Cyber Monday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

This is what Splunk uses to categorize the data that is being indexed.

A.

sourcetype

B.

index

C.

source

D.

host

To create a tag, which of the following conditions must be met by the user?

A.

Identify at least one field:value pair.

B.

Have the Power role at a minimum.

C.

Be able to edit the sourcetype the tag applies to.

D.

Must have the tag capability associated with their user role.

which of the following are valid options with the chart command

A.

useother

B.

usenull

C.

fillfield

D.

usefiled

What happens to the original field name when a field alias is created?

A.

The original field name is not affected by the creation of a field alias.

B.

The original field name is replaced by the field alias within the index.

C.

The original field name is italicized to indicate that it is not an alias.

D.

The original field name still exists in the index but is not visible to the user at search time.

Which search string would only return results for an event type called success ful_purchases?

A.

tag=success ful_purchases

B.

Event Type:: successful purchases

C.

successful_purchases

D.

event type—success ful_purchases

What are the two parts of a root event dataset?

A.

Fields and variables.

B.

Fields and attributes.

C.

Constraints and fields.

D.

Constraints and lookups.

Why would the transaction command be used instead of the stats command?

A.

The transaction command can perform calculations on fields.

B.

The transaction command is less resource-intensive.

C.

The transaction command keeps the raw data for each event.

D.

The transaction command has better search-time performance.

Which of the following statements would help a user choose between the transaction and stats commands?

A.

state can only group events using IP addresses.

B.

The transaction command is faster and more efficient.

C.

There is a 1000 event limitation with the transaction command.

D.

Use state when the events need to be viewed as a single event.

What are the expected search results from executing the following SPL command?

index=network NOT StatusCode=200

A.

Every event in the network index that does not have a value in this field.

B.

Every event in the network index that does not contain a StatusCode of 200 and excluding events that do not have a value in this field.

C.

Every event in the network index that does not contain a StatusCode of 200, including events that do not have a value in this field.

D.

No results as the syntax is incorrect, the != field expression needs to be used instead of the NOT operator.

Select this in the fields sidebar to automatically pipe you search results to the rare command

A.

events with this field

B.

rare values

C.

top values by time

D.

top values