Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free Splunk SPLK-3003 Practice Exam with Questions & Answers | Set: 2

Questions 11

A customer with a large distributed environment has blacklisted a large lookup from the search bundle to decrease the bundle size using distsearch.conf. After this change, when running searches utilizing the lookup that was blacklisted they see error messages in the Splunk Search UI stating the lookup file does not exist.

What can the customer do to resolve the issue?

Options:
A.

The search needs to be modified to ensure the lookup command specifies parameter local=true.

B.

The blacklisted lookup definition stanza needs to be modified to specify setting allow_caching=true.

C.

The search needs to be modified to ensure the lookup command specified parameter

blacklist=false.

D.

The lookup cannot be blacklisted; the change must be reverted.

Splunk SPLK-3003 Premium Access
Questions 12

A customer has the following Splunk instances within their environment: An indexer cluster consisting of a cluster master/master node and five clustered indexers, two search heads (no search head clustering), a deployment server, and a license master. The deployment server and license master are running on their own single-purpose instances. The customer would like to start using the Monitoring Console (MC) to monitor the whole environment.

On the MC instance, which instances will need to be configured as distributed search peers by specifying them via the UI using the settings menu?

Options:
A.

Just the cluster master/master node.

B.

Indexers, search heads, deployment server, license master, cluster master/master node.

C.

Search heads, deployment server, license master, cluster master/master node

D.

Deployment server, license master

Questions 13

Monitoring Console (MC) health check configuration items are stored in which configuration file?

Options:
A.

healthcheck.conf

B.

alert_actions.conf

C.

distsearch.conf

D.

checklist.conf

Questions 14

A customer wants to migrate from using Splunk local accounts to use Active Directory with LDAP for their Splunk user accounts instead. Which configuration files must be modified to connect to an Active Directory LDAP provider?

Options:
A.

authentication.conf, authorize.conf, ldap.conf

B.

authentication.conf, ldap.conf

C.

authentication.conf

D.

authorize.conf, authentication.conf

Questions 15

When monitoring and forwarding events collected from a file containing unstructured textual events, what is the difference in the Splunk2Splunk payload traffic sent between a universal forwarder (UF) and indexer compared to the Splunk2Splunk payload sent between a heavy forwarder (HF) and the indexer layer? (Assume that the file is being monitored locally on the forwarder.)

Options:
A.

The payload format sent from the UF versus the HF is exactly the same. The payload size is identical because they’re both sending 64K chunks.

B.

The UF sends a stream of data containing one set of medata fields to represent the entire stream, whereas

the HF sends individual events, each with their own metadata fields attached, resulting in a lager payload.

C.

The UF will generally send the payload in the same format, but only when the sourcetype is specified in the inputs.conf and EVENT_BREAKER_ENABLE is set to true.

D.

The HF sends a stream of 64K TCP chunks with one set of metadata fields attached to represent the entire stream, whereas the UF sends individual events, each with their own metadata fields attached.

Questions 16

Which statement is true about sub searches?

Options:
A.

Sub searches are faster than other types of searches.

B.

Sub searches work best for joining two large result sets.

C.

Sub searches run at the same time as their outer search.

D.

Sub searches work best for small result sets.

Questions 17

A customer has a Universal Forwarder (UF) with an inputs.conf monitoring its splunkd.log. The data is sent through a heavy forwarder to an indexer. Where does the Index time parsing occur?

Options:
A.

Indexer

B.

Universal forwarder

C.

Search head

D.

Heavy forwarder

Questions 18

The customer has an indexer cluster supporting a wide variety of search needs, including scheduled search, data model acceleration, and summary indexing. Here is an excerpt from the cluster mater’s server.conf:

SPLK-3003 Question 18

Which strategy represents the minimum and least disruptive change necessary to protect the searchability of the indexer cluster in case of indexer failure?

Options:
A.

Enable maintenance mode on the CM to prevent excessive fix-up and bring the failed indexer back online.

B.

Leave replication_factor=2, increase search_factor=2 and enable summary_replication.

C.

Convert the cluster to multi-site and modify the server.conf to be site_replication_factor=2, site_search_factor=2.

D.

Increase replication_factor=3, search_factor=2 to protect the data, and allow there to always be a searchable copy.

Questions 19

Which command is most efficient in finding the pass4SymmKey of an index cluster?

Options:
A.

find / -name server.conf –print | grep pass4SymKey

B.

$SPLUNK_HOME/bin/splunk search | rest splunk_server=local /servicesNS/-/ unhash_app/storage/passwords

C.

$SPLUNK_HOME/bin/splunk btool server list clustering | grep pass4SymmKey

D.

$SPLUNK_HOME/bin/splunk btool clustering list clustering --debug | grep

pass4SymmKey

Questions 20

Consider the scenario where the /var/log directory contains the files secure, messages, cron, audit. A customer has created the following inputs.conf stanzas in the same Splunk app in order to attempt to monitor the files secure and messages:

SPLK-3003 Question 20

Which file(s) will actually be actively monitored?

Options:
A.

/var/log/secure

B.

/var/log/messages

C.

/var/log/messages, /var/log/cron, /var/log/audit, /var/log/secure

D.

/var/log/secure, /var/log/messages