Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Splunk SPLK-1005 - Splunk Cloud Certified Admin

Page: 2 / 3
Total 80 questions

A customer has worked with their LDAP administrator to configure an LDAP strategy in Splunk. The configuration works, and user Mia can log into Splunk using her LDAP Account. After some time, the Splunk Cloud administrator needs to move Mia from the user role to the power role. How should they accomplish this?

A.

Ask the LDAP administrator to move Mia's account to an appropriately mapped LDAP group.

B.

Have Mia log into Splunk, then update her own role in user settings.

C.

Create a role named Power in Splunk, then map Mia's account to that role.

D.

Use the Cloud Monitoring Console app as an administrator to map Mia's account to the power role.

Which of the following app installation scenarios can be achieved without involving Splunk Support?

A.

Deploy premium apps.

B.

Install apps via the Request Install button.

C.

Install apps via self-service.

D.

Install apps that have not gone through the vetting process.

Which of the following files is used for both search-time and index-time configuration?

A.

inputs.conf

B.

props.conf

C.

macros.conf

D.

savesearch.conf

Li was asked to create a Splunk configuration to monitor syslog files stored on Linux servers at their organization. This configuration will be pushed out to multiple systems via a Splunk app using the on-prem deployment server.

The system administrators have provided Li with a directory listing for the logging locations on three syslog hosts, which are representative of the file structure for all systems collecting this data. An example from each system is shown below:

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

How is it possible to test a script from the Splunk perspective before using it within a scripted input?

A.

splunk run

B.

splunk script

C.

./$SPLUNK_HOME/etc/apps//bin/

D.

splunk cmd

How are HTTP Event Collector (HEC) tokens configured in a managed Splunk Cloud environment?

A.

Any token will be accepted by HEC, the data may just end up in the wrong index.

B.

A token is generated when configuring a HEC input, which should be provided to the application developers.

C.

Obtain a token from the organization's application developers and apply it in Settings > Data Inputs > HTTP Event Collector > New Token.

D.

Open a support case for each new data input and a token will be provided.

Which of the following is not considered a best practice for the deployment server?

A.

Create small, single-purpose deployment apps.

B.

Dedicate a Splunk instance as the deployment server.

C.

Use a Linux server as the deployment server.

D.

Create large, multi-purpose deployment apps.

When creating a new index, which of the following is true about archiving expired events?

A.

Store expired events in private AWS-based storage.

B.

Expired events cannot be archived.

C.

Archive some expired events from an index and discard others.

D.

Store expired events on-prem using your own storage systems.

For the following data, what would be the correct attribute/value oair to use to successfully extract the correct timestamp from all the events?

A.

TIMK_FORMAT = %b %d %H:%M:%S %z

B.

DATETIME CONFIG = %Y-%m-%d %H:%M:%S %2

C.

TIME_FORMAT = %b %d %H:%M:%S

D.

DATETIKE CONFIG = Sb %d %H:%M:%S

Given the following set of files, which of the monitor stanzas below will result in Splunk monitoring all of the files ending with .log?

Files:

    /var/log/www1/secure.log

    /var/log/www1/access.log

    /var/log/www2/logs/secure.log

    /var/log/www2/access.log

    /var/log/www2/access.log.1

A.

[monitor:///var/log/*/*.log]

B.

[monitor:///var/log/.../*.log]

C.

[monitor:///var/log/*/*]

D.

[monitor:///var/log/.../*]