Splunk Cloud Certified Admin SPLK-1005 Exam Questions

Page: 1 / 14
Total 80 questions
Question 1

A log file is being ingested into Splunk, and a few events have no date stamp. How would Splunk first try to determine the missing date of the events?



Answer : D

When events lack a timestamp, Splunk defaults to using the file modification time, which is accessible metadata for parsing time information if no timestamp is present in the log entry. [Reference: Splunk Docs on timestamp recognition]


Question 2

Which of the following statements is true about data transformations using SEDCMD?



Answer : A

SEDCMD is a directive used within the props.conf file in Splunk to perform inline data transformations. Specifically, it uses sed-like syntax to modify data as it is being processed.

A . Can only be used to mask or truncate raw data: This is the correct answer because SEDCMD is typically used to mask sensitive data, such as obscuring personally identifiable information (PII) or truncating parts of data to ensure privacy and compliance with security policies. It is not used for more complex transformations such as changing the sourcetype per event.

B . Configured in props.conf and transform.conf: Incorrect, SEDCMD is only configured in props.conf.

C . Can be used to manipulate the sourcetype per event: Incorrect, SEDCMD does not manipulate the s ourcetype.

D . Operates on a REGEX pattern match of the source, sourcetype, or host of an event: Incorrect, while SEDCMD uses regex for matching patterns in the data, it does not operate on the source, sourcetype, or host specifically.

Splunk Documentation Reference:

SEDCMD Usage

Mask Data with SEDCMD


Question 3

Where can an administrator download the Splunk Cloud Universal Forwarder credentials package?



Answer : C

The Universal Forwarder credentials package is available in the Splunk Cloud search head's Universal Forwarder app for secure, managed deployment. [Reference: Splunk Docs on Universal Forwarder credentials package]


Question 4

When using Splunk Universal Forwarders, which of the following is true?



Answer : B

Universal Forwarders can connect directly to Splunk Cloud, and there is no limit on the number of Universal Forwarders that may connect directly to it. This capability allows organizations to scale their data ingestion easily by deploying as many Universal Forwarders as needed without the requirement for intermediate forwarders unless additional data processing, filtering, or load balancing is required.

Splunk Documentation Reference: Forwarding Data to Splunk Cloud


Question 5

When a forwarder phones home to a Deployment Server it compares the check-sum value of the forwarder's app to the Deployment Server's app. What happens to the app If the check-sum values do not match?



Answer : A

When a forwarder phones home to a Deployment Server, it compares the checksum of its apps with those on the Deployment Server. If the checksums do not match, the app on the forwarder is always deleted and re-downloaded from the Deployment Server. This ensures that the forwarder has the most current and correct version of the app as dictated by the Deployment Server.

Splunk Documentation Reference: Deployment Server Overview


Question 6

Which of the following files is used for both search-time and index-time configuration?



Answer : B

The props.conf file is a crucial configuration file in Splunk that is used for both search-time and index-time configurations.

At index-time, props.conf is used to define how data should be parsed and indexed, such as timestamp recognition, line breaking, and data transformations.

At search-time, props.conf is used to configure how data should be searched and interpreted, such as field extractions, lookups, and sourcetypes.

B . props.conf is the correct answer because it is the only file listed that serves both index-time and search-time purposes.

Splunk Documentation Reference:

props.conf - configuration for search-time and index-time


Question 7

Which of the following is an accurate statement about the delete command?



Answer : C

The delete command in Splunk does not remove events from disk but rather marks them as 'deleted' in the index. This means the events are not accessible via searches, but they still occupy space on disk. Only users with the can_delete capability (typically admins) can use the delete command.

Splunk Documentation Reference: Delete Command


Page:    1 / 14   
Total 80 questions