Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dumps65

IBM C1000-162 Dumps

Page: 1 / 14
Total 139 questions

IBM Security QRadar SIEM V7.5 Analysis Questions and Answers

Question 1

Which type of rule should you use to test events or (lows for activities that are greater than or less than a specified range?

Options:

A.

Behavioral rules

B.

Anomaly rules

C.

Custom rules

D.

Threshold rules

Question 2

What are two characteristics of a SIEM? (Choose two.)

Options:

A.

Log Management

B.

System Deployment

C.

Endpoint Software patching

D.

Enterprise User management

E.

Event Normalization & Correlation

Question 3

What type of building blocks would you use to categorize assets and server types into CIDR/IP ranges to exclude or include entire asset categories in rule tests?

Options:

A.

User tuning

B.

Category definition

C.

Policy

D.

Host definition

Question 4

What QRadar application can help you ensure that IBM GRadar is optimally configured to detect threats accurately throughout the attack chain?

Options:

A.

Rules Reviewer

B.

Log Source Manager

C.

QRadar Deployment Intelligence

D.

Use Case Manager

Question 5

Which parameter should be used if a security analyst needs to filter events based on the time when they occurred on the endpoints?

Options:

A.

Inspect "Log Time interval"

B.

Evaluate "Storage Time"

C.

Examine "Log Source Time"

D.

Review "Time Period"

Question 6

Which two (2) types of categories comprise events?

Options:

A.

Unsupported

B.

Unfound

C.

Stored

D.

Found

E.

Parsed

Question 7

Which two (2) dashboards in the Pulse app by default?

Options:

A.

Active threats

B.

System metrics

C.

Summary view

D.

Compliance overview

E.

Offense overview

Question 8

What is the benefit of using default indexed properties for searching in QRadar?

Options:

A.

It increases the amount of data required to be searched.

B.

It improves the speed of searches.

C.

It returns fewer results than non-indexed properties.

D.

It reduces the number of indexed search values.

Question 9

From the Offense Summary window, how is the list of rules that contributed to a chained offense identified?

Options:

A.

Select Display > Notes

B.

Select Actions > Rules

C.

Select Display > Rules

D.

Listed in the notes section

Question 10

In QRadar. what do event rules test against?

Options:

A.

The parameters of an offense to trigger more responses

B.

Incoming log source data that is processed in real time by the QRadar Event Processor

C.

Incoming flow data that is processed by the QRadar Flow Processor

D.

Event and flow data

Question 11

Which statement regarding the use of the internal structured language of the QRadar database is true?

Options:

A.

Use AQL to extract, filter, and perform actions on event and flow data that you extract from the Ariel database

B.

Use AQL to extract, filter and manipulate event, flow and use cases data from the Ariel database

C.

Use AQL to accelerate and make tuning event and flow data from the Ariel database

D.

Use AQL to accelerate and make tuning event, flow and use cases data from the Ariel database

Question 12

Several systems were initially reviewed as active offenses, but further analysis revealed that the traffic generated by these source systems is legitimate and should not contribute to offenses.

How can the activity be fine-tuned when multiple source systems are found to be generating the same event and targeting several systems?

Options:

A.

Edit the building blocks by using the Custom Rules Editor to tune out a destination IP

B.

Use the Log Source Management app to tune the event

C.

Edit the building blocks by using the Custom Rules Editor to tune out the specific event

D.

Edit the building blocks by using the Custom Rules Editor to tune out a source IP

Question 13

a selection of events for further investigation to somebody who does not have access to the QRadar system.

Which of these approaches provides an accurate copy of the required data in a readable format?

Options:

A.

Log in to the Command Line Interface and use the ACP tool (/opt/qradar/bin/runjava.sh com.qllabs .ariel. Io.acp) with the necessary AQLfilters and destination directory.

B.

Use the Advanced Search option in the Log Activity tab, run an AQL command: copy (select * from events last 2 hours) to ’output_events.csv’ WITH CSV.

C.

Use the "Event Export (with AQL)" option in the Log Activity tab, test your query with the Test button. Then, to run the export, click Export to CSV.

D.

Use the Log Activity tab, filter the events until only those that you require are shown. Then, from the Actions list, select Export to CSV > Full Export (All Columns).

Question 14

What process is used to perform an IP address X-Force Exchange Lookup in QRadar?

Options:

A.

Offense summary tab > right-click IP address > Plugin Option > X-Force Exchange Lookup

B.

Copy the IP address and go to X-Force Exchange to perform the lookup

C.

Run Autoupdate

D.

Run a query on maxmind db

Question 15

Which two (2) statements regarding indexed custom event properties are true?

Options:

A.

The indexed filter adds to portions of the data set.

B.

The indexed filter eliminates portions of the data set and reduces the overall data volume and number of event or flow logs that must be searched.

C.

By default, data retention for the index payload is 7 days.

D.

Indexing searches a full event payload for values.

E.

Use indexed event and flow properties to optimize your searches.

Question 16

What does this example of a YARA rule represent?

rule ibm_forensics : qradar

meta:

description = “Complex Yara rule.“

strings:

Shexl = {4D 2B 68 00 ?? 14 99 F9 B? 00 30 Cl 8D}

Sstrl = "IBM Security!"

condition:

Shexl and (#strl > 3)

Options:

A.

Flags content that contains the hex sequence, and hex1 at least three times

B.

Flags containing hex sequence and str1 less than three times

C.

Flags for str 1 at an offset of 25 bytes into the file

D.

Flags content that contains the hex sequence, and str1 greater than three times

Question 17

A mapping of a username to a user’s manager can be stored in a Reference Table and output in a search or a report.

Which mechanism could be used to do this?

Options:

A.

Quick Search filters can select users based on their manager’s name.

B.

Reference Table lookup values can be accessed in an advanced search.

C.

Reference Table lookup values can be accessed as custom event properties.

D.

Reference Table lookup values are automatically used whenever a saved search is run.

Question 18

Which parameter is calculated based on the relevance, severity, and credibility of an offense?

Options:

A.

Magnitude rating

B.

Severity age

C.

Impact rating

Question 19

A QRadar analyst would like to search for events that have fully matched rules which triggered offenses.

What parameter and value should the analyst add as filter in the event search?

Options:

A.

Associated with Offense is True

B.

Associated with Rule is True

C.

Associated with Rule is False

D.

Associated with Offense is False

Question 20

In QRadar. what are building blocks?

Options:

A.

A rule under the rule group "System”

B.

A collection of tests that don't result in a response or an action

C.

A network hierarchy node

D.

An entry in the reference set named "System Entries"

Question 21

What is the name of the data collection set used in QRadar that can be populated with lOCs or other external data?

Options:

A.

Index set

B.

Reference set

C.

IOC set

D.

Data set

Question 22

Which two (2) components are necessary for generating a report using the QRadar Report wizard?

Options:

A.

Saved search

B.

Dynamic search

C.

Layout

D.

Quick search

E.

Email address

Question 23

An analyst wants to share a dashboard in the Pulse app with colleagues.

The analyst exports the dashboard by using which format?

Options:

A.

CSV

B.

JSON

C.

XML

D.

PHP

Question 24

Which QRadar component provides the user interface that delivers real-time flow views?

Options:

A.

QRadar Viewer

B.

QRadar Console

C.

QRadar Flow Collector

D.

QRadar Flow Processor

Question 25

Which reference set data element attribute governs who can view its value?

Options:

A.

Tenant Assignment

B.

Origin

C.

Reference Set Management MSSP

D.

Domain

Question 26

Reports can be generated by using which file formats in QRadar?

Options:

A.

PDF, HTML, XML, XLS

B.

JPG, GIF, BMP, TIF

C.

TXT, PNG, DOC, XML

D.

CSV, XLSX, DOCX, PDF

Question 27

When an analyst is investigating an offense, what is the property that specifies the device that attempts to breach the security of a component on the network?

Options:

A.

Source IP

B.

Network

C.

Destination IP

D.

Port

Question 28

On the Dashboard tab in QRadar. dashboards update real-time data at what interval?

Options:

A.

1 minute

B.

3 minutes

C.

10 minutes

D.

7 minutes

Question 29

What does an analyst need to do before configuring the QRadar Use Case Manager app?

Options:

A.

Create a privileged user.

B.

Create an authorized service token.

C.

Check the license agreement.

D.

Run a QRadar health check.

Question 30

What right-click menu option can an analyst use to find information about an IP or URL?

Options:

A.

IBM Advanced Threat lookup

B.

Watson Advisor Al IOC Lookup

C.

QRadar Anomaly lookup

D.

X-Force Exchange Lookup

Question 31

Which action is performed in Edit Search to create a report from Offense data?

Options:

A.

Under Search Parameters, select "Use Offense Data".

B.

In the Select Data Source for report field, select "Offense".

C.

In the Data Source field, type offense.

D.

Under Search Parameters, select "Associated With Offense Equals True".

Question 32

What type of custom property should be used when an analyst wants to combine extraction-based URLs, virus names, and secondary user names into a single property?

Options:

A.

AOL-based property

B.

Absolution-based property

C.

Extraction-based property

D.

Calculation-based property

Question 33

Which IBM X-Force Exchange feature could be used to query QRadar to see if any of the lOCs were detected for COVID-19 activities?

Options:

A.

TAXI I automatic updates

B.

STIX Bundle

C.

Threat Intelligence ATP

D.

Ami Affected

Question 34

Which browser is officially supported for QRadar?

Options:

A.

Safari version 9.0-3

B.

Chromium version 33

C.

32-bit Internet Explorer 9

D.

Firefox version 38.0 ESR

Question 35

New vulnerability scanners are deployed in the company's infrastructure and generate a high number of offenses. Which function in the Use Case Manager app does an analyst use to update the list of vulnerability scanners?

as

Options:

Question 36

Where can you view a list of events associated with an offense in the Offense Summary window?

Options:

A.

Destination IPs

B.

Events from Event/Flow count column

C.

Display > Destination IPs

D.

Source IPs

Question 37

What are the behavioral rule test parameter options?

Options:

A.

Behavioral rule. Current traffic level, Predicted value

B.

Season, Anomaly detection. Current traffic trend

C.

Season, Current traffic level, Predicted value

D.

Current traffic behavior. Behavioral rule. Current traffic level

Question 38

A task is set up to identify events that were missed by the Custom Rule Engine. Which two (2) types of events does an analyst look for?

Options:

A.

Log Only Events sent to a Data Store

B.

High Level Category: User Defined Events

C.

Forwarded Events to different destination

D.

High Level Category Unknown Events

E.

Low Level Category: Stored Events

Question 39

What types of data does a Quick filter search operate on?

Options:

A.

Raw event or flow data

B.

Flow or parsing data

C.

Raw event or processed data

D.

Flow or processed data

Question 40

A QRadar analyst is using the Log Activity screen to investigate the events that triggered an offense.

How can the analyst differentiate events that are associated with an offense?

Options:

A.

A red star icon in the first column of event list indicates a fully-matched event

B.

Fully matched events are not indexed

C.

Separate columns named 'Paritally matched’ and 'Fully matched' are populated

D.

Partially matched events are not indexed

Question 41

After analyzing an active offense where many source systems were observed connecting to a specific destination via local-to-local LDAP traffic, an ^lyst discovered that the targeted system is a legitimate LDAP server within the organization.

x avoid confusion in future analyses, how can this type of traffic to the target system be flagged as expected and be excluded from further offense ation?

Options:

A.

Add the IP address of the LDAP server to the BB:Host Definition: LDAP Servers building block.

B.

Remove the IP address of the source systems from the Global False Positive Events building block.

C.

Add the IP address of the source systems to the All Default Positive building block.

D.

Remove the IP address of the LDAP server from the network hierarchy.

Page: 1 / 14
Total 139 questions