing field name.

C.

A macro is a portion of a search that can be reused in multiple place

D.

A macro is a knowledge object that enables you to schedule searches for specific events.

Full Access
Question # 74

Which of the following statements would help a user choose between the transaction and stats commands?

A.

state can only group events using IP addresses.

B.

The transaction command is faster and more efficient.

C.

There is a 1000 event limitation with the transaction command.

D.

Use state when the events need to be viewed as a single event.

Full Access
Question # 75

Highlighted search terms indicate _________ search results in Splunk.

A.

Display as selected fields.

B.

Sorted

C.

Charted based on time

D.

Matching

Full Access
Question # 76

A macro has another macro nested within it, and this inner macro requires an argument. How can the user pass this argument into the SPL?

A.

An argument can be passed through the outer macro.

B.

An argument can be passed to the outer macro by nesting parentheses.

C.

There is no way to pass an argument to the inner macro.

D.

An argument can be passed to the inner macro by nesting parentheses.

Full Access
Question # 77

Which of the following eval command function is valid?

A.

Int ()

B.

Count ( )

C.

Print ()

D.

Tostring ()

Full Access
Question # 78

Which of the following statements describes macros?

A.

A macro is a reusable search string that must contain the full search.

B.

A macro is a reusable search string that must have a fixed time range.

C.

A macro Is a reusable search string that may have a flexible time range.

D.

A macro Is a reusable search string that must contain only a portion of the search.

Full Access
Question # 79

Given the macro definition below, what should be entered into the Name and Arguments fileds to correctly configured the macro?

SPLK-1002 question answer

A.

The macro name is sessiontracker and the arguments are action, JESSIONID.

B.

The macro name is sessiontracker(2) and the arguments are action, JESSIONID.

C.

The macro name is sessiontracker and the arguments are $action$, $JESSIONID$.

D.

The macro name is sessiontracker(2) and the Arguments are $action$, $JESSIONID$.

Full Access
Question # 80

Which of the following statements describe calculated fields? (select all that apply)

A.

Calculated fields can be used in the search bar.

B.

Calculated fields can be based on an extracted field.

C.

Calculated fields can only be applied to host and sourcetype.

D.

Calculated fields are shortcuts for performing calculations using the eval command.

Full Access
Question # 81

When using the Field Extractor (FX), which of the following delimiters will work? (select all that apply)

A.

Tabs

B.

Pipes

C.

Colons

D.

Spaces

Full Access
Question # 82

Which of the following statements describes this search?

sourcetype=access_combined I transaction JSESSIONID | timechart avg (duration)

A.

This is a valid search and will display a timechart of the average duration, of each transaction event.

B.

This is a valid search and will display a stats table showing the maximum pause among transactions.

C.

No results will be returned because the transaction command must include the startswith and endswith options.

D.

No results will be returned because the transaction command must be the last command used in the search pipeline.

Full Access
Question # 83

When multiple event types with different color values are assigned to the same event, what determines the color displayed for the events?

A.

Rank

B.

Weight

C.

Priority

D.

Precedence

Full Access
Question # 84

Which of the following statements about event types is true? (select all that apply)

A.

Event types can be tagged.

B.

Event types must include a time range,

C.

Event types categorize events based on a search.

D.

Event types can be a useful method for capturing and sharing knowledge.

Full Access
Question # 85

When performing a regular expression (regex) field extraction using the Field Extractor (FX), what happens when the require option is used?

A.

The regex can no longer be edited.

B.

The field being extracted will be required for all future events.

C.

The events without the required field will not display in searches.

D.

Only events with the required string will be included in the extraction.

Full Access
Question # 86

Which of the following knowledge objects represents the output of an eval expression?

A.

Eval fields

B.

Calculated fields

C.

Field extractions

D.

Calculated lookups

Full Access