最新の2024年02月試験SPLK-2002問題集で合格させる認証試験合格させます [Q36-Q54]

Share

最新の2024年02月試験SPLK-2002問題集で合格させる認証試験合格させます

最新でリアルなSplunk SPLK-2002試験問題集解答があります

質問 # 36
Which server.conf attribute should be added to the master node's server.conf file when decommissioning a site in an indexer cluster?

  • A. available_sites
  • B. site_replication_factor
  • C. site_search_factor
  • D. site_mappings

正解:D

解説:
The site_mappings attribute should be added to the master node's server.conf file when decommissioning a site in an indexer cluster. The site_mappings attribute is used to specify how the master node should reassign the buckets from the decommissioned site to the remaining sites. The site_mappings attribute is a comma-separated list of site pairs, where the first site is the decommissioned site and the second site is the destination site. For example, site_mappings = site1:site2,site3:site4 means that the buckets from site1 will be moved to site2, and the buckets from site3 will be moved to site4. The available_sites attribute is used to specify which sites are currently available in the cluster, and it is automatically updated by the master node. The site_search_factor and site_replication_factor attributes are used to specify the number of searchable and replicated copies of each bucket for each site, and they are not affected by the decommissioning process


質問 # 37
A Splunk architect has inherited the Splunk deployment at Buttercup Games and end users are complaining that the events are inconsistently formatted for a web sourcetype. Further investigation reveals that not all web logs flow through the same infrastructure: some of the data goes through heavy forwarders and some of the forwarders are managed by another department.
Which of the following items might be the cause for this issue?

  • A. The indexers may have different configurations than the heavy forwarders.
  • B. The data inputs are not properly configured across all the forwarders.
  • C. The search head may have different configurations than the indexers.
  • D. The forwarders managed by the other department are an older version than the rest.

正解:D


質問 # 38
Stakeholders have identified high availability for searchable data as their top priority. Which of the following best addresses this requirement?

  • A. Increasing the number of search heads in the cluster.
  • B. Increasing the search factor in the cluster.
  • C. Increasing the replication factor in the cluster.
  • D. Increasing the number of CPUs on the indexers in the cluster.

正解:C


質問 # 39
Of the following types of files within an index bucket, which file type may consume the most disk?

  • A. Bloom filter
  • B. Inverted index (.tsidx)
  • C. Rawdata
  • D. Metadata (.data)

正解:C

解説:
Explanation
Of the following types of files within an index bucket, the rawdata file type may consume the most disk. The rawdata file type contains the compressed and encrypted raw data that Splunk has ingested. The rawdata file type is usually the largest file type in a bucket, because it stores the original data without any filtering or extraction. The bloom filter file type contains a probabilistic data structure that is used to determine if a bucket contains events that match a given search. The bloom filter file type is usually very small, because it only stores a bit array of hashes. The metadata (.data) file type contains information about the bucket properties, such as the earliest and latest event timestamps, the number of events, and the size of the bucket. The metadata file type is also usually very small, because it only stores a few lines of text. The inverted index (.tsidx) file type contains the time-series index that maps the timestamps and event IDs of the raw data. The inverted index file type can vary in size depending on the number and frequency of events, but it is usually smaller than the rawdata file type


質問 # 40
To activate replication for an index in an indexer cluster, what attribute must be configured in indexes.conf on all peer nodes?

  • A. repFactor = auto
  • B. repFactor = 0
  • C. replicate = auto
  • D. replicate = 0

正解:A


質問 # 41
When adding or decommissioning a member from a Search Head Cluster (SHC), what is the proper order of operations?

  • A. 1. Install and initialize the instance.2. Delete Splunk Enterprise, if it exists.3. Join the SHC.
  • B. 1. Initialize cluster rebalance operation.2. Remove master node from cluster.3. Trigger replication.
  • C. 1. Trigger replication.2. Remove master node from cluster.3. Initialize cluster rebalance operation.
  • D. 1. Delete Splunk Enterprise, if it exists.2. Install and initialize the instance.3. Join the SHC.

正解:D

解説:
When adding or decommissioning a member from a Search Head Cluster (SHC), the proper order of operations is:
* Delete Splunk Enterprise, if it exists.
* Install and initialize the instance.
* Join the SHC.
This order of operations ensures that the member has a clean and consistent Splunk installation before joining the SHC. Deleting Splunk Enterprise removes any existing configurations and data from the instance.
Installing and initializing the instance sets up the Splunk software and the required roles and settings for the SHC. Joining the SHC adds the instance to the cluster and synchronizes the configurations and apps with the other members. The other order of operations are not correct, because they either skip a step or perform the steps in the wrong order.


質問 # 42
As a best practice, where should the internal licensing logs be stored?

  • A. License server.
  • B. Search head layer.
  • C. Deployment layer.
  • D. Indexing layer.

正解:A

解説:
Explanation
As a best practice, the internal licensing logs should be stored on the license server. The license server is a Splunk instance that manages the distribution and enforcement of licenses in a Splunk deployment. The license server generates internal licensing logs that contain information about the license usage, violations, warnings, and pools. The internal licensing logs should be stored on the license server itself, because they are relevant to the license server's role and function. Storing the internal licensing logs on the license server also simplifies the license monitoring and troubleshooting process. The internal licensing logs should not be stored on the indexing layer, the deployment layer, or the search head layer, because they are not related to the roles and functions of these layers. Storing the internal licensing logs on these layers would also increase the network traffic and disk space consumption


質問 # 43
What is the logical first step when starting a deployment plan?

  • A. Gather statistics on the expected adoption of Splunk for sizing.
  • B. Determine what apps and use cases will be implemented.
  • C. Collect the initial requirements for the deployment from all stakeholders.
  • D. Inventory the currently deployed logging infrastructure.

正解:C


質問 # 44
Where in the Job Inspector can details be found to help determine where performance is affected?

  • A. Execution Costs > Components
  • B. Search Job Properties > runDuration
  • C. Search Job Properties > runtime
  • D. Job Details Dashboard > Total Events Matched

正解:A

解説:
This is where in the Job Inspector details can be found to help determine where performance is affected, as it shows the time and resources spent by each component of the search, such as commands, subsearches, lookups, and post-processing1. The Execution Costs > Components section can help identify the most expensive or inefficient parts of the search, and suggest ways to optimize or improve the search performance1.
The other options are not as useful as the Execution Costs > Components section for finding performance issues. Option A, Search Job Properties > runDuration, shows the total time, in seconds, that the search took to run2. This can indicate the overall performance of the search, but it does not provide any details on the specific components or factors that affected the performance. Option B, Search Job Properties > runtime, shows the time, in seconds, that the search took to run on the search head2. This can indicate the performance of the search head, but it does not account for the time spent on the indexers or the network. Option C, Job Details Dashboard > Total Events Matched, shows the number of events that matched the search criteria3. This can indicate the size and scope of the search, but it does not provide any information on the performance or efficiency of the search. Therefore, option D is the correct answer, and options A, B, and C are incorrect.
1: Execution Costs > Components 2: Search Job Properties 3: Job Details Dashboard


質問 # 45
Splunk Enterprise performs a cyclic redundancy check (CRC) against the first and last bytes to prevent the same file from being re-indexed if it is rotated or renamed. What is the number of bytes sampled by default?

  • A. 0
  • B. 1
  • C. 2
  • D. 3

正解:C

解説:
Splunk Enterprise performs a CRC check against the first and last 256 bytes of a file by default, as stated in the inputs.conf specification. This is controlled by the initCrcLength parameter, which can be changed if needed. The CRC check helps Splunk Enterprise to avoid re-indexing the same file twice, even if it is renamed or rotated, as long as the content does not change. However, this also means that Splunk Enterprise might miss some files that have the same CRC but different content, especially if they have identical headers. To avoid this, the crcSalt parameter can be used to add some extra information to the CRC calculation, such as the full file path or a custom string. This ensures that each file has a unique CRC and is indexed by Splunk Enterprise.
You can read more about crcSalt and initCrcLength in the How log file rotation is handled documentation.


質問 # 46
The KV store forms its own cluster within a SHC. What is the maximum number of SHC members KV store will form?

  • A. 0
  • B. Unlimited
  • C. 1
  • D. 2

正解:C

解説:
Explanation
The KV store forms its own cluster within a SHC. The maximum number of SHC members KV store will form is 50. The KV store cluster is a subset of the SHC members that are responsible for replicating and storing the KV store data. The KV store cluster can have up to 50 members, but only 20 of them can be active at any given time. The other members are standby members that can take over if an active member fails. The KV store cluster cannot have more than 50 members, nor can it have an unlimited number of members. The KV store cluster cannot have 25 or 100 members, because these numbers are not multiples of 5, which is the minimum replication factor for the KV store cluster


質問 # 47
A customer plans to ingest 600 GB of data per day into Splunk. They will have six concurrent users, and they also want high data availability and high search performance. The customer is concerned about cost and wants to spend the minimum amount on the hardware for Splunk. How many indexers are recommended for this deployment?

  • A. Two indexers clustered, assuming a high volume of saved/scheduled searches.
  • B. Three indexers not in a cluster, assuming a long data retention period.
  • C. Two indexers not in a cluster, assuming users run many long searches.
  • D. Two indexers clustered, assuming high availability is the greatest priority.

正解:D

解説:
Explanation
https://docs.splunk.com/Documentation/Splunk/8.1.0/DistSearch/Distsearchsystemrequirements


質問 # 48
If there is a deployment server with many clients and one deployment client is not updating apps, which of the following should be done first?

  • A. Increase the number of CPU cores for the deployment server.
  • B. Choose a longer phone home interval for all of the deployment clients.
  • C. Increase the amount of memory for the deployment server.
  • D. Choose a corrective action based on the splunkd. log of the deployment client.

正解:D

解説:
The correct action to take first if a deployment client is not updating apps is to choose a corrective action based on the splunkd.log of the deployment client. This log file contains information about the communication between the deployment server and the deployment client, and it can help identify the root cause of the problem1. The other actions may or may not help, depending on the situation, but they are not the first steps to take. Choosing a longer phone home interval may reduce the load on the deployment server, but it will also delay the updates for the deployment clients2. Increasing the number of CPU cores or the amount of memory for the deployment server may improve its performance, but it will not fix the issue if the problem is on the deployment client side3. Therefore, option C is the correct answer, and options A, B, and D are incorrect.
1: Troubleshoot deployment server issues 2: Configure deployment clients 3: Hardware and software requirements for the deployment server


質問 # 49
Which of the following would be the least helpful in troubleshooting contents of Splunk configuration files?

  • A. btool output
  • B. crash logs
  • C. diagnostic logs
  • D. search.log

正解:B

解説:
Splunk configuration files are files that contain settings that control various aspects of Splunk behavior, such as data inputs, outputs, indexing, searching, clustering, and so on1. Troubleshooting Splunk configuration files involves identifying and resolving issues that affect the functionality or performance of Splunk due to incorrect or conflicting configuration settings. Some of the tools and methods that can help with troubleshooting Splunk configuration files are:
* search.log: This is a file that contains detailed information about the execution of a search, such as the search pipeline, the search commands, the search results, the search errors, and the search performance2. This file can help troubleshoot issues related to search configuration, such as props.conf, transforms.conf, macros.conf, and so on3.
* btool output: This is a command-line tool that displays the effective configuration settings for a given Splunk component, such as inputs, outputs, indexes, props, and so on4. This tool can help troubleshoot issues related to configuration precedence, inheritance, and merging, as well as identify the source of a configuration setting5.
* diagnostic logs: These are files that contain information about the Splunk system, such as the Splunk version, the operating system, the hardware, the license, the indexes, the apps, the users, the roles, the permissions, the configuration files, the log files, and the metrics6. These files can help troubleshoot issues related to Splunk installation, deployment, performance, and health7.
Option A is the correct answer because crash logs are the least helpful in troubleshooting Splunk configuration files. Crash logs are files that contain information about the Splunk process when it crashes, such as the stack trace, the memory dump, and the environment variables8. These files can help troubleshoot issues related to Splunk stability, reliability, and security, but not necessarily related to Splunk configuration9.
References:
1: About configuration files - Splunk Documentation 2: Use the search.log file - Splunk Documentation 3: Troubleshoot search-time field extraction - Splunk Documentation 4: Use btool to troubleshoot configurations - Splunk Documentation 5: Troubleshoot configuration issues - Splunk Documentation 6: About the diagnostic utility - Splunk Documentation 7: Use the diagnostic utility - Splunk Documentation 8: About crash logs - Splunk Documentation 9: [Troubleshoot Splunk Enterprise crashes - Splunk Documentation]


質問 # 50
Which of the following are true statements about Splunk indexer clustering?

  • A. All peer nodes must run exactly the same Splunk version.
  • B. The master node must run the same or a later Splunk version than search heads.
  • C. The search head must run the same or a later Splunk version than the peer nodes.
  • D. The peer nodes must run the same or a later Splunk version than the master node.

正解:A、C

解説:
Explanation
The following statements are true about Splunk indexer clustering:
* All peer nodes must run exactly the same Splunk version. This is a requirement for indexer clustering, as different Splunk versions may have different data formats or features that are incompatible with each other. All peer nodes must run the same Splunk version as the master node and the search heads that connect to the cluster.
* The search head must run the same or a later Splunk version than the peer nodes. This is a recommendation for indexer clustering, as a newer Splunk version may have new features or bug fixes that improve the search functionality or performance. The search head should not run an older Splunk version than the peer nodes, as this may cause search errors or failures. The following statements are false about Splunk indexer clustering:
* The master node must run the same or a later Splunk version than the search heads. This is not a requirement or a recommendation for indexer clustering, as the master node does not participate in the search process. The master node should run the same Splunk version as the peer nodes, as this ensures the cluster compatibility and functionality.
* The peer nodes must run the same or a later Splunk version than the master node. This is not a requirement or a recommendation for indexer clustering, as the peer nodes do not coordinate the cluster activities. The peer nodes should run the same Splunk version as the master node, as this ensures the cluster compatibility and functionality. For more information, see [About indexer clusters and index replication] and [Upgrade an indexer cluster] in the Splunk documentation.


質問 # 51
In an existing Splunk environment, the new index buckets that are created each day are about half the size of the incoming data. Within each bucket, about 30% of the space is used for rawdata and about 70% for index files.
What additional information is needed to calculate the daily disk consumption, per indexer, if indexer clustering is implemented?

  • A. Replication factor, search factor, number of accelerated searches, and total disk size across cluster.
  • B. Total daily indexing volume, replication factor, search factor, and number of search heads.
  • C. Total daily indexing volume, number of peer nodes, replication factor, and search factor.
  • D. Total daily indexing volume, number of peer nodes, and number of accelerated searches.

正解:A


質問 # 52
What is the minimum reference server specification for a Splunk indexer?

  • A. 12 CPU cores, 12GB RAM, 800 IOPS
  • B. 28 CPU cores, 32GB RAM, 1200 IOPS
  • C. 16 CPU cores, 16GB RAM, 800 IOPS
  • D. 24 CPU cores, 16GB RAM, 1200 IOPS

正解:A

解説:
Explanation/Reference: https://docs.splunk.com/Documentation/Splunk/7.3.2/Capacity/ Referencehardware#Reference_host_specification


質問 # 53
To improve Splunk performance, parallelIngestionPipelines setting can be adjusted on which of the following components in the Splunk architecture? (Select all that apply.)

  • A. Search head
  • B. Cluster master
  • C. Indexers
  • D. Forwarders

正解:C、D


質問 # 54
......

SPLK-2002問題集を使って一日でSplunk Enterprise Certified Architect試験最速合格:https://www.jpntest.com/shiken/SPLK-2002-mondaishu

弊社を連絡する

我々は12時間以内ですべてのお問い合わせを答えます。

オンラインサポート時間:( UTC+9 ) 9:00-24:00
月曜日から土曜日まで

サポート:現在連絡