Which of the following describes enabling smart mode for an aggregation policy?
A
Explanation:
1. From the ITSI main menu, clickConfiguration>Notable Event Aggregation Policies.
2. Select a custom policy or the Default Policy.
3. Under Smart Mode grouping, enableSmart Mode.
4. ClickSelect fields. A dialog displays the fields found in your notable events from the last 24 hours.
Reference:
https://docs.splunk.com/Documentation/ITSI/4.10.2/EA/SmartMode
Which of the following best describes a default deep dive?
D
Reference:
https://docs.splunk.com/Documentation/ITSI/4.10.2/SI/DeepDives
Which index contains ITSI Episodes?
C
Reference:
https://docs.splunk.com/Documentation/ITSI/4.10.2/Configure/IndexOverview
In maintenance mode, which features of KPIs still function?
A
Explanation:
It's a best practice to schedule maintenance windows with a 15- to 30-minute time buffer before and
after you start and stop your maintenance work. This gives the system an opportunity to catch up
with the maintenance state and reduces the chances of ITSI generating false positives during
maintenance operations.
Reference:
https://docs.splunk.com/Documentation/ITSI/4.10.2/Configure/AboutMW
Within a correlation search, dynamic field values can be specified with what syntax?
A
Reference:
https://docs.splunk.com/Documentation/Splunk/8.2.2/Search/Searchindexes
Besides creating notable events, what are the default alert actions a correlation search can execute?
(Choose all that apply.)
B, C, D
Explanation:
Throttling applies to any correlation search alert type, including notable events and actions (RSS
feed, email, run script, and ticketing).
Reference:
https://docs.splunk.com/Documentation/ITSI/4.10.2/EA/ConfigCS
Which capabilities are enabled through “teams”?
A
Explanation:
Teams provide presentation-layer security only and not data-level security. It's still possible for a user
with access to the Splunk search bar to look up ITSI summary index data.
Reference:
https://docs.splunk.com/Documentation/ITSI/4.10.2/Configure/ServicePerms
Which of the following describes a way to delete multiple duplicate entities in ITSI?
A
Explanation:
Import entities from CSV files that contain one or more entity definitions. Importing entities from
CSV files is an efficient way to define multiple entities.
Reference:
https://docs.splunk.com/Documentation/ITSI/4.10.2/Entity/ImportCSV
Which ITSI functions generate notable events? (Choose all that apply.)
A, B, D
Explanation:
After you configure KPI thresholds, you can set up alerts to notify you when aggregate KPI severities
change. ITSI generates notable events in Episode Review based on the alerting rules you configure.
Anomaly detection generates notable events when a KPI IT Service Intelligence (ITSI) deviates from
an expected pattern.
Notable events are typically generated by a correlation search.
Reference:
https://docs.splunk.com/Documentation/ITSI/4.10.2/SI/KPIthresholds
https://docs.splunk.com/Documentation/ITSI/4.10.1/SI/AboutSI
Where are KPI search results stored?
D
Explanation:
Search results are processed, created, and written to the itsi_summary index via an alert action.
Reference:
https://docs.splunk.com/Documentation/ITSI/4.10.2/SI/BaseSearch
Which index is used to store KPI values?
A
Explanation:
The IT Service Intelligence (ITSI) metrics summary index,itsi_summary_metrics, is a metrics-based
summary index that stores KPI data.
Reference:
https://docs.splunk.com/Documentation/ITSI/4.10.2/Configure/MetricsIndexRef
Anomaly detection can be enabled on which one of the following?
A
Explanation:
Enable anomaly detection to identify trends and outliers in KPI search results that might indicate an
issue with your system.
Reference:
https://docs.splunk.com/Documentation/ITSI/4.10.2/SI/AD
What are valid considerations when designing an ITSI Service? (Choose all that apply.)
A, C
Reference:
https://docs.splunk.com/Documentation/ITSI/4.10.2/Configure/ImplementPerms
Which of the following are deployment recommendations for ITSI? (Choose all that apply.)
A, B, C
Explanation:
You might need to increase the hardware specifications of your own Enterprise Security deployment
above the minimum hardware requirements depending on your environment.
Install Splunk Enterprise Security on a dedicated search head or search head cluster.
The Splunk platform uses indexers to scale horizontally. The number of indexers required in an
Enterprise Security deployment varies based on the data volume, data type, retention requirements,
search type, and search concurrency.
Reference:
https://docs.splunk.com/Documentation/ES/latest/Install/DeploymentPlanning
Which of the following is a recommended best practice for service and glass table design?
D
Reference:
https://docs.splunk.com/Documentation/ITSI/4.10.2/SI/GTOverview