Splunk SPLK-1005 Exam Questions

Questions for the SPLK-1005 were updated on : Dec 01 ,2025

Page 1 out of 6. Viewing questions 1-15 out of 80

Question 1

In Splunk Cloud, which of the following statements regarding REST API is true?

  • A. REST API and Splunk HEC are on the same port.
  • B. All REST API endpoints are open and available by default.
  • C. REST API is not available in Splunk Cloud.
  • D. A subset of REST API endpoints are enabled for customers to manage Splunk.
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
Splunk Cloud enables only a subset of REST API endpoints for customer use to ensure security and
control over the environment, allowing essential functionality while maintaining a secure setup.
[Reference: Splunk Docs on REST API access in Splunk Cloud]

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 2

What is the default port for sending data via HTTP Event Collector to Splunk Cloud?

  • A. 443
  • B. 8088
  • C. 9997
  • D. 8000
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
The default port for HTTP Event Collector (HEC) in Splunk Cloud is 8088, which is used for data
ingestion via HEC. [Reference: Splunk Docs on HTTP Event Collector settings]

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 3

Which of the following is a valid monitor stanza for inputs.conf?

  • A. [monitor:///var/log/*.log] index = linux sourcetype = access_combined host = 489307057
  • B. [monitor:\\\var\log\httpd-[0-9].log] index = linux sourcetype = access_combined host = 489307057
  • C. [monitor:///var/log/httpd-[0-9].log] index = linux sourcetype = access_combined host = 489307057
  • D. [monitor:\\\var\log\*.log] index = linux sourcetype = access_combined host = 489307057
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
[monitor:///var/log/httpd-[0-9].log] is a valid path and syntax for inputs.conf to monitor files ending
in .log under /var/log, with other correct index, sourcetype, and host settings specified. [Reference:
Splunk Docs on monitor stanzas]

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 4

Configuration folders named default contain configuration files/settings specified in the Splunk
product or default settings specified in apps. Which of the following is recommended to override
these settings?

  • A. It does not matter whether setting overrides are placed in default or local folders. Both are equally acceptable since Splunk will merge all the files together into one runtime model after each restart.
  • B. Any settings to be overridden should be modified in-place wherever the setting was found originally. For example, if overriding a setting originally found in system/default, it should be overridden there to ensure that the desired value is used by Splunk.
  • C. Overrides should be placed in a folder named local, ideally within a custom Splunk app. This ensures the overrides are preserved upon product or app upgrade and will also be easier to maintain/support.
  • D. Try to store all configuration overrides in system/local folder to keep all configurations in one place. This ensures the modification has the highest precedence over all other configuration entries.
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
Placing configuration overrides in the local folder within a custom app allows for easy maintenance
and ensures that these overrides are preserved during upgrades, as files in default are overwritten.
[Reference: Splunk Docs on configuration file precedence]

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 5

Due to internal security policies, a Splunk Cloud administrator cannot send data directly to Splunk
Cloud from certain data sources. Additional parsing and API-based data sources also need to be sent
to Splunk Cloud. What forwarder type should the Splunk Cloud administrator use to satisfy these
requirements within their environment?

  • A. Syslog-ng server with a universal forwarder
  • B. Light forwarder as an intermediate forwarder
  • C. Heavy forwarder as an intermediate forwarder
  • D. Universal forwarder as an intermediate forwarder
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
A heavy forwarder is appropriate in this scenario because it can perform additional data parsing,
filtering, and routing before forwarding data to Splunk Cloud. This is particularly useful for data that
requires preprocessing or cannot be sent directly due to security policies. [Reference: Splunk Docs on
forwarder types and capabilities]

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 6

When creating a new index, which of the following is true about archiving expired events?

  • A. Store expired events in private AWS-based storage.
  • B. Expired events cannot be archived.
  • C. Archive some expired events from an index and discard others.
  • D. Store expired events on-prem using your own storage systems.
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
In Splunk Cloud, expired events can be archived to customer-managed storage solutions, such as on-
premises storage. This allows organizations to retain data beyond the standard retention period if
needed. [Reference: Splunk Docs on data archiving in Splunk Cloud]

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 7

Where can an administrator download the Splunk Cloud Universal Forwarder credentials package?

  • A. Splunk Support.
  • B. Cloud Monitoring Console forwarder drop-down.
  • C. Universal Forwarder app in the Splunk Cloud search head.
  • D. Splunkbase.
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
The Universal Forwarder credentials package is available in the Splunk Cloud search head’s Universal
Forwarder app for secure, managed deployment. [Reference: Splunk Docs on Universal Forwarder
credentials package]

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 8

What two files are used in the data transformation process?

  • A. parsing.conf and transforms.conf
  • B. props.conf and transforms.conf
  • C. transforms.conf and fields.conf
  • D. transforms.conf and sourcetypes.conf
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
props.conf and transforms.conf define data parsing, transformations, and routing rules, making
them essential for data transformations. [Reference: Splunk Docs on props.conf and transforms.conf]

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 9

How is it possible to test a script from the Splunk perspective before using it within a scripted input?

  • A. splunk run <scriptname>
  • B. splunk script <scriptname>
  • C. ./$SPLUNK_HOME/etc/apps/<app>/bin/<scriptname>
  • D. splunk cmd <scriptname>
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
splunk cmd <scriptname> allows running scripts in Splunk’s environment for testing purposes. This
ensures the script behaves as expected within Splunk’s CLI context. [Reference: Splunk Docs on
scripted inputs]

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 10

Which of the following statements is true regarding sedcmd?

  • A. SEDCMD can be defined in either props.conf or transforms.conf.
  • B. SEDCMD does not work on Windows-based installations of Splunk.
  • C. SEDCMD uses the same syntax as Splunk's replace command.
  • D. SEDCMD provides search and replace functionality using regular expressions and substitutions.
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
SEDCMD in props.conf applies regular expressions to modify data as it is ingested. It is useful for
transforming raw event data before indexing. [Reference: Splunk Docs on SEDCMD]

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 11

Which of the following is a valid method to test if a forwarder can successfully send data to Splunk
Cloud?

  • A. Search the _audit index to confirm whether the forwarder ID was registered.
  • B. Use oneshot from the CLI on the forwarders, then check to see if those logs show up in the Splunk Cloud environment.
  • C. On Splunk Cloud UI, click Add Data and upload a test file, then search to see if the logs show up.
  • D. Ping the inputssl.example.splunkcloud.com to see if it returns the ping.
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
Using the oneshot command allows a direct check for data reception in the cloud environment. Logs
can be verified in the cloud after the forwarder sends them. [Reference: Splunk Docs on testing
forwarder data inputs]

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 12

Given the following set of files, which of the monitor stanzas below will result in Splunk monitoring
all of the files ending with .log?
Files:
/var/log/www1/secure.log
/var/log/www1/access.log
/var/log/www2/logs/secure.log
/var/log/www2/access.log
/var/log/www2/access.log.1

  • A. [monitor:///var/log/*/*.log]
  • B. [monitor:///var/log/.../*.log]
  • C. [monitor:///var/log/*/*]
  • D. [monitor:///var/log/.../*]
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
The ellipsis (...) in [monitor:///var/log/.../*.log] allows Splunk to monitor files ending in .log in all
nested directories under /var/log/. [Reference: Splunk Docs on monitor stanza syntax]

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 13

What information is identified during the input phase of the ingestion process?

  • A. Line breaking and timestamp.
  • B. A hash of the message payload.
  • C. Metadata fields like sourcetype and host.
  • D. SRC and DST IP addresses and ports.
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
During the input phase, Splunk assigns metadata fields such as sourcetype, host, and source, which
are critical for data categorization and routing. [Reference: Splunk Docs on data ingestion stages]

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 14

Which of the following would always require raising a support ticket?

  • A. Capacity or configuration changes in Splunk Cloud.
  • B. Search does not return expected results in Splunk Cloud.
  • C. A user is unable to log into Splunk Cloud.
  • D. Data is not indexed in Splunk Cloud.
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
Any modifications in capacity or configurations within Splunk Cloud require an official support ticket,
as they are managed by Splunk Cloud support teams to ensure consistent and secure changes.
[Reference: Splunk Docs on Splunk Cloud support requests]

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 15

Which configuration shown is used to enable a forwarder as a deployment client of the server
10.1.2.3?

  • A. [target-broker:deploymentServer] targetUri = 10.1.2.3:9997
  • B. [target-broker:deploymentserver] targetUri = 10.1.2.3:8089
  • C. [target-broker:deploymentserver] deploymentserver = 10.1.2.3:9997
  • D. [target-broker:deploymentserver] deploymentserver = 10.1.2.3:8089
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
For setting up a deployment client, the correct stanza syntax in inputs.conf includes specifying
targetUri with the port 8089, which is the management port for Splunk instances, not the data port
9997. [Reference: Splunk Docs on deployment server configurations]

Discussions
vote your answer:
A
B
C
D
0 / 1000
To page 2