IBM Security QRadar SIEM V7.5 Analysis Questions and Answers
Which type of rule should you use to test events or (lows for activities that are greater than or less than a specified range?
What are two characteristics of a SIEM? (Choose two.)
What type of building blocks would you use to categorize assets and server types into CIDR/IP ranges to exclude or include entire asset categories in rule tests?
What QRadar application can help you ensure that IBM GRadar is optimally configured to detect threats accurately throughout the attack chain?
Which parameter should be used if a security analyst needs to filter events based on the time when they occurred on the endpoints?
Which two (2) types of categories comprise events?
Which two (2) dashboards in the Pulse app by default?
What is the benefit of using default indexed properties for searching in QRadar?
From the Offense Summary window, how is the list of rules that contributed to a chained offense identified?
In QRadar. what do event rules test against?
Which statement regarding the use of the internal structured language of the QRadar database is true?
Several systems were initially reviewed as active offenses, but further analysis revealed that the traffic generated by these source systems is legitimate and should not contribute to offenses.
How can the activity be fine-tuned when multiple source systems are found to be generating the same event and targeting several systems?
a selection of events for further investigation to somebody who does not have access to the QRadar system.
Which of these approaches provides an accurate copy of the required data in a readable format?
What process is used to perform an IP address X-Force Exchange Lookup in QRadar?
Which two (2) statements regarding indexed custom event properties are true?
What does this example of a YARA rule represent?
rule ibm_forensics : qradar
meta:
description = “Complex Yara rule.“
strings:
Shexl = {4D 2B 68 00 ?? 14 99 F9 B? 00 30 Cl 8D}
Sstrl = "IBM Security!"
condition:
Shexl and (#strl > 3)
A mapping of a username to a user’s manager can be stored in a Reference Table and output in a search or a report.
Which mechanism could be used to do this?
Which parameter is calculated based on the relevance, severity, and credibility of an offense?
A QRadar analyst would like to search for events that have fully matched rules which triggered offenses.
What parameter and value should the analyst add as filter in the event search?
In QRadar. what are building blocks?
What is the name of the data collection set used in QRadar that can be populated with lOCs or other external data?
Which two (2) components are necessary for generating a report using the QRadar Report wizard?
An analyst wants to share a dashboard in the Pulse app with colleagues.
The analyst exports the dashboard by using which format?
Which QRadar component provides the user interface that delivers real-time flow views?
Which reference set data element attribute governs who can view its value?
Reports can be generated by using which file formats in QRadar?
When an analyst is investigating an offense, what is the property that specifies the device that attempts to breach the security of a component on the network?
On the Dashboard tab in QRadar. dashboards update real-time data at what interval?
What does an analyst need to do before configuring the QRadar Use Case Manager app?
What right-click menu option can an analyst use to find information about an IP or URL?
Which action is performed in Edit Search to create a report from Offense data?
What type of custom property should be used when an analyst wants to combine extraction-based URLs, virus names, and secondary user names into a single property?
Which IBM X-Force Exchange feature could be used to query QRadar to see if any of the lOCs were detected for COVID-19 activities?
Which browser is officially supported for QRadar?
New vulnerability scanners are deployed in the company's infrastructure and generate a high number of offenses. Which function in the Use Case Manager app does an analyst use to update the list of vulnerability scanners?
Where can you view a list of events associated with an offense in the Offense Summary window?
What are the behavioral rule test parameter options?
A task is set up to identify events that were missed by the Custom Rule Engine. Which two (2) types of events does an analyst look for?
What types of data does a Quick filter search operate on?
A QRadar analyst is using the Log Activity screen to investigate the events that triggered an offense.
How can the analyst differentiate events that are associated with an offense?
After analyzing an active offense where many source systems were observed connecting to a specific destination via local-to-local LDAP traffic, an ^lyst discovered that the targeted system is a legitimate LDAP server within the organization.
x avoid confusion in future analyses, how can this type of traffic to the target system be flagged as expected and be excluded from further offense ation?