Labour Day Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

Splunk Core Certified Consultant Question and Answers

Splunk Core Certified Consultant

Last Update May 8, 2024
Total Questions : 85

We are offering FREE SPLK-3003 Splunk exam questions. All you do is to just go and sign up. Give your details, prepare SPLK-3003 free exam questions and then go for complete pool of Splunk Core Certified Consultant test questions that will help you more.

SPLK-3003 pdf

SPLK-3003 PDF

$69.65  $199
SPLK-3003 Engine

SPLK-3003 Testing Engine

$78.75  $225
SPLK-3003 PDF + Engine

SPLK-3003 PDF + Testing Engine

$87.15  $249
Questions 1

When using SAML, where does user authentication occur?

Options:

A.  

Splunk generates a SAML assertion that authenticates the user.

B.  

The Service Provider (SP) decodes the SAML request and authenticates the user.

C.  

The Identity Provider (IDP) decodes the SAML request and authenticates the user.

D.  

The Service Provider (SP) generates a SAML assertion that authenticates the user.

Discussion 0
Questions 2

A customer has a multisite cluster (two sites, each site in its own data center) and users experiencing a slow response when searches are run on search heads located in either site. The Search Job Inspector shows the delay is being caused by search heads on either site waiting for results to be returned by indexers on the opposing site. The network team has confirmed that there is limited bandwidth available between the two data centers, which are in different geographic locations.

Which of the following would be the least expensive and easiest way to improve search performance?

Options:

A.  

Configure site_search_factor to ensure a searchable copy exists in the local site for each search head.

B.  

Move all indexers and search heads in one of the data centers into the same site.

C.  

Install a network pipe with more bandwidth between the two data centers.

D.  

Set the site setting on each indexer in the server.conf clustering stanza to be the same for all indexers regardless of site.

Discussion 0
Questions 3

A customer with a large distributed environment has blacklisted a large lookup from the search bundle to decrease the bundle size using distsearch.conf. After this change, when running searches utilizing the lookup that was blacklisted they see error messages in the Splunk Search UI stating the lookup file does not exist.

What can the customer do to resolve the issue?

Options:

A.  

The search needs to be modified to ensure the lookup command specifies parameter local=true.

B.  

The blacklisted lookup definition stanza needs to be modified to specify setting allow_caching=true.

C.  

The search needs to be modified to ensure the lookup command specified parameter

blacklist=false.

D.  

The lookup cannot be blacklisted; the change must be reverted.

Discussion 0
Questions 4

When monitoring and forwarding events collected from a file containing unstructured textual events, what is the difference in the Splunk2Splunk payload traffic sent between a universal forwarder (UF) and indexer compared to the Splunk2Splunk payload sent between a heavy forwarder (HF) and the indexer layer? (Assume that the file is being monitored locally on the forwarder.)

Options:

A.  

The payload format sent from the UF versus the HF is exactly the same. The payload size is identical because they’re both sending 64K chunks.

B.  

The UF sends a stream of data containing one set of medata fields to represent the entire stream, whereas

the HF sends individual events, each with their own metadata fields attached, resulting in a lager payload.

C.  

The UF will generally send the payload in the same format, but only when the sourcetype is specified in the inputs.conf and EVENT_BREAKER_ENABLE is set to true.

D.  

The HF sends a stream of 64K TCP chunks with one set of metadata fields attached to represent the entire stream, whereas the UF sends individual events, each with their own metadata fields attached.

Discussion 0
Questions 5

A customer is using both internal Splunk authentication and LDAP for user management.

If a username exists in both $SPLUNK_HOME/etc/passwd and LDAP, which of the following statements is accurate?

Options:

A.  

The internal Splunk authentication will take precedence.

B.  

Authentication will only succeed if the password is the same in both systems.

C.  

The LDAP user account will take precedence.

D.  

Splunk will error as it does not support overlapping usernames

Discussion 0
Questions 6

The customer has an indexer cluster supporting a wide variety of search needs, including scheduled search, data model acceleration, and summary indexing. Here is an excerpt from the cluster mater’s server.conf:

Which strategy represents the minimum and least disruptive change necessary to protect the searchability of the indexer cluster in case of indexer failure?

Options:

A.  

Enable maintenance mode on the CM to prevent excessive fix-up and bring the failed indexer back online.

B.  

Leave replication_factor=2, increase search_factor=2 and enable summary_replication.

C.  

Convert the cluster to multi-site and modify the server.conf to be site_replication_factor=2, site_search_factor=2.

D.  

Increase replication_factor=3, search_factor=2 to protect the data, and allow there to always be a searchable copy.

Discussion 0
Questions 7

A customer is using regex to whitelist access logs and secure logs from a web server, but only the access logs are being ingested. Which troubleshooting resource would provide insight into why the secure logs are not being ingested?

Options:

A.  

list monitor

B.  

oneshot

C.  

btprobe

D.  

tailingprocessor

Discussion 0
Questions 8

A customer would like to remove the output_file capability from users with the default user role to stop them from filling up the disk on the search head with lookup files. What is the best way to remove this capability from users?

Options:

A.  

Create a new role without the output_file capability that inherits the default user role and assign it to the users.

B.  

Create a new role with the output_file capability that inherits the default user role and assign it to the users.

C.  

Edit the default user role and remove the output_file capability.

D.  

Clone the default user role, remove the output_file capability, and assign it to the users.

Discussion 0
Questions 9

A customer has been using Splunk for one year, utilizing a single/all-in-one instance. This single Splunk server is now struggling to cope with the daily ingest rate. Also, Splunk has become a vital system in day-to-day operations making high availability a consideration for the Splunk service. The customer is unsure how to design the new environment topology in order to provide this.

Which resource would help the customer gather the requirements for their new architecture?

Options:

A.  

Direct the customer to the docs.splunk.com and tell them that all the information to help them select the right design is documented there.

B.  

Ask the customer to engage with the sales team immediately as they probably need a larger license.

C.  

Refer the customer to answers.splunk.com as someone else has probably already designed a system that meets their requirements.

D.  

Refer the customer to the Splunk Validated Architectures document in order to guide them through which approved architectures could meet their requirements.

Discussion 0
Questions 10

When can the Search Job Inspector be used to debug searches?

Options:

A.  

If the search has not expired.

B.  

If the search is currently running.

C.  

If the search has been queued.

D.  

If the search has expired.

Discussion 0
Questions 11

The customer wants to migrate their current Splunk Index cluster to new hardware to improve indexing and search performance. What is the correct process and procedure for this task?

Options:

A.  

1. Install new indexers.

2.Configure indexers into the cluster as peers; ensure they receive the same configuration via the deployment server.

3.Decommission old peers one at a time.

4.Remove old peers from the CM’s list.

5.Update forwarders to forward to the new peers.

B.  

1. Install new indexers.

2.Configure indexers into the cluster as peers; ensure they receive the cluster bundle and the same configuration as original peers.

3.Decommission old peers one at a time.

4.Remove old peers from the CM’s list.

5.Update forwarders to forward to the new peers.

C.  

1. Install new indexers.

2.Configure indexers into the cluster as peers; ensure they receive the same configuration via the deployment server.

3.Update forwarders to forward to the new peers.

4.Decommission old peers on at a time.

5.Restart the cluster master (CM).

D.  

1. Install new indexers.

2.Configure indexers into the cluster as peers; ensure they receive the cluster bundle and the same configuration as original peers.

3.Update forwarders to forward to the new peers.

4.Decommission old peers one at a time.

5.Remove old peers from the CM’s list.

Discussion 0
Questions 12

A customer has a Universal Forwarder (UF) with an inputs.conf monitoring its splunkd.log. The data is sent through a heavy forwarder to an indexer. Where does the Index time parsing occur?

Options:

A.  

Indexer

B.  

Universal forwarder

C.  

Search head

D.  

Heavy forwarder

Discussion 0