Labour Day Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > IBM > IBM Security > C1000-162

C1000-162 IBM Security QRadar SIEM V7.5 Analysis Question and Answers

Question # 4

Which are two (2) types of charts that can be configured in QRadar to display data on the dashboard?

azureindia.starttest.com says

A.

Radar.0K. Jo confirm your answer(S) and proceed to the next question.

B.

LineClick ’Cancel’ to remain on this question.

C.

Bar

D.

Table

E.

Combo

Full Access
Question # 5

On the Offenses tab, which column explains the cause of the offense?

A.

Description

B.

Offense Type

C.

Magnitude

D.

IPs

Full Access
Question # 6

Which parameters are used to calculate the magnitude rating of an offense?

A.

Relevance, urgency, credibility

B.

Relevance, credibility, time

C.

Severity, relevance, credibility

D.

Severity, impact, urgency

Full Access
Question # 7

The Use Case Manager app has an option to see MITRE heat map.

Which two (2) factors are responsible for the different colors in MITRE heat map?

A.

Number of offenses generated

B.

Number of events associated to offense

C.

Number of rules mapped

D.

Level of mapping confidence

E.

Number of log sources associated

Full Access
Question # 8

a selection of events for further investigation to somebody who does not have access to the QRadar system.

Which of these approaches provides an accurate copy of the required data in a readable format?

A.

Log in to the Command Line Interface and use the ACP tool (/opt/qradar/bin/runjava.sh com.qllabs .ariel. Io.acp) with the necessary AQLfilters and destination directory.

B.

Use the Advanced Search option in the Log Activity tab, run an AQL command: copy (select * from events last 2 hours) to ’output_events.csv’ WITH CSV.

C.

Use the "Event Export (with AQL)" option in the Log Activity tab, test your query with the Test button. Then, to run the export, click Export to CSV.

D.

Use the Log Activity tab, filter the events until only those that you require are shown. Then, from the Actions list, select Export to CSV > Full Export (All Columns).

Full Access
Question # 9

What is the benefit of using default indexed properties for searching in QRadar?

A.

It increases the amount of data required to be searched.

B.

It improves the speed of searches.

C.

It returns fewer results than non-indexed properties.

D.

It reduces the number of indexed search values.

Full Access
Question # 10

What does the Next Run Time column display when a report is queued for generation in QRadar?

A.

Time the report ran last

B.

Number of times the report ran

C.

Position of the report in the queue

D.

Time it takes to generate the report

Full Access
Question # 11

Which parameters are used to calculate the magnitude rating of an offense?

A.

Relevance, credibility, time

B.

Severity, relevance, credibility

C.

Relevance, urgency, credibility

D.

Severity, impact, urgency

Full Access
Question # 12

Which kind of information do log sources provide?

A.

User login actions

B.

Operating system updates

C.

Flows generated by users

D.

Router configuration exports.

Full Access
Question # 13

Which two (2) are valid options available for configuring the frequency of report execution in the QRadar Report wizard?

A.

Quarterly

B.

Automatically

C.

Monthly

D.

Yearly

E.

Manually

Full Access
Question # 14

What QRadar application can help you ensure that IBM GRadar is optimally configured to detect threats accurately throughout the attack chain?

A.

Rules Reviewer

B.

Log Source Manager

C.

QRadar Deployment Intelligence

D.

Use Case Manager

Full Access
Question # 15

Which statement regarding the time series chart is true?

A.

It displays static time series charts that represent the records that match and unmatch a specific time range search

B.

It displays interactive time series charts that represent the records that match a specific time range search

C.

The length of time that is required to export your data depends on the number of parameters specified and hidden

D.

The length of time that is required to export your data depends on the number of parameters specified

Full Access
Question # 16

After how much time will QRadar mark an Event offense dormant if no new events or flows occur?

A.

2 hours

B.

30 minutes

C.

24 hours

D.

5 minutes

Full Access
Question # 17

Which IBM X-Force Exchange feature could be used to query QRadar to see if any of the lOCs were detected for COVID-19 activities?

A.

TAXI I automatic updates

B.

STIX Bundle

C.

Threat Intelligence ATP

D.

Ami Affected

Full Access
Question # 18

What does an analyst need to do before configuring the QRadar Use Case Manager app?

A.

Create a privileged user.

B.

Create an authorized service token.

C.

Check the license agreement.

D.

Run a QRadar health check.

Full Access
Question # 19

How can an analyst improve the speed of searches in QRadar?

A.

Narrow the overall data by adding an indexed field in the search query.

B.

Increase the overall data in the search query.

C.

Use Index Management to disable indexing.

D.

Remove all indexed fields from the search query.

Full Access
Question # 20

What type of rules will test events or flows for volume changes that occur in regular patterns to detect outliers?

A.

Behavioral rules

B.

Anomaly rules

C.

Custom rules

D.

Threshold rules

Full Access
Question # 21

What type of custom property should be used when an analyst wants to combine extraction-based URLs, virus names, and secondary user names into a single property?

A.

AOL-based property

B.

Absolution-based property

C.

Extraction-based property

D.

Calculation-based property

Full Access
Question # 22

Which reference set data element attribute governs who can view its value?

A.

Tenant Assignment

B.

Origin

C.

Reference Set Management MSSP

D.

Domain

Full Access
Question # 23

Which two (2) options are used to search offense data on the By Networks page?

A.

Raw/Flows

B.

Events/Flows

C.

NetIP

D.

Severity

E.

Network

Full Access
Question # 24

Which statement regarding the use of the internal structured language of the QRadar database is true?

A.

Use AQL to extract, filter, and perform actions on event and flow data that you extract from the Ariel database

B.

Use AQL to extract, filter and manipulate event, flow and use cases data from the Ariel database

C.

Use AQL to accelerate and make tuning event and flow data from the Ariel database

D.

Use AQL to accelerate and make tuning event, flow and use cases data from the Ariel database

Full Access
Question # 25

What feature in QRadar uses existing asset profile data so administrators can define unknown server types and assign them to a server definition in building blocks and in the network hierarchy?

A.

Server roles

B.

Active servers

C.

Server discovery

D.

Server profiles

Full Access
Question # 26

Which type of rule should you use to test events or (lows for activities that are greater than or less than a specified range?

A.

Behavioral rules

B.

Anomaly rules

C.

Custom rules

D.

Threshold rules

Full Access
Question # 27

Create a list that stores Username as the first key. Source IP as the second key with an assigned cidr data type, and Source Port as the value.

The example above refers to what kind of reference data collections?

A.

Reference map of sets

B.

Reference store

C.

Reference table

D.

Reference map

Full Access
Question # 28

How long will an AQL statement remain in execution if a time criteria is not specified, such as start, end, or last?

A.

30 minutes

B.

10 minutes

C.

15 minutes

D.

5 minutes

Full Access
Question # 29

Which two (2) components are necessary for generating a report using the QRadar Report wizard?

A.

Saved search

B.

Dynamic search

C.

Layout

D.

Quick search

E.

Email address

Full Access
Question # 30

Which of these statements regarding the deletion of a generated content report is true?

A.

Only specific reports that were not generated from the report template as well as the report template are deleted.

B.

All reports that were generated from the report template are deleted, but the report template is retained.

C.

All reports that were generated from the report template as well as the report template are deleted.

D.

Only specific reports that were not generated from the report template are deleted, but the report template is retained.

Full Access
Question # 31

Which two (2) AQL functions are used for calculations and formatting?

A.

INCIDR

B.

START

C.

LOWER

D.

STRLEN

E.

GROUP BY

Full Access
Question # 32

A Security Analyst has noticed that an offense has been marked inactive.

How long had the offense been open since it had last been updated with new events or flows?

A.

1 day + 30 minutes

B.

5 days + 30 minutes

C.

10 days + 30 minutes

D.

30 days + 30 minutes

Full Access
Question # 33

Which flow fields should be used to determine how long a session has been active on a network?

A.

Start time and end time

B.

Start time and storage time

C.

Start time and last packet time

D.

Last packet time and storage time

Full Access
Question # 34

A Security Analyst was asked to search for an offense on a specific day. The requester was not sore of the time frame, but had Source Host information to use as well as networks involved, Destination IP and username.

Which fitters can the Security Analyst use to search for the information requested?

A.

Offense ID, Source IP, Username

B.

Magnitude, Source IP, Destination IP

C.

Description, Destination IP. Host Name

D.

Specific Interval, Username, Destination IP

Full Access
Question # 35

What process is used to perform an IP address X-Force Exchange Lookup in QRadar?

A.

Offense summary tab > right-click IP address > Plugin Option > X-Force Exchange Lookup

B.

Copy the IP address and go to X-Force Exchange to perform the lookup

C.

Run Autoupdate

D.

Run a query on maxmind db

Full Access
Question # 36

QRadar analysts can download different types of content extensions from the IBM X-Force Exchange portal. Which two (2) types of content extensions are supported by QRadar?

A.

Custom Functions

B.

Events

C.

Flows

D.

FGroup

E.

Offenses

Full Access
Question # 37

An analyst wishes to review an event which has a rules test against both event and flow data.

What kind of rule is this?

A.

Anomaly rules

B.

Threshold rules

C.

Offense rules

D.

Common rules

Full Access
Question # 38

What are the behavioral rule test parameter options?

A.

Behavioral rule. Current traffic level, Predicted value

B.

Season, Anomaly detection. Current traffic trend

C.

Season, Current traffic level, Predicted value

D.

Current traffic behavior. Behavioral rule. Current traffic level

Full Access