Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: geek65

C1000-162 IBM Security QRadar SIEM V7.5 Analysis Questions and Answers

Questions 4

After analyzing an active offense where many source systems were observed connecting to a specific destination via local-to-local LDAP traffic, an ^lyst discovered that the targeted system is a legitimate LDAP server within the organization.

x avoid confusion in future analyses, how can this type of traffic to the target system be flagged as expected and be excluded from further offense ation?

Options:

A.

Add the IP address of the LDAP server to the BB:Host Definition: LDAP Servers building block.

B.

Remove the IP address of the source systems from the Global False Positive Events building block.

C.

Add the IP address of the source systems to the All Default Positive building block.

D.

Remove the IP address of the LDAP server from the network hierarchy.

Buy Now
Questions 5

Which QRadar component provides the user interface that delivers real-time flow views?

Options:

A.

QRadar Viewer

B.

QRadar Console

C.

QRadar Flow Collector

D.

QRadar Flow Processor

Buy Now
Questions 6

Which IBM X-Force Exchange feature could be used to query QRadar to see if any of the lOCs were detected for COVID-19 activities?

Options:

A.

TAXI I automatic updates

B.

STIX Bundle

C.

Threat Intelligence ATP

D.

Ami Affected

Buy Now
Questions 7

Which parameter should be used if a security analyst needs to filter events based on the time when they occurred on the endpoints?

Options:

A.

Inspect "Log Time interval"

B.

Evaluate "Storage Time"

C.

Examine "Log Source Time"

D.

Review "Time Period"

Buy Now
Questions 8

In Rule Response, which two (2) options are available for Offense Naming?

Options:

A.

This information should be removed from the current name of the associated offenses

B.

This information should contribute to (he name of the associated offenses

C.

This information should set or replace the name of the associated offenses

D.

This information should contribute to the dispatched event name of the associated offenses.

E.

This information should contribute to the category naming of the associated offenses

Buy Now
Questions 9

What does this example of a YARA rule represent?

Options:

A.

Flags containing hex sequence and str1 less than three times

B.

Flags content that contains the hex sequence, and hex! at least three times

C.

Flags for str1 at an offset of 25 bytes into the file

D.

Flags content that contains the hex sequence, and str1 greater than three times

Buy Now
Questions 10

What is the name of the data collection set used in QRadar that can be populated with lOCs or other external data?

Options:

A.

Index set

B.

Reference set

C.

IOC set

D.

Data set

Buy Now
Questions 11

An analyst wants to implement an AQL search in QRadar. Which two (2) tabs can be used to accomplish this implementation?

Options:

A.

Assets

B.

Vulnerabilities

C.

Log Activity

D.

Offenses

E.

Network Activity

Buy Now
Questions 12

Which two (2) options are at the top level when an analyst right-clicks on the Source IP or Destination IP that is associated with an offense at the Offense Summary?

Options:

A.

Information

B.

Asset Summary page

C.

Navigate

D.

WHOIS Lookup

E.

DNS Lookup

Buy Now
Questions 13

Many offenses are generated and an analyst confirms that they match some kind of vulnerability scanning.

Which building block group needs to be updated to include the source IP of the vulnerability assessment (VA) scanner to reduce the number of offenses that are being generated?

Options:

A.

Host reference

B.

Host definitions

C.

Behavior definition

D.

Device definition

Buy Now
Questions 14

A new log source was configured to send events to QRadar to help detect a malware outbreak. A security analyst has to create an offense based on properties from this payload but not all the information is parsed correctly.

What is the sequence of steps to ensure that the correct information is pulled from the payload to use in a rule?

Options:

Buy Now
Questions 15

On the Log Activity tab in QRadar. what are the options available when right-clicking an IP address of an event to access more event filter information?

Options:

A.

Filter on. False Positive. More Options. Quick Filter

B.

Filter out, False Negative, More Options, Quick Filter

C.

Filter off, True Positive, Less Options, Quick Search

D.

Filter in, True Negative, Less Options. Quick Search

Buy Now
Questions 16

What type of custom property should be used when an analyst wants to combine extraction-based URLs, virus names, and secondary user names into a single property?

Options:

A.

AOL-based property

B.

Absolution-based property

C.

Extraction-based property

D.

Calculation-based property

Buy Now
Questions 17

Which action is performed in Edit Search to create a report from Offense data?

Options:

A.

Under Search Parameters, select "Use Offense Data".

B.

In the Select Data Source for report field, select "Offense".

C.

In the Data Source field, type offense.

D.

Under Search Parameters, select "Associated With Offense Equals True".

Buy Now
Questions 18

What does the Next Run Time column display when a report is queued for generation in QRadar?

Options:

A.

Time the report ran last

B.

Number of times the report ran

C.

Position of the report in the queue

D.

Time it takes to generate the report

Buy Now
Questions 19

For a rule containing the test "and when the source is located in this geographic location" to work properly, what must a QRadar analyst configure?

Options:

A.

IBM X-Force Exchange updates

B.

MaxMind updates

C.

IBM X-Force Exchange ATP updates

D.

Watson updates

Buy Now
Questions 20

Create a list that stores Username as the first key. Source IP as the second key with an assigned cidr data type, and Source Port as the value.

The example above refers to what kind of reference data collections?

Options:

A.

Reference map of sets

B.

Reference store

C.

Reference table

D.

Reference map

Buy Now
Questions 21

A QRadar analyst develops an advanced search on the Log Activity tab and presses the shortcut "Ctrl + Space" in the search field. What information is displayed?

Options:

A.

The full list of AQL databases, functions and fields (properties) is displayed.

B.

The full list of AQL tables and relationships from a database is displayed.

C.

The full list of AOL functions, fields (properties), and keywords is displayed.

D.

The full list of AQL functions, tables, and views from a database is displayed.

Buy Now
Questions 22

A QRadar analyst wants to limit the time period for which an AOL query is evaluated. Which functions and clauses could be used for this?

Options:

A.

START, BETWEEN. LAST. NOW. PARSEDATETIME

B.

START, STOP. LAST, NOW, PARSEDATETIME

C.

START. STOP. BETWEEN, FIRST

D.

START, STOP. BETWEEN, LAST

Buy Now
Questions 23

What are two (2) axis types available when creating a time series chart?

Options:

A.

Circular

B.

Crossed

C.

Linear

D.

Log

E.

Flat''

Buy Now
Questions 24

What can be considered a log source type?

Options:

A.

ICMP

B.

SNMP

C.

Juniper IOP

D.

Microsoft SMBtail

Buy Now
Questions 25

The Pulse app contains which two (2) widget chart types?

Options:

A.

Small number chart

B.

Hexadecimal chart

C.

Binary chart

D.

Scatter chart

E.

Big number chart

Buy Now
Questions 26

What is the benefit of using default indexed properties for searching in QRadar?

Options:

A.

It increases the amount of data required to be searched.

B.

It improves the speed of searches.

C.

It returns fewer results than non-indexed properties.

D.

It reduces the number of indexed search values.

Buy Now
Questions 27

Which browser is officially supported for QRadar?

Options:

A.

Safari version 9.0-3

B.

Chromium version 33

C.

32-bit Internet Explorer 9

D.

Firefox version 38.0 ESR

Buy Now
Questions 28

Which types of information does QRadar analyze to create an offense from the rule?

Options:

A.

Known vulnerabilities, known threats, and incoming and outgoing events

B.

Incoming and outgoing events, unknown vulnerabilities, and malware

C.

Malware, asset, firewall, and incoming events

D.

Incoming events and flows, asset information, and known vulnerabilities

Buy Now
Questions 29

What are two (2) Y-axis types that are available in the scatter chart type in the Pulse app?

Options:

A.

Linear

B.

Log

C.

General

D.

Threshold

E.

Dynamic

Buy Now
Questions 30

Which two (2) values are valid for the Offense Type field when a search is performed in the My Offenses or All Offenses tabs?

Options:

A.

QID

B.

Any

C.

Risk Score

D.

DDoS

E.

Source IP

Buy Now
Questions 31

Which two (2) options are used to search offense data on the By Networks page?

Options:

A.

Raw/Flows

B.

Events/Flows

C.

NetIP

D.

Severity

E.

Network

Buy Now
Questions 32

What does an analyst need to do before configuring the QRadar Use Case Manager app?

Options:

A.

Create a privileged user.

B.

Create an authorized service token.

C.

Check the license agreement.

D.

Run a QRadar health check.

Buy Now
Questions 33

On the Dashboard tab in QRadar. dashboards update real-time data at what interval?

Options:

A.

1 minute

B.

3 minutes

C.

10 minutes

D.

7 minutes

Buy Now
Questions 34

What is the difference between an unknown event and a stored event?

Options:

A.

Stored events are mapped to the proper log source. Unknown events are collected and parsed.

B.

Stored events are collected and parsed but cannot be mapped or categorized to a specific log source. Unknown events cannot be understood or parsed by QRadar.

C.

Unknown events are mapped to the proper log source. Stored events are collected and parsed.

D.

Unknown events are collected and parsed, but cannot be mapped or categorized to a specific log source and stored events cannot be understood or parsed by QRadar.

Buy Now
Questions 35

What is the default number of notifications that the System Notification dashboard can display?

Options:

A.

50 notifications

B.

20 notifications

C.

10 notifications

D.

5 notifications

Buy Now
Questions 36

What type of building blocks would you use to categorize assets and server types into CIDR/IP ranges to exclude or include entire asset categories in rule tests?

Options:

A.

User tuning

B.

Category definition

C.

Policy

D.

Host definition

Buy Now
Questions 37

From the Offense Summary window, how is the list of rules that contributed to a chained offense identified?

Options:

A.

Select Display > Notes

B.

Select Actions > Rules

C.

Select Display > Rules

D.

Listed in the notes section

Buy Now
Questions 38

When searching for all events related to "Login Failure", which parameter should a security analyst use to filter the events?

Options:

A.

Event Asset Name

B.

Event Collector

C.

Anomaly Detection Event

D.

Event Name

Buy Now
Questions 39

After how much time will QRadar mark an Event offense dormant if no new events or flows occur?

Options:

A.

2 hours

B.

30 minutes

C.

24 hours

D.

5 minutes

Buy Now
Questions 40

The magnitude rating of an offense in QRadar is calculated based on which values?

Options:

A.

Relevance, severity, importance

B.

Relevance, credibility, severity

C.

Criticality, severity, importance

D.

Criticality, severity, credibility

Buy Now
Questions 41

A task is set up to identify events that were missed by the Custom Rule Engine. Which two (2) types of events does an analyst look for?

Options:

A.

Log Only Events sent to a Data Store

B.

High Level Category: User Defined Events

C.

Forwarded Events to different destination

D.

High Level Category Unknown Events

E.

Low Level Category: Stored Events

Buy Now
Exam Code: C1000-162
Exam Name: IBM Security QRadar SIEM V7.5 Analysis
Last Update: Nov 21, 2024
Questions: 139
C1000-162 pdf

C1000-162 PDF

$28  $80
C1000-162 Engine

C1000-162 Testing Engine

$33.25  $95
C1000-162 PDF + Engine

C1000-162 PDF + Testing Engine

$45.5  $130