Free Splunk® SPLK-1001 Exam Braindumps (page: 5)

Which of the following is true about user account settings and preferences?

  1. Search & Reporting is the only app that can be set as the default application.
  2. Full names can only be changed by accounts with a Power User or Admin role.
  3. Time zones are automatically updated based on the setting of the computer accessing Splunk.
  4. Full name, time zone, and default app can be defined by clicking the login name in the Splunk bar.

Answer(s): D



Which of the following are common constraints of the top command?

  1. limit, count
  2. limit, showpercent
  3. limits, countfield
  4. showperc, countfield

Answer(s): B



What is the purpose of using a by clause with the stats command?

  1. To group the results by one or more fields.
  2. To compute numerical statistics on each field.
  3. To specify how the values in a list are delimited.
  4. To partition the input data based on the split-by fields.

Answer(s): A



Which events will be returned by the following search string? host=www3 status=503

  1. All events that either have a host of www3 or a status of 503.
  2. All events with a host of www3 that also have a status of 503
  3. We need more information: we cannot tell without knowing the time range
  4. We need more information a search cannot be run without specifying an index

Answer(s): B



Which of the following searches would return events with failure in index netfw or warn or critical in index netops?

  1. (index=netfw failure) AND index=netops warn OR critical
  2. (index=netfw failure) OR (index=netops (warn OR critical))
  3. (index=netfw failure) AND (index=netops (warn OR critical))
  4. (index=netfw failure) OR index=netops OR (warn OR critical)

Answer(s): B



Select the answer that displays the accurate placing of the pipe in the following search string:
index=security sourcetype=access_* status=200 stats count by price

  1. index=security sourcetype=access_* status=200 stats | count by price
  2. index=security sourcetype=access_* status=200 | stats count by price
  3. index=security sourcetype=access_* status=200 | stats count | by price
  4. index=security sourcetype=access_* | status=200 | stats count by price

Answer(s): B



What does the stats command do?

  1. Automatically correlates related fields
  2. Converts field values into numerical values
  3. Calculates statistics on data that matches the search criteria
  4. Analyzes numerical fields for their ability to predict another discrete field

Answer(s): C



Which is a primary function of the timeline located under the search bar?

  1. To differentiate between structured and unstructured events in the data
  2. To sort the events returned by the search command in chronological order
  3. To zoom in and zoom out. although this does not change the scale of the chart
  4. To show peaks and/or valleys in the timeline, which can indicate spikes in activity or downtime

Answer(s): D



Viewing page 5 of 32
Viewing questions 33 - 40 out of 244 questions



Post your Comments and Discuss Splunk® SPLK-1001 exam prep with other Community members:

SPLK-1001 Exam Discussions & Posts