Free SPLK-1001 Exam Braindumps (page: 30)

Page 29 of 62

Which search string returns a filed containing the number of matching events and names that field Event Count?

  1. index=security failure | stats sum as "Event Count"
  2. index=security failure | stats count as "Event Count"
  3. index=security failure | stats count by "Event Count"
  4. index=security failure | stats dc(count) as "Event Count"

Answer(s): B



Which search would return events from the access_combined sourcetype?

  1. Sourcetype=access_combined
  2. Sourcetype=Access_Combined
  3. sourcetype=Access_Combined
  4. SOURCETYPE=access_combined

Answer(s): A

Explanation:

The search query sourcetype=access_combined would return events from the access_combined sourcetype, which is a predefined sourcetype in Splunk that matches the access-common or access- combined Apache logging formats1. The sourcetype field is case-sensitive, so using different capitalization such as Access_Combined or ACCESS_COMBINED would not match the exact sourcetype name2. The sourcetype field is also a default field that is added by the indexer when it indexes the data, so it does not need to be enclosed in quotation marks3.
Reference
List of pretrained source types
Search command syntax details
Basic searches and search results



When looking at a statistics table, what is one way to drill down to see the underlying events?

  1. Creating a pivot table.
  2. Clicking on the visualizations tab.
  3. Viewing your report in a dashboard.
  4. Clicking on any field value in the table.

Answer(s): B



In the fields sidebar, what indicates that a field is numeric?

  1. A number to the right of the field name.
  2. A # symbol to the left of the field name.
  3. A lowercase n to the left of the field name.
  4. A lowercase n to the right of the field name.

Answer(s): B






Post your Comments and Discuss Splunk® SPLK-1001 exam with other Community members:

SPLK-1001 Discussions & Posts