Latest SPLK-3002 Practice Tests with Actual Questions

Get Complete pool of questions with Premium PDF and Test Engine

Exam Code : SPLK-3002
Exam Name : Splunk IT Service Intelligence Certified Admin
Vendor Name : "Splunk"







SPLK-3002 Dumps

SPLK-3002 Braindumps SPLK-3002 Real Questions SPLK-3002 Practice Test SPLK-3002 Actual Questions


Splunk


SPLK-3002


Splunk IT Service Intelligence Certified Admin


https://killexams.com/pass4sure/exam-detail/SPLK-3002


Question: 243


Which scenario would benefit most by implementing ITSI?


  1. Monitoring of business services functionality.

  2. Monitoring of system hardware.

  3. Monitoring of system process statuses

  4. Monitoring of retail sales metrics.




Answer: A



Explanation:


Reference: https://docs.splunk.com/Documentation/ITSI/4.10.2/SI/AboutSI



Question: 244


When in maintenance mode, which of the following is accurate?


  1. Once the window is over, KPIs and notable events will begin to be generated again.

  2. KPIs are shown in blue while in maintenance mode.

  3. Maintenance mode slots are scheduled on a per hour basis.

  4. Service health scores and KPI events are deleted until the window is over.




Answer: A



Explanation:


Reference: https://docs.splunk.com/Documentation/ITSI/4.10.2/EA/REBestPractice



Question: 245


What effects does the KPI importance weight of 11 have on the overall health score of a service?


  1. At least 10% of the KPIs will go critical.

  2. Importance weight is unused for health scoring.

  3. The service will go critical.

  4. It is a minimum health indicator KP




Answer: D


Explanation: Reference:

https://docs.splunk.com/Documentation/ITSI/4.10.2/SI/KPIImportance#:~:text=ITSI%20considers%20KPIs%20that%20have,other%20KPIs%20in%20the%20service



Question: 246


Which of the following is a good use case regarding defining entities for a service?


  1. Automatically associate entities to services using multiple entity aliases.

  2. All of the entities have the same identifying field name.

  3. Being able to split a CPU usage KPI by host name.

  4. KPI total values are aggregated from multiple different category values in the source events.




Answer: A



Explanation:


Define entities before creating services. When you configure a service, you can specify entity matching rules based on entity aliases that automatically add the entities to your service.


Reference: https://docs.splunk.com/Documentation/ITSI/4.10.2/Entity/About



Question: 247

What are valid ITSI Glass Table editor capabilities? (Choose all that apply.)


  1. Creating glass tables.

  2. Correlation search creation.

  3. Service swapping configuration.

  4. Adding KPI metric lanes to glass tables.




Answer: A,C,D



Explanation:


Create a glass table to visualize and monitor the interrelationships and dependencies across your IT and business services.


The service swapping settings are saved and apply the next time you open the glass table. You can add metrics like KPIs, ad hoc searches, and service health scores that update in real time against a background that you design. Glass tables show real-time data generated by KPIs and services.


Reference: https://docs.splunk.com/Documentation/ITSI/4.10.2/SI/GTOverview



Question: 248


When changing a service template, which of the following will be added to linked services by default?


  1. Thresholds.

  2. Entity Rules.

  3. New KPIs.

  4. Health score.

    Answer: B

    Explanation:

Link multiple services to a service template to manage them collectively in IT Service Intelligence (ITSI). A service can only be linked to one service template at a

time. When you link a service to a service template, any existing KPIs in the service are preserved and KPIs in the template are added to the service. You can choose to append, replace, or keep entity rules.


Reference: https://docs.splunk.com/Documentation/ITSI/4.10.2/SI/LinkST



Question: 249


After a notable event has been closed, how long will the meta data for that event remain in the KV Store by default?


  1. 6 months.

  2. 9 months.

  3. 1 year.

  4. 3 months.

    Answer: A

    Explanation:

By default, notable event metadata is archived after six months to keep the KV store from growing too large.


Reference: https://docs.splunk.com/Documentation/ITSI/4.10.2/EA/TrimNECollections



Question: 250


What should be considered when onboarding data into a Splunk index, assuming that ITSI will need to use this data?


  1. Use | stats functions in custom fields to prepare the data for KPI calculations.

  2. Check if the data could leverage pre-built KPIs from modules, then use the correct TA to onboard the data.

  3. Make sure that all fields conform to CIM, then use the corresponding module to import related services.

  4. Plan to build as many data models as possible for ITSI to leverage




Answer: B



Explanation:

Reference: https://newoutlook.it/download/book/splunk/advanced-splunk.pdf



Question: 252


Which of the following best describes a default deep dive?


  1. It initially shows the health scores for all services.

  2. It initially shows the highest importance KPIs.

  3. It initially shows all of the KPIs for a selected service.

  4. It initially shows all the entity swim lanes.




Answer: D



Explanation:


Reference: https://docs.splunk.com/Documentation/ITSI/4.10.2/SI/DeepDives



Question: 253


When deploying ITSI on a distributed Splunk installation, which component must be installed on the search head(s)?


  1. SA-ITOA

  2. ITSI app

  3. All ITSI components

  4. SA-ITSI-Licensechecker




Answer: D



Explanation:


Install SA-ITSI-Licensechecker and SA-UserAccess on any license master in a distributed or search head cluster environment. If a search head in your environment is also a license master, the license master components are installed when you install ITSI on the search heads.


Reference: https://docs.splunk.com/Documentation/ITSI/4.10.2/Install/InstallDD



Question: 254


Which of the following are deployment recommendations for ITSI? (Choose all that apply.)


  1. Deployments often require an increase of hardware resources above base Splunk requirements.

  2. Deployments require a dedicated ITSI search head.

  3. Deployments may increase the number of required indexers based on the number of KPI searches.

  4. Deployments should use fastest possible disk arrays for indexers.




Answer: A,B,C



Explanation:


You might need to increase the hardware specifications of your own Enterprise Security deployment above the minimum hardware requirements depending on your environment. Install Splunk Enterprise Security on a dedicated search head or search head cluster. The Splunk platform uses indexers to scale horizontally. The number of indexers required in an Enterprise Security deployment varies based on the data volume, data type, retention requirements, search type, and search concurrency.


Reference: https://docs.splunk.com/Documentation/ES/latest/Install/DeploymentPlanning



Question: 255


Besides creating notable events, what are the default alert actions a correlation search can execute? (Choose all that apply.)


  1. Ping a host.

  2. Send email.

  3. Include in RSS feed.

  4. Run a script.




Answer: A,B,C,D

Throttling applies to any correlation search alert type, including notable events and actions (RSS feed, email, run script, and ticketing). Reference: https://docs.splunk.com/Documentation/ITSI/4.10.2/EA/ConfigCS



Question: 256


Which of the following describes entities? (Choose all that apply.)


  1. Entities must be IT devices, such as routers and switches, and must be identified by either IP value, host name, or mac address.

  2. An abstract (pseudo/logical) entity can be used to split by for a KPI, although no entity rules or filtering can be used to limit data to a specific service.

  3. Multiple entities can share the same alias value, but must have different role values.

  4. To automatically restrict the KPI to only the entities in a particular service, select âFilter to Entities in Serviceâ.




Answer: D



Explanation:


Reference: https://docs.splunk.com/Documentation/ITSI/4.10.2/SI/KPIfilter



Question: 257


Which of the following is a characteristic of base searches?


  1. Search expression, entity splitting rules, and thresholds are configured at the base search level.

  2. It is possible to filter to entities assigned to the service for calculating the metrics for the serviceâs KPIs.

  3. The fewer KPIs that share a common base search, the more efficiency a base search provides, and anomaly detection is more efficient.

  4. The base search will execute whether or not a KPI needs it.




Answer: B



Explanation:


Reference: https://docs.splunk.com/Documentation/ITSI/4.10.2/SI/BaseSearch



Question: 258


In maintenance mode, which features of KPIs still function?


  1. KPI searches will execute but will be buffered until the maintenance window is over.

  2. KPI searches still run during maintenance mode, but results go to itsi_maintenance_summary index.

  3. New KPIs can be created, but existing KPIs are locked.

  4. KPI calculations and threshold settings can be modified.




Answer: A



Explanation:


It's a best practice to schedule maintenance windows with a 15- to 30-minute time buffer before and after you start and stop your maintenance work. This gives the system an opportunity to catch up with the maintenance state and reduces the chances of ITSI generating false positives during maintenance operations.


Reference: https://docs.splunk.com/Documentation/ITSI/4.10.2/Configure/AboutMW



Question: 259


Where are KPI search results stored?


  1. The default index.

  2. KV Store.

  3. Output to a CSV lookup.

  4. The itsi_summary index.




Answer: D

Search results are processed, created, and written to the itsi_summary index via an alert action. Reference: https://docs.splunk.com/Documentation/ITSI/4.10.2/SI/BaseSearch



Question: 260


Which of the following is an advantage of using adaptive time thresholds?


  1. Automatically update thresholds daily to manage dynamic changes to KPI values.

  2. Automatically adjust KPI calculation to manage dynamic event data.

  3. Automatically adjust aggregation policy grouping to manage escalating severity.

  4. Automatically adjust correlation search thresholds to adjust sensitivity over time.




Answer: A



Explanation:


Reference: https://docs.splunk.com/Documentation/ITSI/4.10.2/SI/TimePolicies



Question: 261


Which of the following are the default ports that must be configured on Splunk to use ITSI?


  1. SplunkWeb (8405), SplunkD (8519), and HTTP Collector (8628)

  2. SplunkWeb (8089), SplunkD (8088), and HTTP Collector (8000)

  3. SplunkWeb (8000), SplunkD (8089), and HTTP Collector (8088)

  4. SplunkWeb (8088), SplunkD (8089), and HTTP Collector (8000)




Answer: C



Explanation:


Reference: https://splunk.github.io/docker-splunk/ARCHITECTURE.html



Question: 262


Which of the following items describe ITSI Backup and Restore functionality? (Choose all that apply.)


  1. A pre-configured default ITSI backup job is provided that can be modified, but not deleted.

  2. ITSI backup is inclusive of KV Store, ITSI Configurations, and index dependencies.

  3. kvstore_to_json.py can be used in scripts or command line to backup ITSI for full or partial backups.

  4. ITSI backups are stored as a collection of JSON formatted files.




Answer: A,C,D



Explanation:


ITSI provides a kvstore_to_json.py script that lets you backup/restore ITSI configuration data, perform bulk service KPI operations, apply time zone offsets for ITSI objects, and regenerate KPI search schedules.


When you run a backup job, ITSI saves your data to a set of JSON files compressed into a single ZIP file. Reference:

https://docs.splunk.com/Documentation/ITSI/4.10.2/Configure/kvstorejson https://docs.splunk.com/Documentation/ITSI/4.10.2/Configure/BackupandRestoreITSIconfi g



Question: 263


When creating a custom deep dive, what color are services/KPIs in maintenance mode within the topology view?


  1. Gray

  2. Purple

  3. Gear Icon

  4. Blue

    Answer: A

    Explanation:

Services, entities, and KPIs that are fully or partially impacted by a maintenance window appear in a dark gray color on pages that display health scores, including

service analyzers, service and entity details pages, glass tables, multi-KPI alerts, and deep dives. Reference: https://docs.splunk.com/Documentation/ITSI/4.10.2/Configure/AboutMW