Which option accurately describes the purpose of the HTTP Event Collector (HEC)?
Correct Answer:
B
Reference: http://dev.splunk.com/view/event-collector/SP-CAAAE6M
User role inheritance allows what to be inherited from the parent role? (Select all that apply.)
Correct Answer:
B
Reference: https://docs.splunk.com/Documentation/Splunk/7.3.1/Security/Aboutusersandroles#How_users_inherit_capabilities
Which of the following apply to how distributed search works? (Select all that apply.)
Correct Answer:
A
Reference: https://docs.splunk.com/Documentation/Splunk/7.3.1/DistSearch/Whatisdistributedsearch
What is required when adding a native user to Splunk? (Select all that apply.)
Correct Answer:
CD
Reference: https://docs.splunk.com/Documentation/Splunk/7.3.1/Security/Addandeditusers
When configuring monitor inputs with whitelists or blacklists, what is the supported method of filtering the lists?
Correct Answer:
B
Reference: https://docs.splunk.com/Documentation/Splunk/7.3.1/Updating/Filterclients