When the search/jobs REST endpoint is called to execute a search, what can be done to reduce the results size in the results? (Select all that apply.)
Which of the following Simple XML elements configure panel link buttons? (Select all that apply.)
For a KV store, a lookup stanza in the transforms.conf file must contain which of the following? (Select all that apply.)
Which of the following log files contains logs that are most relevant to Splunk Web?
Suppose the following query in a Simple XML dashboard returns a table including hyperlinks:
Which of the following is a valid dynamic drilldown element to allow a user of the dashboard to visit the hyperlinks contained in the link field?
When output_mode is not used, which element of a feed is a human readable name for a returned entry?
A fellow Splunk administrator is reviewing an app that has been downloaded from splunkbase and deployed in an organization. The admin has e-mailed the following configuration snippet with a brief note that says “fix the permissions”.
In what configuration file should the snippet be placed?
[]
access = read : [ * ], write : [ admin ] export - system
(Assume that $APP_HOME refers to the path that the app is installed, e.g. $SPLUNK_HOME/etc/apps/
A KV store collection can be associated with a namespace for which of the following users?
A user wants to add the token $token_name$ to a dashboard for use in a drilldown. Which token filter encodes URL values?
Which of the following are characteristics of an add-on? (Select all that apply.)
Which of the following is an example of a Splunk KV store use case? (Select all that apply.)
Assuming permissions are set appropriately, which REST endpoint path can be used by someone with a power user role to access information about mySearch, a saved search owned by someone with a user role?
Consider the following Python code snippet used in a Splunk add-on:
if not os.path.exists(full_path): self.doAction(full_path, header) else: f = open (full_path) oldORnew = f.readline().split(“,”) f.close()
An attacker could create a denial of service by causing an error in either the open() or readline()
commands. What type of vulnerability is this?
What application security best practices should be adhered to while developing an app for Splunk? (Select all that apply.)
Which of the following ensures that quotation marks surround the value referenced by the token?