New Year Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtick70

SPLK-2001 Splunk Certified Developer Exam Questions and Answers

Questions 4

Which of these URLs could be used to construct a REST request to search the employee KV store collection to find records with a rating greater than or equal to 2 and less than 5?

Options:

A.

‘http://localhost:8089/servicesNS/nobody/search/storage/collections/data/ employees?query={$and:[{rating:{$gte:2}},{rating:{$lt:5}}]} &output_mode-json’

B.

‘http://localhost:8089/servicesNS/nobody/search/storage/collections/data/ employees?query={$and:[{rating:$gte:2}},{rating:{$lt:5}}]} &output_mode=json’

C.

‘http://localhost:8089/servicesNS/nobody/search/storage/collections/data/ employees?query={%22rating%22:{%22$gte%22:2}},{%22$and%22},{%22rating%22:{% 22$lt%22:5}}} &output_mode=json’

D.

‘http://localhost:8089/servicesNS/nobody/search/storage/collections/data/ employees?query={%22$and%22:[{%22rating%22:{%22$gte%22:2}},{%22rating%22:{% 22$lt%22:5}}]} &output_mode=json’

Buy Now
Questions 5

Which of the following are true of auto-refresh for dashboard panels? (Select all that apply.)

Options:

A.

Applies to inline searches and saved searches.

B.

Enabling auto-refresh for a report requires editing XML.

C.

Post-processing searches are refreshed when their base searches are refreshed.

D.

Each post-processing search using the same base search can have a different refresh time.

Buy Now
Questions 6

When output_mode is not used, which element of a feed is a human readable name for a returned entry?

Options:

A.

Author

B.

Title

C.

Link

D.

Id

Buy Now
Questions 7

Which of the following search commands can be used to perform statistical queries on indexed fields in TSIDX files?

Options:

A.

stats

B.

tstats

C.

tscollect

D.

transaction

Buy Now
Questions 8

Log files related to Splunk REST calls can be found in which indexes? (Select all that apply.)

Options:

A.

_audit

B.

_internal

C.

_thefishbucket

D.

_blocksignature

Buy Now
Questions 9

When using the Splunk REST API, which of the following containers is/are included in the Atom Feed response? (Select all that apply.)

Options:

A.

B.

C.

D.

Buy Now
Questions 10

Which of the following is a security best practice?

Options:

A.

Enable XSS.

B.

Eliminate all escape characters.

C.

Ensure the app passes App Certification.

D.

Ensure components have no Common Vulnerabilities and Exposures (CVE) vulnerabilities.

Buy Now
Questions 11

Which event handler uses the element to support pan and zoom functionality?

Options:

A.

Visualization event handler

B.

Form input event handler

C.

Condition event handler

D.

Search event handler

Buy Now
Questions 12

Which of the following is a way to monitor app performance? (Select all that apply.)

Options:

A.

Using Splunk logs.

B.

Using the search job inspector.

C.

Using the Monitoring Console.

D.

Using the storage/collections/config REST endpoint.

Buy Now
Questions 13

Which of the following ensures that quotation marks surround the value referenced by the token?

Options:

A.

$token_name|s$

B.

“$token_name$”

C.

($token_name$)

D.

\“$token_name$\”

Buy Now
Questions 14

When updating a knowledge object via REST, which of the following are valid values for the sharing Access Control List property?

Options:

A.

App

B.

User

C.

Global

D.

Nobody

Buy Now
Questions 15

After updating a dashboard in myApp, a Splunk admin moves myApp to a different Splunk instance. After logging in to the new instance, the dashboard is not seen. What could have happened? (Select all that apply.)

Options:

A.

The dashboard’s permissions were set to private.

B.

User role permissions are different on the new instance.

C.

The admin deleted the myApp/local directory before packaging.

D.

Changes were placed in $SPLUNK_HOME/etc./apps/search/default/data/ui/nav

Buy Now
Questions 16

How can event logs be collected from a remote Windows machine using a standard Splunk installation and no customization? (Select all that apply.)

Options:

A.

By configuring a WMI input.

B.

By using HTTP event collector.

C.

By using a Windows heavy forwarder.

D.

By using a Windows universal forwarder.

Buy Now
Questions 17

Consider the following Python code snippet used in a Splunk add-on:

if not os.path.exists(full_path): self.doAction(full_path, header) else: f = open (full_path) oldORnew = f.readline().split(“,”) f.close()

An attacker could create a denial of service by causing an error in either the open() or readline()

commands. What type of vulnerability is this?

Options:

A.

CWE-693: Protection Mechanism Failure

B.

CWE-562: Return of Stack Variable Address

C.

CWE-404: Improper Resource Shutdown or Release

D.

CWE-636: Not Failing Securely (‘Failing Open’)

Buy Now
Questions 18

Searching “index=_internal metrics | head 3” from Splunk Web returned the following events:

04-12-2018 18:39:43.514 +0200 INFO Metrics – group=thruput, name=thruput, instantaneous_kbps=0.9651774014563425, instantaneous_eps=5.645638802094809, average_kbps=1.198995639527069, total_k_processed=2676, kb=29.91796875, ev=175, load_average=3.85888671875

04-12-2018 18:39:43.514 +0200 INFO Metrics – group_thruput, name_syslog_output, instantaneous_kbps=0, instantaneous_eps_0, average_kbps=0, total_k_processed=0, kb=0, ev=0

04-12-2018 18:39:43.513 +0200 INFO Metrics – group_thruput, name_index_thruput, instantaneous_kbps=0.9651773703189551, instantaneous_eps=4.87137960922438, average_kbps=1.1985932324065556, total_k_processed=2675, kb=29.91796875, ev=151

When the same search is required from a REST API call, which fields will be given? (Select all that apply.)

Options:

A.

_raw

B.

name

C.

sourcetype

D.

instantaneous_kbps

Buy Now
Questions 19

Which of the following are security best practices for Splunk app development? (Select all that apply.)

Options:

A.

Store passwords in clear text in .conf files.

B.

Implement security in software development lifecycle.

C.

Manually test application with the controls listed in the OWASP Security Testing Guide.

D.

Use a dynamic scanner such as OWASP ZAP to scan web application components for vulnerabilities.

Buy Now
Questions 20

Which of the following endpoints is used to authenticate with the Splunk REST API?

Options:

A.

/services/auth/login

B.

/services/session/login

C.

/services/auth/session/login

D.

/servicesNS/authentication/login

Buy Now
Questions 21

There is a global search named “global_search” defined on a form as shown below:

index-_internal source-*splunkd.log | stats count by component, log_level

Which of the following would be a valid post-processing search? (Select all that apply.)

Options:

A.

| tstats count

B.

sourcetype=mysourcetype

C.

stats sum(count) AS count by log level

D.

search log_level=error | stats sum(count) AS count by component

Buy Now
Exam Code: SPLK-2001
Exam Name: Splunk Certified Developer Exam
Last Update: Dec 28, 2024
Questions: 70
SPLK-2001 pdf

SPLK-2001 PDF

$25.5  $84.99
SPLK-2001 Engine

SPLK-2001 Testing Engine

$30  $99.99
SPLK-2001 PDF + Engine

SPLK-2001 PDF + Testing Engine

$40.5  $134.99