Professional Documents
Culture Documents
Answer Sheet-Splunk Fields and SPL
Answer Sheet-Splunk Fields and SPL
3 Q1: What is the difference between the search “status != 200” and “NOT
status = 200”
status != 200 returns events where status field exists and value in field doesn't
equal to 200. Whereas NOT status = 200 returns events where status field
exists and value in field doesn't equal 200 and all events where status field
doesn't exist.
3 Q2: Why it is better to place “dedup” (the command used for removing
duplicates) as early as possible in a search?
Dedup or data deduplication is a process that eliminates excessive copies of
data and significantly decreases storage capacity requirements so that you can
do efficient field search.
3 (2) Take a screenshot of your current search box and paste it in the
answer sheet.
3 Step 2:
(3) Add a table command to your search, and take a screenshot of your
search and paste it to answer sheet.
3 (4) Add a rename command to your search, and take a screenshot of
your search and paste it to answer sheet.
Post- 5 Q1: Recall what you learned in Splunk training Module 7, answer the
Lab following questions:
Questio In one paragraph, summarize the best practice of running Splunk Search.
ns (You can also refer to this webpage:
https://www.splunk.com/en_us/blog/customers/splunk-clara-fication-
search-best-practices.html)
3 Q2: In one paragraph, explain why Splunk search can be useful during IR
investigation.
Splunk will be very beneficial during IR investigation. The reason is
Splunk is able to check all the details of the data through their log for any
possible of malicious activity. Also Splunk search can be useful during IR
investigation because Splunk search has the ability to use time to limit the
events returned. Also, Splunk search can run search in real time and real
time searches allow investigator to monitor what happening in the data
during IR investigation in real time stream of information