Last Updated On : 20-May-2026


Splunk Core Certified Power User Exam - SPLK-1002 Exam Dumps

306 Questions



Turn your preparation into perfection. Our Splunk SPLK-1002 exam dumps are the key to unlocking your exam success. Splunk Core Certified Power User Exam practice test helps you understand the structure and question types of the actual exam. This reduces surprises on exam day and boosts your confidence.

Passing is no accident. With our expertly crafted Splunk SPLK-1002 exam questions, you’ll be fully prepared to succeed.
undraw-questions

Don't Just Think You're Ready.

Challenge Yourself with the World's Most Realistic SPLK-1002 Test.


Ready to Prove It?

Topic 2: Questions Set 2

Which of the following options should a user add to a search to limit transactions to a five minute time window?



A. duration=5m


B. bin=5m


C. earliest=-5m


D. maxspan=5m





D.
  maxspan=5m

Explanation:

D. maxspan=5m – Correct.
When using the transaction command in Splunk, maxspan specifies the maximum total time span allowed from the first event to the last event within a single transaction. Setting maxspan=5m ensures that all events grouped into a transaction must occur within a five‑minute window. If the time difference between the earliest and latest event exceeds five minutes, a new transaction is started. This is the correct option to limit the overall duration of a transaction.

Why other options are incorrect

A. duration=5m – Incorrect.
duration is not a valid argument of the transaction command. After a transaction is created, a field named duration is automatically calculated (showing the time span between the first and last event), but you cannot set duration as a constraint before the transaction runs.

B. bin=5m – Incorrect.
bin is not an argument for the transaction command. The bin command (or bin argument in timechart or bucket) is used for grouping timestamps into discrete time buckets, but it does not apply to transaction.

C. earliest=-5m – Incorrect.
earliest=-5m is a time modifier used to define the global search window (e.g., restrict the search to events from the last five minutes). It does not control how transaction groups events. The transaction command will still group events within that 5‑minute search window, but earliest does not limit the span between events inside a single transaction.

Reference

Splunk Documentation – transaction command – maxspan
"maxspan= – Specifies the maximum time span for a transaction. If the time between the earliest and latest event exceeds maxspan, a new transaction is created."

Given the event below, how can the value in the Zip_Code field be used to retrieve the local weather from an external resource? 25/Oct/2023:20:29:43 , 151.131.173.143 , V2.003 , Zip_Code: 75890 , DataCenter: DC1



A. Create a POST workflow action.


B. Create a GET workflow action.


C. Create a PUT workflow action.


D. Create a Search workflow action.





B.
  Create a GET workflow action.

Explanation:

B. Create a GET workflow action. – Correct.
A GET workflow action in Splunk allows you to link to an external web resource using an HTTP GET request, and it can substitute field values (such as Zip_Code) directly into the URI. To retrieve local weather from an external resource (e.g., a weather API or website), you would construct a URI like https://weather.com/local?zip=$Zip_Code$. When a user clicks the workflow action link from an event, Splunk replaces $Zip_Code$ with the actual value (e.g., 75890) and opens the resulting URL in the same or a new window. GET workflow actions are ideal for retrieving information from external systems without sending data to them, which is exactly what fetching weather requires.

Why other options are incorrect

A. Create a POST workflow action. – Incorrect.
A POST workflow action sends an HTTP POST request, typically used to submit data to an external system (e.g., creating a ticket, submitting a form). For retrieving weather data, a simple GET request is sufficient and more appropriate. POST is unnecessary, often requires additional parameters, and may not be supported by weather APIs for simple lookups.

C. Create a PUT workflow action. – Incorrect.
Splunk workflow actions do not include a PUT method. Workflow actions support only GET and POST. PUT is an HTTP method used for updating resources on a server and is not available as a workflow action type in Splunk.

D. Create a Search workflow action. – Incorrect.
There is no "Search workflow action" type in Splunk. Workflow actions are either GET or POST. A "search" might refer to a secondary Splunk search, but that is not a workflow action type. This option is a distractor with no valid match to Splunk's workflow action categories.

Reference

Splunk Documentation – About workflow actions
"A GET workflow action opens a webpage or API endpoint with field values embedded in the URL. Use GET actions to retrieve information from external resources."

When should the delimiter method be used in the Field Extractor?



A. When the events do not have the correct permissions set.


B. When the events are separated by a consistent character or set of characters.


C. When the events need a regular expression to define the matching pattern.


D. When the events need to be calculated using special characters.





B.
  When the events are separated by a consistent character or set of characters.

Explanation

B. When the events are separated by a consistent character or set of characters. – Correct.
The Field Extractor in Splunk (FX) provides two primary methods for extracting fields: delimiter-based extraction and regular expression (regex) extraction. The delimiter method should be used when events are structured with a consistent separator character or sequence, such as commas (CSV), spaces, pipes (|), tabs, or semicolons. For example, an event like 192.168.1.1 - admin GET /index.html could use space as a delimiter. The delimiter method is faster, easier to configure, and less error-prone than regex when data follows a predictable columnar format. Splunk automatically detects potential delimiters and allows users to label the resulting columns as fields.

Why other options are incorrect

A. When the events do not have the correct permissions set. – Incorrect.
Permissions (such as read/write access to knowledge objects) have no relationship to choosing a field extraction method. The delimiter vs. regex choice is purely about data structure, not security or permissions. If permissions are incorrect, the field extractor may not save the extraction, but that does not influence which method to use.

C. When the events need a regular expression to define the matching pattern. – Incorrect.
This describes the regex method, not the delimiter method. Regex is used when data is not consistently delimited, has variable fields, or requires complex pattern matching. The delimiter method explicitly avoids regex by using simple character separators.

D. When the events need to be calculated using special characters. – Incorrect.
Calculated fields (using eval expressions) are unrelated to the field extractor. Special characters may appear in delimiters (e.g., pipe |), but the need for calculation never dictates which extraction method to use. This option confuses field extraction with calculated fields.

Reference
Splunk Documentation – Build field extractions with the Field Extractor
"Use the delimiter method when your events are structured with a consistent separator, such as commas, spaces, pipes, or tabs."

When using | timechart by host, which field is represented in the x-axis?



A. date


B. host


C. time


D. _time





D.
  _time

Explanation:

D. _time – Correct.
The timechart command in Splunk creates a time-based chart where the x-axis always represents time. Specifically, the x-axis is populated by the _time field, which is Splunk's internal timestamp for each event. When you use | timechart by host, Splunk bins events into time buckets (e.g., per minute, hour, or day) and then plots a value (default is count) against those time buckets. The _time field controls the position of data points along the x-axis. Even though the by host clause adds a series split, the x-axis remains time. The _time field is automatically used by timechart; you do not need to specify it explicitly.

Why other options are incorrect

A. date – Incorrect.
date is not a standard field in the timechart output. Splunk has date-related fields like date_wday, date_month, or date_hour, but these are not the x-axis. The x-axis uses _time, which is a full timestamp, not just a date component.

B. host – Incorrect.
host is used in the by host clause to split the series (generate separate lines or bars per host). host appears in the legend or series grouping, not on the x-axis. The x-axis remains time, not host.

C. time – Incorrect.
While time might seem correct, Splunk specifically uses the field name _time (with an underscore) for event timestamps. There is no standard field named time in Splunk's default data model. Using just time could exist as a custom field, but timechart always uses _time as the x-axis source.

Reference

Splunk Documentation – timechart command
"The timechart command creates a time series chart. The x-axis is always the _time field."
"The by clause splits the data into separate series, but the x-axis remains _time for all series."

What is a benefit of installing the Splunk Common Information Model (CIM) add-on?



A. It permits users to create workflow actions to align with industry standards.


B. It provides users with a standardized set of field names and tags to normalize data.


C. It allows users to create 3-D models of their data and export these visualizations.


D. It enables users to itemize their events based on the results of the Search Job Inspector.





B.
  It provides users with a standardized set of field names and tags to normalize data.

Explanation:

B. It provides users with a standardized set of field names and tags to normalize data. – Correct.
The primary benefit of installing the Splunk Common Information Model (CIM) Add-on is to provide a standardized, consistent set of field names and tags across different data sources. The CIM defines common field names (e.g., src, dest, user, action) and tags for various data domains such as Authentication, Network Traffic, Web, Email, and Endpoint. By normal field mapping (using field aliases, calculated fields, or eval expressions), data from different vendors and sourcetypes can be made CIM-compliant. This enables Splunk apps like Enterprise Security, IT Service Intelligence (ITSI), and the Splunk App for PCI Compliance to work correctly, and allows users to run CIM-aware searches, reports, and dashboards without worrying about vendor-specific field names.

Why other options are incorrect

A. It permits users to create workflow actions to align with industry standards. – Incorrect.
Workflow actions are independent knowledge objects not directly tied to the CIM Add-on. The CIM does not provide or enable workflow actions. Workflow actions are created manually by users and have no inherent alignment with industry standards via the CIM.

C. It allows users to create 3-D models of their data and export these visualizations. – Incorrect.
This is entirely false. The CIM has nothing to do with 3-D models or 3-D visualizations. Splunk does not support 3-D data modeling. This distracts with the word "model" but refers to a completely different concept.

D. It enables users to itemize their events based on the results of the Search Job Inspector. – Incorrect.
The Search Job Inspector provides diagnostic information about a search job, such as execution time, search components, and intermediate result counts. The CIM does not interact with or enhance the Search Job Inspector in any way. Itemizing events is not a feature of the CIM.

Reference

Splunk Documentation – Common Information Model Add-on
"The Splunk Common Information Model (CIM) is a shared semantic model focused on the normalization of data from different sources and vendors. The CIM is implemented as an add-on that provides a standardized set of field names and tags."

What is needed to define a calculated field?



A. Eval expression


B. Data model


C. Event type


D. Regular expression





A.
  Eval expression

Explanation:

A. Eval expression – Correct.
A calculated field in Splunk is a field that derives its value from one or more existing fields using an eval expression. When you define a calculated field, you write an eval expression (similar to the eval command syntax) that tells Splunk how to compute the new field's value. For example, you might define a calculated field named total_bytes with the expression bytes_in + bytes_out, or a field named status_code_class with if(status < 300, "success", "error"). The calculated field is then evaluated at search time whenever the source fields are present. The eval expression is the mandatory, defining component of a calculated field.

Why other options are incorrect

B. Data model – Incorrect.
A data model is a hierarchical mapping of knowledge objects that defines datasets for Pivot and acceleration. While calculated fields can be added to data models (as data model fields), a data model is not required to define a calculated field. Calculated fields can exist independently at the app or user level without any data model.

C. Event type – Incorrect.
An event type is a user-defined classification that tags events based on a search string (e.g., web_404 for status=404). Event types are unrelated to calculated fields. You do not need an event type to define a calculated field, and event types do not provide eval-based field computation.

D. Regular expression – Incorrect.
A regular expression (regex) is used in field extractions to parse unstructured data into fields. Calculated fields do not use regex; they use eval expressions (which support arithmetic, conditional logic, string functions, and type conversion). Regex is not required for or compatible with calculated field definitions.

Reference

Splunk Documentation – About calculated fields
"A calculated field is a field that is created by an eval expression at search time. The eval expression can be a mathematical calculation, string concatenation, or conditional logic."

Which of the following statements describes POST workflow actions?



A. POST workflow actions are always encrypted.


B. POST workflow actions cannot use field values in their URI.


C. POST workflow actions cannot be created on custom sourcetypes.


D. POST workflow actions can open a web page in either the same window or a new .





D.
  POST workflow actions can open a web page in either the same window or a new .

Explanation:

D. POST workflow actions can open a web page in either the same window or a new window. – Correct.
Workflow actions in Splunk are knowledge objects that enable interaction with external systems or URLs based on event field values. A POST workflow action sends an HTTP POST request to a specified URI. Like GET workflow actions, POST workflow actions allow you to define the link target as either the same window or a new window (via the "Open link in" configuration option). This flexibility allows users to either navigate away from Splunk or open external tools without losing their Splunk session. POST actions are commonly used to send data to ticketing systems, lookup services, or APIs where data must be submitted rather than simply requested.

Why other options are incorrect

A. POST workflow actions are always encrypted. – Incorrect.
POST workflow actions are not automatically encrypted. The encryption (HTTPS vs. HTTP) depends entirely on the URI scheme configured. If the URI uses https://, the data is encrypted; if it uses http://, it is not. Splunk does not enforce encryption on workflow actions. Administrators should manually ensure they use HTTPS when sensitive data is transmitted.

B. POST workflow actions cannot use field values in their URI. – Incorrect.
POST workflow actions can use field values in both the URI (as part of the endpoint path or query string) and in the POST request body. Splunk allows token substitution using $fieldname$ syntax. For example, a URI could be https://api.ticket.com/create/$ticket_id$. The statement is false because field values are a core feature of workflow actions.

C. POST workflow actions cannot be created on custom sourcetypes. – Incorrect.
Workflow actions can be created on any sourcetype, including custom ones. Sourcetype is a key filter for when a workflow action should appear in the event menu. There is no restriction limiting POST workflow actions to only built-in sourcetypes. Custom sourcetypes are fully supported.

Reference

Splunk Documentation – About workflow actions

"A workflow action can open a link in the same window or a new window."

"For a POST workflow action, you must specify a URI. You can also specify the POST arguments and whether to open the link in the same or a new window."

The Common Information Model (CIM) Add-on contains a collection of what preconfigured knowledge objects?



A. Reports


B. Data models


C. Field extractions


D. Dashboards





B.
  Data models

Explanation:

B. Data models – Correct.
The Splunk Common Information Model (CIM) Add-on is a collection of preconfigured data models that define a shared semantic model for normalizing data from different sources and vendors. Each data model represents a specific domain of interest (such as Authentication, Network Traffic, Endpoint, or Web) and consists of a set of standard field names and tags. These data models are implemented as JSON files located in $SPLUNK_HOME/etc/apps/Splunk_SA_CIM/default/data/models. Administrators can apply these data models at search time to normalize data, accelerate searches, and create reports and dashboards via Pivot. The CIM Add-on is packaged with Splunk Enterprise Security and the Splunk App for PCI Compliance.

Why other options are incorrect

A. Reports – Incorrect.
While the CIM Add-on does contain some preconfigured reports (e.g., for audittrail, splunkd, and splunk_web_services sourcetypes), reports are not the primary or defining collection of knowledge objects in the CIM Add-on. The add-on is fundamentally built around data models; reports are secondary and not the focus of the CIM's purpose.

C. Field extractions – Incorrect.
Field extractions define how to parse field values from raw event data using regex or delimiters. The CIM Add-on may include some field extractions, but they are not the main collection of preconfigured knowledge objects that characterize the add-on. The primary purpose of the CIM is to provide data models for normalization, not extraction rules.

D. Dashboards – Incorrect.
The CIM Add-on may include some dashboards or views, but dashboards are not the core preconfigured knowledge objects that define the add-on. Dashboards that display CIM-compliant data are typically found in other Splunk applications like Enterprise Security, not within the CIM Add-on itself.

Reference

Splunk Docs – Overview of the Splunk Common Information Model – "The CIM is implemented as an add-on that contains a collection of preconfigured data models"

Splunk Docs – Understand and use the Common Information Model Add-on – "The Common Information Model is delivered as an add-on that implements the CIM tables as data models"

Marty has multiple data sources that contain fields with IP Address values. What knowledge object should he use to normalize the fields so his data is CIM compliant?



A. Event type


B. Field alias


C. Field extraction


D. Tag





B.
  Field alias

Explanation:

B. Field alias – Correct.
A field alias allows you to create an alternative name for an existing field without modifying the original data. When multiple data sources contain IP address values stored under different field names (e.g., src_ip, client_ip, remote_addr), Marty can create field aliases that map all of these to a common field name expected by the Splunk Common Information Model (CIM), such as src. This normalizes the data so that CIM-compliant apps (like the Splunk Security Essentials or Enterprise Security) can recognize and use the IP address fields consistently across all data sources. Field aliases are the standard, lightweight method for CIM field normalization without duplicating data or creating complex extractions.

Why other options are incorrect

A. Event type – Incorrect.
Event types categorize events based on a search string and assign a name (e.g., web_server_error) to a set of events. They do not rename or normalize fields. Event types cannot change field names or make multiple different field names appear as a common field. They are used for tagging and classification, not field normalization.

C. Field extraction – Incorrect.
Field extractions define how to extract field values from raw event data using regex or delimiters. While extractions can create new fields, they are not the correct tool for normalizing existing fields to a CIM-compliant name. Using field extractions to rename fields would require re-extracting values into new fields, which is inefficient and redundant compared to field aliases. Field extractions are better suited for parsing unstructured data, not aliasing existing structured fields.

D. Tag – Incorrect.
Tags are keyword labels assigned to field-value pairs (e.g., tag web to dest_port=80). Tags help with searchability and categorization but do not change or unify field names. You cannot use a tag to make client_ip appear as src for CIM compliance. Tags operate on values, not field names.

Reference

Splunk Documentation – Use field aliases to normalize fields for CIM compliance

"If you have multiple data sources that use different field names for the same type of data, you can create a field alias to map all of those field names to a common field name."

"Field aliases are a way to standardize field names to fit the Common Information Model without changing the original data."

Which of the following searches can be saved as an event type?



A. index=server_516 sourcetype=BETA_201 code=S51 [ | inputlookup servercode.csv append=t ]


B. index=server_516 sourcetype=BETA_201 code=551


C. index=server_516 sourcetype=BETA_201 code=551 | stats count by code


D. index=server_516 sourcetype=BETA_201 code=551 | where code > 200





B.
  index=server_516 sourcetype=BETA_201 code=551

Explanation:

B. index=server_516 sourcetype=BETA_201 code=551 – Correct.
An event type in Splunk is a user-defined classification that assigns a name to a set of events based on a search string. Event types are designed to categorize events using simple, non-transforming searches. The search must return raw events (not aggregated or transformed data). Option B is a simple base search that filters events by index, sourcetype, and field value. It returns individual events and contains no transforming commands, making it eligible to be saved as an event type.

Why other options are incorrect

A. index=server_516 sourcetype=BETA_201 code=S51 [ | inputlookup servercode.csv append=t ] – Incorrect.
This search contains a subsearch ([ | inputlookup servercode.csv append=t ]). Event types do not support subsearches. Subsearches execute separately and can introduce performance issues or unexpected behavior when used in event type definitions. Splunk explicitly restricts event types to simple searches without subsearches or joining operations.

C. index=server_516 sourcetype=BETA_201 code=551 | stats count by code – Incorrect.
The stats command is a transforming command that aggregates data and returns a table instead of raw events. Event types require searches that return raw events (non-transforming). Transforming searches like stats, chart, timechart, and top cannot be saved as event types because event types rely on the raw event structure for tagging and categorization.

D. index=server_516 sourcetype=BETA_201 code=551 | where code > 200 – Incorrect.
Although the where command filters events, it is still a non-transforming command that returns raw events. However, in this specific search, code=551 is already in the base search, so code > 200 is redundant but not invalid. The real reason this is incorrect for the exam's context is that where implies evaluation after retrieval. While technically this could be saved as an event type, the exam expects the simplest, most efficient, and most appropriate form — a pure base search without post-processing commands. Splunk best practices recommend event types be base searches without piped commands for optimal performance and clarity.

Reference

Splunk Documentation – About event types

"An event type is a user-defined classification that can be applied to events. To define an event type, you provide a name and a search string that identifies the events."

"The search string must be a non-transforming search; it cannot contain commands that transform event data, such as stats, chart, or timechart."


Page 3 out of 31 Pages
Splunk SPLK-1002 Dumps Home Previous