New Year Special Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

IBM C1000-162 IBM Security QRadar SIEM V7.5 Analysis Exam Practice Test

Page: 1 / 14
Total 139 questions

IBM Security QRadar SIEM V7.5 Analysis Questions and Answers

Question 1

Which two (2) statements regarding indexed custom event properties are true?

Options:

A.

The indexed filter adds to portions of the data set.

B.

The indexed filter eliminates portions of the data set and reduces the overall data volume and number of event or flow logs that must be searched.

C.

By default, data retention for the index payload is 7 days.

D.

Indexing searches a full event payload for values.

E.

Use indexed event and flow properties to optimize your searches.

Question 2

Which reference set data element attribute governs who can view its value?

Options:

A.

Tenant Assignment

B.

Origin

C.

Reference Set Management MSSP

D.

Domain

Question 3

During an active offense review, an analyst observed that a single source system generated a significant amount of high-rate traffic for transferring ^bound mail via port 25. The system responsible for this traffic was not authorized to function as a mail server.

lat is the correct action in this situation?

Options:

A.

Add the IP address of the source system to the Host Definition Mail Servers building block.

B.

Continue to investigate the offense and follow the organization’s response processes to stop the source system’s traffic.

C.

Submit a request to the firewall team to allow this type of traffic from the source system to remote destinations.

D.

Use the False Positive Wizard to tune the specific event and event category.

Question 4

What Is the result of the following AQL statement?

Question # 4

Options:

A.

Returns all fields where the username contains the ERS string and is case-sensitive

B.

Returns all fields where the username contains the ERS string and is case-insensitive

C.

Returns all fields where the username is different from the ERS string and is case-insensitive

D.

Returns all fields where the username is different from the ERS string and is case-sensitive

Question 5

Which statement regarding the Assets tab is true?

Options:

A.

The display is populated with all discovered assets in your network.

B.

It displays flow information to determine how and what network traffic is communicated.

C.

It displays connection information to determine how different network devices are connected.

D.

The display is populated with all eliminated and recreated assets in your network.

Question 6

What does this example of a YARA rule represent?

rule ibm_forensics : qradar

meta:

description = “Complex Yara rule.“

strings:

Shexl = {4D 2B 68 00 ?? 14 99 F9 B? 00 30 Cl 8D}

Sstrl = "IBM Security!"

condition:

Shexl and (#strl > 3)

Options:

A.

Flags content that contains the hex sequence, and hex1 at least three times

B.

Flags containing hex sequence and str1 less than three times

C.

Flags for str 1 at an offset of 25 bytes into the file

D.

Flags content that contains the hex sequence, and str1 greater than three times

Question 7

Which property types can be used to reduce the overall data volume searched and shorten search time to address searches taking longer than expected?

Options:

A.

Tabled properties

B.

Indexed properties

C.

Stored properties

D.

Common properties

Question 8

Events can be exported from the QRadar Log Activity tab in which file formats?

Options:

A.

JSON. XML, and CSV

B.

XLS and CSV

C.

JSON and XML

D.

XML and CSV

Question 9

After how much time will QRadar mark an Event offense dormant if no new events or flows occur?

Options:

A.

2 hours

B.

30 minutes

C.

24 hours

D.

5 minutes

Question 10

When investigating an offense, how does one find the number of flows or events associated with it?

Options:

A.

EvenVFIow count field

B.

List Events/Flows

C.

Export count to CSV

D.

Display > Events

Question 11

A Security Analyst has noticed that an offense has been marked inactive.

How long had the offense been open since it had last been updated with new events or flows?

Options:

A.

1 day + 30 minutes

B.

5 days + 30 minutes

C.

10 days + 30 minutes

D.

30 days + 30 minutes

Question 12

What type of building blocks would you use to categorize assets and server types into CIDR/IP ranges to exclude or include entire asset categories in rule tests?

Options:

A.

User tuning

B.

Category definition

C.

Policy

D.

Host definition

Question 13

A QRadar analyst wants predefined searches, reports, custom rules, and custom properties for HIPAA compliance.

Which option does the QRadar analyst use to look for HIPAA compliance on QRadar?

Options:

A.

Use Case Manager app

B.

QRadar Pulse app

C.

IBM X-Force Exchange portal to download content packs

D.

IBM Fix Central to download new rules

Question 14

New vulnerability scanners are deployed in the company's infrastructure and generate a high number of offenses. Which function in the Use Case Manager app does an analyst use to update the list of vulnerability scanners?

Question # 14

Options:

Question 15

An analyst runs a search with correct AQL. but no errors or results are shown.

What is one reason this could occur?

Options:

A.

The Quick Filter option is selected.

B.

The AQL search needs to be saved as a Quick Search before it can display any query.

C.

Microsoft Edge is not a supported browser.

D.

AQL search needs to be enabled in System Settings.

Question 16

A Security Analyst was asked to search for an offense on a specific day. The requester was not sore of the time frame, but had Source Host information to use as well as networks involved, Destination IP and username.

Which fitters can the Security Analyst use to search for the information requested?

Options:

A.

Offense ID, Source IP, Username

B.

Magnitude, Source IP, Destination IP

C.

Description, Destination IP. Host Name

D.

Specific Interval, Username, Destination IP

Question 17

An analyst wants to share a dashboard in the Pulse app with colleagues.

The analyst exports the dashboard by using which format?

Options:

A.

CSV

B.

JSON

C.

XML

D.

PHP

Question 18

What process is used to perform an IP address X-Force Exchange Lookup in QRadar?

Options:

A.

Offense summary tab > right-click IP address > Plugin Option > X-Force Exchange Lookup

B.

Copy the IP address and go to X-Force Exchange to perform the lookup

C.

Run Autoupdate

D.

Run a query on maxmind db

Question 19

a selection of events for further investigation to somebody who does not have access to the QRadar system.

Which of these approaches provides an accurate copy of the required data in a readable format?

Options:

A.

Log in to the Command Line Interface and use the ACP tool (/opt/qradar/bin/runjava.sh com.qllabs .ariel. Io.acp) with the necessary AQLfilters and destination directory.

B.

Use the Advanced Search option in the Log Activity tab, run an AQL command: copy (select * from events last 2 hours) to ’output_events.csv’ WITH CSV.

C.

Use the "Event Export (with AQL)" option in the Log Activity tab, test your query with the Test button. Then, to run the export, click Export to CSV.

D.

Use the Log Activity tab, filter the events until only those that you require are shown. Then, from the Actions list, select Export to CSV > Full Export (All Columns).

Question 20

Create a list that stores Username as the first key. Source IP as the second key with an assigned cidr data type, and Source Port as the value.

The example above refers to what kind of reference data collections?

Options:

A.

Reference map of sets

B.

Reference store

C.

Reference table

D.

Reference map

Question 21

Offense chaining is based on which field that is specified in the rule?

Options:

A.

Rule action field

B.

Offense response field

C.

Rule response field

D.

Offense index field

Question 22

QRadar analysts can download different types of content extensions from the IBM X-Force Exchange portal. Which two (2) types of content extensions are supported by QRadar?

Options:

A.

Custom Functions

B.

Events

C.

Flows

D.

FGroup

E.

Offenses

Question 23

On the Offenses tab, which column explains the cause of the offense?

Options:

A.

Description

B.

Offense Type

C.

Magnitude

D.

IPs

Question 24

After analyzing an active offense where many source systems were observed connecting to a specific destination via local-to-local LDAP traffic, an ^lyst discovered that the targeted system is a legitimate LDAP server within the organization.

x avoid confusion in future analyses, how can this type of traffic to the target system be flagged as expected and be excluded from further offense ation?

Options:

A.

Add the IP address of the LDAP server to the BB:Host Definition: LDAP Servers building block.

B.

Remove the IP address of the source systems from the Global False Positive Events building block.

C.

Add the IP address of the source systems to the All Default Positive building block.

D.

Remove the IP address of the LDAP server from the network hierarchy.

Question 25

On which lab can an analyst perform a "Flow Bias" Quick Search?

Options:

A.

Asset Management app

B.

Log Activity tab

C.

Log Source Management app

D.

Network Activity tab

Question 26

Which QRadar component provides the user interface that delivers real-time flow views?

Options:

A.

QRadar Viewer

B.

QRadar Console

C.

QRadar Flow Collector

D.

QRadar Flow Processor

Question 27

What are two (2) Y-axis types that are available in the scatter chart type in the Pulse app?

Options:

A.

Linear

B.

Log

C.

General

D.

Threshold

E.

Dynamic

Question 28

When examining lime fields on Event Information, which one represents the time QRadar received the raw event?

Options:

A.

Processing Time

B.

Log Source Time

C.

Start Time

D.

Storage Time

Question 29

The Use Case Manager app has an option to see MITRE heat map.

Which two (2) factors are responsible for the different colors in MITRE heat map?

Options:

A.

Number of offenses generated

B.

Number of events associated to offense

C.

Number of rules mapped

D.

Level of mapping confidence

E.

Number of log sources associated

Question 30

Which IBM X-Force Exchange feature could be used to query QRadar to see if any of the lOCs were detected for COVID-19 activities?

Options:

A.

TAXI I automatic updates

B.

STIX Bundle

C.

Threat Intelligence ATP

D.

Ami Affected

Question 31

What type of reference data collection would you use to correlate a unique key to a value?

Options:

A.

Reference map

B.

Reference list

C.

Reference table

D.

Reference set

Question 32

What does the Next Run Time column display when a report is queued for generation in QRadar?

Options:

A.

Time the report ran last

B.

Number of times the report ran

C.

Position of the report in the queue

D.

Time it takes to generate the report

Question 33

An analyst wants to implement an AQL search in QRadar. Which two (2) tabs can be used to accomplish this implementation?

Options:

A.

Assets

B.

Vulnerabilities

C.

Log Activity

D.

Offenses

E.

Network Activity

Question 34

Reports can be generated by using which file formats in QRadar?

Options:

A.

PDF, HTML, XML, XLS

B.

JPG, GIF, BMP, TIF

C.

TXT, PNG, DOC, XML

D.

CSV, XLSX, DOCX, PDF

Question 35

How do events appear in QRadar if there was an error in the JSON parser for a new log source to which a custom log source extension was created?

Options:

A.

SIM events

B.

Parsed events

C.

Stored events

D.

CRE events

Question 36

Which types of information does QRadar analyze to create an offense from the rule?

Options:

A.

Known vulnerabilities, known threats, and incoming and outgoing events

B.

Incoming and outgoing events, unknown vulnerabilities, and malware

C.

Malware, asset, firewall, and incoming events

D.

Incoming events and flows, asset information, and known vulnerabilities

Question 37

Which two (2) options are at the top level when an analyst right-clicks on the Source IP or Destination IP that is associated with an offense at the Offense Summary?

Options:

A.

Information

B.

DNS Lookup

C.

Navigate

D.

WHOIS Lookup

E.

Asset Summary page

Question 38

When searching for all events related to "Login Failure", which parameter should a security analyst use to filter the events?

Options:

A.

Event Asset Name

B.

Event Collector

C.

Anomaly Detection Event

D.

Event Name

Question 39

A QRadar analyst wants to limit the time period for which an AOL query is evaluated. Which functions and clauses could be used for this?

Options:

A.

START, BETWEEN. LAST. NOW. PARSEDATETIME

B.

START, STOP. LAST, NOW, PARSEDATETIME

C.

START. STOP. BETWEEN, FIRST

D.

START, STOP. BETWEEN, LAST

Question 40

How does a QRadar analyst get to more information about a MITRE entry in the Use Case Manager?

Options:

A.

Hover over the entry and read the tooltip

B.

Highlight the entry and click the help button

C.

Click the Tactic’s Explore icon to reveal and open the MITRE web page

D.

Use the Threat Intelligence app

Question 41

What does an analyst need to do before configuring the QRadar Use Case Manager app?

Options:

A.

Create a privileged user.

B.

Create an authorized service token.

C.

Check the license agreement.

D.

Run a QRadar health check.

Page: 1 / 14
Total 139 questions