Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Splunk SPLK-2002 - Splunk Enterprise Certified Architect

Page: 4 / 5
Total 160 questions

Which of the following should be included in a deployment plan?

A.

Business continuity and disaster recovery plans.

B.

Current logging details and data source inventory.

C.

Current and future topology diagrams of the IT environment.

D.

A comprehensive list of stakeholders, either direct or indirect.

Which of the following statements describe a Search Head Cluster (SHC) captain? (Select all that apply.)

A.

Is the job scheduler for the entire SHC.

B.

Manages alert action suppressions (throttling).

C.

Synchronizes the member list with the KV store primary.

D.

Replicates the SHC's knowledge bundle to the search peers.

What is the minimum reference server specification for a Splunk indexer?

A.

12 CPU cores, 12GB RAM, 800 IOPS

B.

16 CPU cores, 16GB RAM, 800 IOPS

C.

24 CPU cores, 16GB RAM, 1200 IOPS

D.

28 CPU cores, 32GB RAM, 1200 IOPS

A Splunk user successfully extracted an ip address into a field called src_ip. Their colleague cannot see that field in their search results with events known to have src_ip. Which of the following may explain the problem? (Select all that apply.)

A.

The field was extracted as a private knowledge object.

B.

The events are tagged as communicate, but are missing the network tag.

C.

The Typing Queue, which does regular expression replacements, is blocked.

D.

The colleague did not explicitly use the field in the search and the search was set to Fast Mode.

When should multiple search pipelines be enabled?

A.

Only if disk IOPS is at 800 or better.

B.

Only if there are fewer than twelve concurrent users.

C.

Only if running Splunk Enterprise version 6.6 or later.

D.

Only if CPU and memory resources are significantly under-utilized.

Which of the following is a best practice to maximize indexing performance?

A.

Use automatic source typing.

B.

Use the Splunk default settings.

C.

Not use pre-trained source types.

D.

Minimize configuration generality.

Which of the following security options must be explicitly configured (i.e. which options are not enabled by default)?

A.

Data encryption between Splunk Web and splunkd.

B.

Certificate authentication between forwarders and indexers.

C.

Certificate authentication between Splunk Web and search head.

D.

Data encryption for distributed search between search heads and indexers.

Which of the following can a Splunk diag contain?

A.

Search history, Splunk users and their roles, running processes, indexed data

B.

Server specs, current open connections, internal Splunk log files, index listings

C.

KV store listings, internal Splunk log files, search peer bundles listings, indexed data

D.

Splunk platform configuration details, Splunk users and their roles, current open connections, index listings

When preparing to ingest a new data source, which of the following is optional in the data source assessment?

A.

Data format

B.

Data location

C.

Data volume

D.

Data retention

When implementing KV Store Collections in a search head cluster, which of the following considerations is true?

A.

The KV Store Primary coordinates with the search head cluster captain when collection content changes.

B.

The search head cluster captain is also the KV Store Primary when collection content changes.

C.

The KV Store Collection will not allow for changes to content if there are more than 50 search heads in the cluster.

D.

Each search head in the cluster independently updates its KV store collection when collection content changes.