Test your knowledge on Splunk with the 'Splunk Core Certified User Test! Trivia Questions Quiz. ' This quiz assesses your skills in using Splunk commands, configuring time ranges, optimizing dashboards, understanding case sensitivity, and employing Boolean logic for effective data analysis.
Preset - Relative: 30-seconds ago
Relative - Earliest: 30-seconds ago, Latest: Now
Real-time - Earliest: 30-seconds ago, Latest: Now
Advanced - Earliest: 30-seconds ago, Latest: Now
Rate this question:
Any newly created dashboard will include that report.
B. There are no benefits to creating dashboard panels from reports.
C. It makes the dashboard more efficient because it only has to run one search string.
D. Any change to the underlying report will affect every dashboard that utilizes that report.
Rate this question:
Both field names and field values ARE case sensitive.
Field names ARE case sensitive; field values are NOT.
Field values ARE case sensitive; field names ARE NOT.
Both field names and field values ARE NOT case sensitive.
Rate this question:
Returns the least common field values of a given field in the results.
Returns the most common field values of a given field in the results.
Returns the top 10 field values of a given field in the results.
Returns the lowest 10 field values of a given field in the results.
Rate this question:
Or
Not
And
Xor
Rate this question:
Lists all values of a given field.
Lists unique values of a given field.
Returns a count of unique values for a given field.
Returns the number of events that match the search.
Rate this question:
Click All Fields and select the field to add it to Selected Fields.
Click Interesting Fields and select the field to add it to Selected Fields.
Click Selected Fields and select the field to add it to Interesting Fields. This scenario isn't possible because all fields returned from a search always appear in the fields sidebar.
This scenario isn't possible because all fields returned from a search always appear in the fields sidebar.
Rate this question:
#
%
A
A#
Rate this question:
Time
Fast mode
Sourcetype
Selected fields
Rate this question:
Count stats vendor_action
Count stats (vendor_action)
Stats count (vendor_action)
Stats vendor_action (count)
Rate this question:
Host
Index
Source
Sourcetype
Rate this question:
You can modify the search string in the panel, and you can change and configure the visualization.
You can modify the search string in the panel, but you cannot change and configure the visualization.
You cannot modify the search string in the panel, but you can change and configure the visualization.
You cannot modify the search string in the panel, and you cannot change and configure the visualization.
Rate this question:
You can modify the search string in the panel, and you can change and configure the visualization.
You can modify the search string in the panel, but you cannot change and configure the visualization.
You cannot modify the search string in the panel, but you can change and configure the visualization.
You cannot modify the search string in the panel, and you cannot change and configure the visualization.
Rate this question:
Include all formatting commands before any search terms
Include at least one function as this is a search requirement
Include the search terms at the beginning of the search string
Avoid using formatting clauses as they add too much overhead
Rate this question:
Any search can be saved as a report
Only searches that generate visualizations
Only searches containing a transforming command
Only searches that generate statistics or visualizations
Rate this question:
Dashboards
Metadata only
Non-interesting fields
Field descriptions
Rate this question:
Action+purchase
Action=purchase
Action | purchase
Action equal purchase
Rate this question:
A field that appears in any event
A field that appears in every event
A field that appears in the top 10 events
A field that appears in at least 20% of the events
Rate this question:
Parentheses
@ or # symbols
Quotation marks
Relational operators such as =, <, or >
Rate this question:
CSV, JSON, PDF
CSV, XML JSON
Raw Events, XML, JSON
Raw Events, CSV, XML, JSON
Rate this question:
Count, sum, add
Count, sum, less
Sum, avg, values
Sum, values, table
Rate this question:
No events will be returned.
Splunk will prompt you to specify an index.
All non-indexed events to which the user has access will be returned.
Events from every index searched by default to which the user has access will be returned.
Rate this question:
Index=security Error Fail
Index=security error OR fail
Index=security "error failure"
Index=security NOT error NOT fail
Rate this question:
Saving the item to a report
Adding the item to the search.
Adding the item to a dashboard
Saving the search to a JSON file.
Rate this question:
Dedup
Rename
Sort -
Fields +
Rate this question:
App, Owner, Severity, and Type
App, Owner, Priority, and Status
App, Dashboard, Severity, and Type
App, Time Window, Type, and Severity
Rate this question:
Line charts are optimal for single and multiple series.
Line charts are optimal for single series when using Fast mode.
Line charts are optimal for multiple series with 3 or more columns.
Line charts are optimal for multiseries searches with at least 2 or more columns.
Rate this question:
An app
JSON
A role
An enhanced solution
Rate this question:
User
Source
Location
SourceIp
Rate this question:
Save the search as a report and use it in multiple dashboards as needed
Save the search as a dashboard panel for each dashboard that needs the data
Save the search as a scheduled alert and use it in multiple dashboards as needed
Export the results of the search to an XML file and use the file as the basis of the dashboards
Rate this question:
The lookup must be configured to run automatically.
The contents of the lookup file must be copied and pasted into the search bar.
The lookup file must be uploaded to Splunk and a lookup definition must be created.
The lookup file must be uploaded to the etc/apps/lookups folder for automatic ingestion.
Rate this question:
Reports are best named using many numbers so they can be more easily sorted.
Use a consistent naming convention so they are easily separated by characteristics such as group and object.
Name reports as uniquely as possible with no overlap to differentiate them from one another.
Any naming convention is fine as long as you keep an external spreadsheet to keep track.
Rate this question:
Indexer
Forwarder
Search head
Deployment server
Rate this question:
Look back 3 days ago and prior
Look back 72 hours up to one day ago
Look back 72 hours, up to the end of today
Look back from 3 days ago up to the beginning of today
Rate this question:
Search & Reporting is the only app that can be set as the default application.
Full names can only be changed by accounts with a Power User or Admin role.
Time zones are automatically updated based on the setting of the computer accessing Splunk.
Full name, time zone, and default app can be defined by clicking the login name in the Splunk bar.
Rate this question:
Limit, count
Limit, showpercent
Limits, countfield
Showperc, countfield
Rate this question:
To group the results by one or more fields.
To compute numerical statistics on each field.
To specify how the values in a list are delimited.
To partition the input data based on the split-by fields.
Rate this question:
All events that either have a host of www3 or a status of 503.
B. All events with a host of www3 that also have a status of 503
C. We need more information: we cannot tell without knowing the time range
D. We need more information a search cannot be run without specifying an index
Rate this question:
(index=netfw failure) AND index=netops warn OR critical
(index=netfw failure) OR (index=netops (warn OR critical))
(index=netfw failure) AND (index=netops (warn OR critical))
(index=netfw failure) OR index=netops OR (warn OR critical)
Rate this question:
Index=security sourcetype=access_* status=200 stats | count by price
Index=security sourcetype=access_* status=200 | stats count by price
Index=security sourcetype=access_* status=200 | stats count | by price
Index=security sourcetype=access_* | status=200 | stats count by price
Rate this question:
Automatically correlates related fields
Converts field values into numerical values
Calculates statistics on data that matches the search criteria
Analyzes numerical fields for their ability to predict another discrete field
Rate this question:
To differentiate between structured and unstructured events in the data
To sort the events returned by the search command in chronological order
To zoom in and zoom out. although this does not change the scale of the chart
To show peaks and/or valleys in the timeline, which can indicate spikes in activity or downtime
Rate this question:
Alerts are based on searches that are either run on a scheduled interval or in real-time.
Alerts are based on searches and when triggered will only send an email notification.
Alerts are based on searches and require cron to run on scheduled interval.
Alerts are based on searches that are run exclusively as real-time.
Rate this question:
Export the results to CSV format
Add the Job results to a dashboard
Schedule the Job to re-run in 10 minutes
Change Job Lifetime from 10 minutes to 7 days.
Rate this question:
| lookup products.csv
Inputlookup products.csv
I inputlookup products.csv
| lookup definition products.csv
Rate this question:
Dc(field)
Count(field)
Count-by(field)
Distinct-count(field)
Rate this question:
Time summary
Time range picker
Search time picker
Data source time statistics
Rate this question:
$SPLUNK_HOME/bin/scripts
$SPLUNK_HOME/etc/scripts
$SPLUNK_HOME/bin/etc/scripts
$SPLUNK_HOME/etc/scripts/bin
Rate this question:
Quiz Review Timeline (Updated): Jan 29, 2025 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.