<< Prev Question Next Question >>

Question 10/30

The following sample log event shows evidence of credit card numbers being present in the transactions. loc file.

Which of these SEDCM3 settings will mask this and other suspected credit card numbers with an Y character for each character being masked? The indexed event should be formatted as follows:

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (30q)
Question 1: When is data deleted from a Splunk Cloud index?...
Question 2: Which of the following are features of a managed Splunk Clou...
Question 3: Where is the recommended place to deploy input apps that are...
Question 4: Which of the following is the default bandwidth limit in the...
Question 5: When monitoring network inputs, there will be times when the...
Question 6: Which statement is true about monitor inputs?...
Question 7: Which monitor statement will retrieve only files that start ...
Question 8: In which of the following situations should Splunk Support b...
Question 9: A customer wants to mask unstructured data before sending it...
Question 10: The following sample log event shows evidence of credit card...
Question 11: Which of the following statements is true about data transfo...
Question 12: Which of the following takes place during the input phase?...
Question 13: What is the recommended method to test the onboarding of a n...
Question 14: In what scenarios would transforms.conf be used?...
Question 15: Where does the regex replacement processor run?...
Question 16: In which file can the SH0ULD_LINEMERCE setting be modified?...
Question 17: Which of the following tasks is not managed by the Splunk Cl...
Question 18: What is the recommended approach to collect data from networ...
Question 19: Which of the following is true when integrating LDAP authent...
Question 20: Which of the following is a valid stanza in props. conf?...
Question 21: When a forwarder phones home to a Deployment Server it compa...
Question 22: Which of the following is an accurate statement about the de...
Question 23: Which of the following is not a path used by Splunk to execu...
Question 24: Which of the following stanzas would enable a TCP input on p...
Question 25: What is a private app?
Question 26: Which of the following app installation scenarios can be ach...
Question 27: Files from multiple systems are being stored on a centralize...
Question 28: What can be used in a Splunk Cloud environment to create new...
Question 29: Which file or folder below is not a required part of a deplo...
Question 30: The following Apache access log is being ingested into Splun...