Weekend Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

IBM C1000-162 IBM Security QRadar SIEM V7.5 Analysis Exam Practice Test

Demo: 38 questions
Total 127 questions

IBM Security QRadar SIEM V7.5 Analysis Questions and Answers

Question 1

a selection of events for further investigation to somebody who does not have access to the QRadar system.

Which of these approaches provides an accurate copy of the required data in a readable format?

Options:

A.

Log in to the Command Line Interface and use the ACP tool (/opt/qradar/bin/runjava.sh com.qllabs .ariel. Io.acp) with the necessary AQLfilters and destination directory.

B.

Use the Advanced Search option in the Log Activity tab, run an AQL command: copy (select * from events last 2 hours) to ’output_events.csv’ WITH CSV.

C.

Use the "Event Export (with AQL)" option in the Log Activity tab, test your query with the Test button. Then, to run the export, click Export to CSV.

D.

Use the Log Activity tab, filter the events until only those that you require are shown. Then, from the Actions list, select Export to CSV > Full Export (All Columns).

Question 2

Which two (2) of these custom property expression types are supported in QRadar?

Options:

A.

XLS

B.

YAML

C.

JSON

D.

Regex

E.

HTML

Question 3

Which two (2) statements regarding indexed custom event properties are true?

Options:

A.

The indexed filter adds to portions of the data set.

B.

The indexed filter eliminates portions of the data set and reduces the overall data volume and number of event or flow logs that must be searched.

C.

By default, data retention for the index payload is 7 days.

D.

Indexing searches a full event payload for values.

E.

Use indexed event and flow properties to optimize your searches.

Question 4

What type of rules will test events or flows for volume changes that occur in regular patterns to detect outliers?

Options:

A.

Behavioral rules

B.

Anomaly rules

C.

Custom rules

D.

Threshold rules

Question 5

Which action is performed in Edit Search to create a report from Offense data?

Options:

A.

Under Search Parameters, select "Use Offense Data".

B.

In the Select Data Source for report field, select "Offense".

C.

In the Data Source field, type offense.

D.

Under Search Parameters, select "Associated With Offense Equals True".

Question 6

Which statement regarding the use of the internal structured language of the QRadar database is true?

Options:

A.

Use AQL to extract, filter, and perform actions on event and flow data that you extract from the Ariel database

B.

Use AQL to extract, filter and manipulate event, flow and use cases data from the Ariel database

C.

Use AQL to accelerate and make tuning event and flow data from the Ariel database

D.

Use AQL to accelerate and make tuning event, flow and use cases data from the Ariel database

Question 7

The Use Case Manager app has an option to see MITRE heat map.

Which two (2) factors are responsible for the different colors in MITRE heat map?

Options:

A.

Number of events associated to offense

B.

Number of rules mapped

C.

Level of mapping confidence

D.

Number of offenses generated

E.

Number of log sources associated

Question 8

What does an analyst need to do before configuring the QRadar Use Case Manager app?

Options:

A.

Create a privileged user.

B.

Create an authorized service token.

C.

Check the license agreement.

D.

Run a QRadar health check.

Question 9

What process is used to perform an IP address X-Force Exchange Lookup in QRadar?

Options:

A.

Offense summary tab > right-click IP address > Plugin Option > X-Force Exchange Lookup

B.

Copy the IP address and go to X-Force Exchange to perform the lookup

C.

Run Autoupdate

D.

Run a query on maxmind db

Question 10

On the Log Activity tab in QRadar. what are the options available when right-clicking an IP address of an event to access more event filter information?

Options:

A.

Filter on. False Positive. More Options. Quick Filter

B.

Filter out, False Negative, More Options, Quick Filter

C.

Filter off, True Positive, Less Options, Quick Search

D.

Filter in, True Negative, Less Options. Quick Search

Question 11

What does the Next Run Time column display when a report is queued for generation in QRadar?

Options:

A.

Time the report ran last

B.

Number of times the report ran

C.

Position of the report in the queue

D.

Time it takes to generate the report

Question 12

In QRadar. what do event rules test against?

Options:

A.

The parameters of an offense to trigger more responses

B.

Incoming log source data that is processed in real time by the QRadar Event Processor

C.

Incoming flow data that is processed by the QRadar Flow Processor

D.

Event and flow data

Question 13

When an analyst is investigating an offense, what is the property that specifies the device that attempts to breach the security of a component on the network?

Options:

A.

Source IP

B.

Network

C.

Destination IP

D.

Port

Question 14

What type of custom property should be used when an analyst wants to combine extraction-based URLs, virus names, and secondary user names into a single property?

Options:

A.

AOL-based property

B.

Absolution-based property

C.

Extraction-based property

D.

Calculation-based property

Question 15

From the Offense Summary window, how is the list of rules that contributed to a chained offense identified?

Options:

A.

Select Display > Notes

B.

Select Actions > Rules

C.

Select Display > Rules

D.

Listed in the notes section

Question 16

What is the difference between an unknown event and a stored event?

Options:

A.

Stored events are mapped to the proper log source. Unknown events are collected and parsed.

B.

Stored events are collected and parsed but cannot be mapped or categorized to a specific log source. Unknown events cannot be understood or parsed by QRadar.

C.

Unknown events are mapped to the proper log source. Stored events are collected and parsed.

D.

Unknown events are collected and parsed, but cannot be mapped or categorized to a specific log source and stored events cannot be understood or parsed by QRadar.

Question 17

What QRadar application can help you ensure that IBM GRadar is optimally configured to detect threats accurately throughout the attack chain?

Options:

A.

Rules Reviewer

B.

Log Source Manager

C.

QRadar Deployment Intelligence

D.

Use Case Manager

Question 18

Which statement regarding the time series chart is true?

Options:

A.

It displays static time series charts that represent the records that match and unmatch a specific time range search

B.

It displays interactive time series charts that represent the records that match a specific time range search

C.

The length of time that is required to export your data depends on the number of parameters specified and hidden

D.

The length of time that is required to export your data depends on the number of parameters specified

Question 19

On the Offenses tab, which column explains the cause of the offense?

Options:

A.

Description

B.

Offense Type

C.

Magnitude

D.

IPs

Question 20

Which two high level Event Categories are used by QRadar? (Choose two.)

Options:

A.

Policy

B.

Direction

C.

Localization

D.

Justification

E.

Authentication

Question 21

Which two (2) options are at the top level when an analyst right-clicks on the Source IP or Destination IP that is associated with an offense at the Offense Summary?

Options:

A.

Information

B.

DNS Lookup

C.

Navigate

D.

WHOIS Lookup

E.

Asset Summary page

Question 22

What is the name of the data collection set used in QRadar that can be populated with lOCs or other external data?

Options:

A.

Index set

B.

Reference set

C.

IOC set

D.

Data set

Question 23

What right-click menu option can an analyst use to find information about an IP or URL?

Options:

A.

IBM Advanced Threat lookup

B.

Watson Advisor Al IOC Lookup

C.

QRadar Anomaly lookup

D.

X-Force Exchange Lookup

Question 24

New vulnerability scanners are deployed in the company's infrastructure and generate a high number of offenses. Which function in the Use Case Manager app does an analyst use to update the list of vulnerability scanners?

Options:

Question 25

What does the logical operator != in an AQL query do?

Options:

A.

Compares a property to a value and returns false if they are unequal

B.

Takes a value and raises it to the specified power and returns the result

C.

Sets the value on the left of the operator equal to the right

D.

Compares two values and returns true if they are unequal

Question 26

The Use Case Manager app has an option to see MITRE heat map.

Which two (2) factors are responsible for the different colors in MITRE heat map?

Options:

A.

Number of offenses generated

B.

Number of events associated to offense

C.

Number of rules mapped

D.

Level of mapping confidence

E.

Number of log sources associated

Question 27

When searching for all events related to "Login Failure", which parameter should a security analyst use to filter the events?

Options:

A.

Event Asset Name

B.

Event Collector

C.

Anomaly Detection Event

D.

Event Name

Question 28

A QRadar analyst wants predefined searches, reports, custom rules, and custom properties for HIPAA compliance.

Which option does the QRadar analyst use to look for HIPAA compliance on QRadar?

Options:

A.

Use Case Manager app

B.

QRadar Pulse app

C.

IBM X-Force Exchange portal to download content packs

D.

IBM Fix Central to download new rules

Question 29

Which reference set data element attribute governs who can view its value?

Options:

A.

Tenant Assignment

B.

Origin

C.

Reference Set Management MSSP

D.

Domain

Question 30

An analyst runs a search with correct AQL. but no errors or results are shown.

What is one reason this could occur?

Options:

A.

The Quick Filter option is selected.

B.

The AQL search needs to be saved as a Quick Search before it can display any query.

C.

Microsoft Edge is not a supported browser.

D.

AQL search needs to be enabled in System Settings.

Question 31

What types of data does a Quick filter search operate on?

Options:

A.

Raw event or flow data

B.

Flow or parsing data

C.

Raw event or processed data

D.

Flow or processed data

Question 32

On the Dashboard tab in QRadar. dashboards update real-time data at what interval?

Options:

A.

1 minute

B.

3 minutes

C.

10 minutes

D.

7 minutes

Question 33

Create a list that stores Username as the first key. Source IP as the second key with an assigned cidr data type, and Source Port as the value.

The example above refers to what kind of reference data collections?

Options:

A.

Reference map of sets

B.

Reference store

C.

Reference table

D.

Reference map

Question 34

Which IBM X-Force Exchange feature could be used to query QRadar to see if any of the lOCs were detected for COVID-19 activities?

Options:

A.

TAXI I automatic updates

B.

STIX Bundle

C.

Threat Intelligence ATP

D.

Ami Affected

Question 35

Which flow fields should be used to determine how long a session has been active on a network?

Options:

A.

Start time and end time

B.

Start time and storage time

C.

Start time and last packet time

D.

Last packet time and storage time

Question 36

Which parameter should be used if a security analyst needs to filter events based on the time when they occurred on the endpoints?

Options:

A.

Inspect "Log Time interval"

B.

Evaluate "Storage Time"

C.

Examine "Log Source Time"

D.

Review "Time Period"

Question 37

A mapping of a username to a user’s manager can be stored in a Reference Table and output in a search or a report.

Which mechanism could be used to do this?

Options:

A.

Quick Search filters can select users based on their manager’s name.

B.

Reference Table lookup values can be accessed in an advanced search.

C.

Reference Table lookup values can be accessed as custom event properties.

D.

Reference Table lookup values are automatically used whenever a saved search is run.

Question 38

Which parameters are used to calculate the magnitude rating of an offense?

Options:

A.

Relevance, credibility, time

B.

Severity, relevance, credibility

C.

Relevance, urgency, credibility

D.

Severity, impact, urgency

Demo: 38 questions
Total 127 questions