Which of the following describes a Splunk custom visualization?
A. A visualization with custom colors.
B. Any visualization available in Splunk.
C. A visualization in Splunk modified by the user.
D. A visualization that uses the Splunk Custom Visualization API.
What application security best practices should be adhered to while developing an app for Splunk? (Select all that apply.)
A. Review the OWASP Top Ten List.
B. Store passwords in clear text in .conf files.
C. Review the OWASP Secure Coding Practices Quick Reference Guide.
D. Ensure that third-party libraries that the app depends on have no outstanding CVE vulnerabilities.
Which of the following statements describe one-shot searches? (Select all that apply.)
A. Are always executed asynchronously.
B. Can specify csv as an output format.
C. Stream all results upon search completion.
D. Can use autocancel to set a timeout limit.
Which of the following is a security best practice?
A. Enable XSS.
B. Eliminate all escape characters.
C. Ensure the app passes App Certification.
D. Ensure components have no Common Vulnerabilities and Exposures (CVE) vulnerabilities.
Which of the following is a customization option for the Open in Search panel link button?
A. Display the refresh time.
B. Show the Export Results button.
C. Show link buttons at the bottom of a panel.
D. Define an alternative search or target view to use.
Which of the following ensures that quotation marks surround the value referenced by the token?
A. $token_name|s$
B. “$token_name$”
C. ($token_name$)
D. \“$token_name$\”
Which of the following search commands can be used to perform statistical queries on indexed fields in TSIDX files?
A. stats
B. tstats
C. tscollect
D. transaction
Page 2 out of 10 Pages |
Splunk SPLK-2001 Dumps Home |