This function of the stats command allows you to return the sample standard deviation of a field.
What is the correct syntax to count the number of events containing a vendor_action field?
In automatic lookup definitions, the _____ fields are those that are not in the event data.
When running searches command modifiers in the search string are displayed in what color?
By default, which of the following fields would be listed in the fields sidebar under interesting Fields?
Keywords are highlighted when you mouse over search results and you can click this search result to (Choose three.):
When using the top command in the following search, which of the following will be true about the results?
index="main" sourcetype="access_*" action="purchase" | top 3 statusCode by user showperc=f countfield=status_code_count
Search Assistant is enabled by default in the SPL editor with compact settings.
What result will you get with following search index=test sourcetype="The_Questionnaire_P*" ?
When looking at a dashboard panel that is based on a report, which of the following is true?
Data summary button just below the search bar gives you the following (Choose three.):
Which of the following searches will show the number of categoryld used by each host?
Which all time unit abbreviations can you include in Advanced time range picker? (Choose seven.)
Will the queries following below get the same result?
1. index=log sourcetype=error_log status !=100
2. index=log sourcetype=error_log NOT status =100
According to Splunk best practices, which placement of the wildcard results in the most efficient search?
Splunk internal fields contains general information about events and starts from underscore i.e. _ .
It is no possible for a single instance of Splunk to manage the input, parsing and indexing of machine data.
A field exists in search results, but isn’t being displayed in the fields sidebar. How can it be added to the fields sidebar?
What happens when a field is added to the Selected Fields list in the fields sidebar'?
Which of the following is the recommended way to create multiple dashboards displaying data from the same search?
Which of the following is the most efficient filter for running searches in Splunk?
Which Boolean operator is implied between search terms, unless otherwise specified?
How many minutes, by default, is the time to live (ttl) for an ad-hoc search job?
Which stats command function provides a count of how many unique values exist for a given field in the result set?
Splunk Components:
Which of the following are responsible for reducing search results?
When looking at a statistics table, what is one way to drill down to see the underlying events?
Which of the following searches would return events with failure in index netfw or warn or critical in index netops?
Which search will return only events containing the word “error” and display the results as a table that includes
the fields named action, src, and dest?