Weekend Sale Special Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

IBM C1000-162 IBM Security QRadar SIEM V7.5 Analysis Exam Practice Test

Page: 1 / 13
Total 127 questions

IBM Security QRadar SIEM V7.5 Analysis Questions and Answers

Question 1

What right-click menu option can an analyst use to find information about an IP or URL?

Options:

A.

IBM Advanced Threat lookup

B.

Watson Advisor Al IOC Lookup

C.

QRadar Anomaly lookup

D.

X-Force Exchange Lookup

Question 2

Which log source and protocol combination delivers events to QRadar in real time?

Options:

A.

Sophos Enterprise console via JDBC

B.

McAfee ePolicy Orchestrator via JDBC

C.

McAfee ePolicy Orchestrator via SNMP

D.

Solaris Basic Security Mode (BSM) via Log File Protocol

Question 3

A QRadar analyst would like to search for events that have fully matched rules which triggered offenses.

What parameter and value should the analyst add as filter in the event search?

Options:

A.

Associated with Offense is True

B.

Associated with Rule is True

C.

Associated with Rule is False

D.

Associated with Offense is False

Question 4

Which two (2) types of categories comprise events?

Options:

A.

Unsupported

B.

Unfound

C.

Stored

D.

Found

E.

Parsed

Question 5

For a rule containing the test "and when the source is located in this geographic location" to work properly, what must a QRadar analyst configure?

Options:

A.

IBM X-Force Exchange updates

B.

MaxMind updates

C.

IBM X-Force Exchange ATP updates

D.

Watson updates

Question 6

After conducting a thorough analysis, it was discovered that the traffic generated by an attacker targeting one system through many unique events in different categories is legitimate and should not be classified as an offense.

Which tuning methodology guideline can be used to tune out this traffic?

Options:

A.

Edit the Log Source Management app to tune the category

B.

Edit the buildingblocks byusingtheCustomRulesEditor to tune the category

C.

Edit the buildingblocks byusingtheCustomRulesEditor to tune the specific event

D.

Edit the buildingblocks byusingtheCustomRulesEditor to tune the destinationIP address

Question 7

A mapping of a username to a user’s manager can be stored in a Reference Table and output in a search or a report.

Which mechanism could be used to do this?

Options:

A.

Quick Search filters can select users based on their manager’s name.

B.

Reference Table lookup values can be accessed in an advanced search.

C.

Reference Table lookup values can be accessed as custom event properties.

D.

Reference Table lookup values are automatically used whenever a saved search is run.

Question 8

What happens when you select "False Positive" from the right-click menu in the Log Activity tab?

Options:

A.

You can tune out events that are known to be false positives.

B.

You can investigate an IP address or a user name.

C.

Items are filtered that match or do not match the selection.

D.

The selected event is filtered based on the selected parameter in the event.

Question 9

Select all that apply

What is the sequence to create and save a new search called "Offense Data" that shows all the CRE events that are associated with offenses?

Question # 9

Options:

Question 10

What is the effect of toggling the Global/Local option to Global in a Custom Rule?

Options:

A.

It allows a rule to compare events & flows in real time.

B.

It allows a rule to analyze the geographic location of the event source.

C.

It allows rules to be tracked by the central processor for detection by any Event Processor.

D.

It allows a rule to inject new events back into the pipeline to affect and update other incoming events.

Question 11

Which two (2) statements regarding indexed custom event properties are true?

Options:

A.

The indexed filter adds to portions of the data set.

B.

The indexed filter eliminates portions of the data set and reduces the overall data volume and number of event or flow logs that must be searched.

C.

By default, data retention for the index payload is 7 days.

D.

Indexing searches a full event payload for values.

E.

Use indexed event and flow properties to optimize your searches.

Question 12

What is the benefit of using default indexed properties for searching in QRadar?

Options:

A.

It increases the amount of data required to be searched.

B.

It improves the speed of searches.

C.

It returns fewer results than non-indexed properties.

D.

It reduces the number of indexed search values.

Question 13

Which parameters are used to calculate the magnitude rating of an offense?

Options:

A.

Relevance, urgency, credibility

B.

Relevance, credibility, time

C.

Severity, relevance, credibility

D.

Severity, impact, urgency

Question 14

How long will an AQL statement remain in execution if a time criteria is not specified, such as start, end, or last?

Options:

A.

30 minutes

B.

10 minutes

C.

15 minutes

D.

5 minutes

Question 15

What QRadar application can help you ensure that IBM GRadar is optimally configured to detect threats accurately throughout the attack chain?

Options:

A.

Rules Reviewer

B.

Log Source Manager

C.

QRadar Deployment Intelligence

D.

Use Case Manager

Question 16

To test for authorized access to a patent, create a list that uses a custom event property for Patent id as the key, and the username parameter as the value. Data is stored in records that map a key to multiple values and every key is unique. Use this list to populate a list of authorized users.

The example above refers to what kind of reference data collections?

Options:

A.

Reference map of maps

B.

Reference map

C.

Reference map of sets

D.

Reference table

Question 17

Which kind of information do log sources provide?

Options:

A.

User login actions

B.

Operating system updates

C.

Flows generated by users

D.

Router configuration exports.

Question 18

In QRadar. what do event rules test against?

Options:

A.

The parameters of an offense to trigger more responses

B.

Incoming log source data that is processed in real time by the QRadar Event Processor

C.

Incoming flow data that is processed by the QRadar Flow Processor

D.

Event and flow data

Question 19

Which condition is required to display the "Include in my Dashboard" parameter in the Log Activity tab while saving a search?

Options:

A.

Filter the columns that are listed in the Available Columns list and disable the Enable Unique Counts to display the flow counts instead of average counts over Real Time

B.

This parameter is only displayed if the search is grouped

C.

The search must be set to Advanced Search and must be propagated with a high level of confidence

D.

The result limits cannot be empty and not in a group

Question 20

New vulnerability scanners are deployed in the company's infrastructure and generate a high number of offenses. Which function in the Use Case Manager app does an analyst use to update the list of vulnerability scanners?

Question # 20

Options:

Question 21

The magnitude rating of an offense in QRadar is calculated based on which values?

Options:

A.

Relevance, severity, importance

B.

Relevance, credibility, severity

C.

Criticality, severity, importance

D.

Criticality, severity, credibility

Question 22

Which statement regarding the time series chart is true?

Options:

A.

It displays static time series charts that represent the records that match and unmatch a specific time range search

B.

It displays interactive time series charts that represent the records that match a specific time range search

C.

The length of time that is required to export your data depends on the number of parameters specified and hidden

D.

The length of time that is required to export your data depends on the number of parameters specified

Question 23

What does the logical operator != in an AQL query do?

Options:

A.

Compares a property to a value and returns false if they are unequal

B.

Takes a value and raises it to the specified power and returns the result

C.

Sets the value on the left of the operator equal to the right

D.

Compares two values and returns true if they are unequal

Question 24

Which QRadar component provides the user interface that delivers real-time flow views?

Options:

A.

QRadar Viewer

B.

QRadar Console

C.

QRadar Flow Collector

D.

QRadar Flow Processor

Question 25

Which statement regarding saved event search criteria is true?

Options:

A.

Saved search criteria expires

B.

Saved search criteria does not expire

C.

Saved search criteria cannot be reused

D.

You cannot define the name of the saved search criteria

Question 26

Which two (2) tasks are uses of the QRadar network hierarchy?

Options:

A.

Understand network traffic

B.

Monitor traffic and profile the behavior of each group and host within the group

C.

Monitor risky users within your organization

D.

Determine and identify Command and Control systems

E.

Monitor network devices

Question 27

What types of data does a Quick filter search operate on?

Options:

A.

Raw event or flow data

B.

Flow or parsing data

C.

Raw event or processed data

D.

Flow or processed data

Question 28

Which parameter should be used if a security analyst needs to filter events based on the time when they occurred on the endpoints?

Options:

A.

Inspect "Log Time interval"

B.

Evaluate "Storage Time"

C.

Examine "Log Source Time"

D.

Review "Time Period"

Question 29

Which two (2) components are necessary for generating a report using the QRadar Report wizard?

Options:

A.

Saved search

B.

Dynamic search

C.

Layout

D.

Quick search

E.

Email address

Question 30

Which type of rule should you use to test events or (lows for activities that are greater than or less than a specified range?

Options:

A.

Behavioral rules

B.

Anomaly rules

C.

Custom rules

D.

Threshold rules

Question 31

What can be considered a log source type?

Options:

A.

ICMP

B.

SNMP

C.

Juniper IOP

D.

Microsoft SMBtail

Question 32

An analyst wants to implement an AQL search in QRadar. Which two (2) tabs can be used to accomplish this implementation?

Options:

A.

Assets

B.

Vulnerabilities

C.

Log Activity

D.

Offenses

E.

Network Activity

Question 33

How long does QRadar store payload indexes by default?

Options:

A.

7 days

B.

30 days

C.

14 days

D.

90 days

Question 34

Which flow fields should be used to determine how long a session has been active on a network?

Options:

A.

Start time and end time

B.

Start time and storage time

C.

Start time and last packet time

D.

Last packet time and storage time

Question 35

On the Dashboard tab in QRadar. dashboards update real-time data at what interval?

Options:

A.

1 minute

B.

3 minutes

C.

10 minutes

D.

7 minutes

Question 36

When searching for all events related to "Login Failure", which parameter should a security analyst use to filter the events?

Options:

A.

Event Asset Name

B.

Event Collector

C.

Anomaly Detection Event

D.

Event Name

Question 37

What does this example of a YARA rule represent?

Options:

A.

Flags containing hex sequence and str1 less than three times

B.

Flags content that contains the hex sequence, and hex! at least three times

C.

Flags for str1 at an offset of 25 bytes into the file

D.

Flags content that contains the hex sequence, and str1 greater than three times

Question 38

Which action is performed in Edit Search to create a report from Offense data?

Options:

A.

Under Search Parameters, select "Use Offense Data".

B.

In the Select Data Source for report field, select "Offense".

C.

In the Data Source field, type offense.

D.

Under Search Parameters, select "Associated With Offense Equals True".

Page: 1 / 13
Total 127 questions