Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

C1000-162 Exam Dumps - IBM Security QRadar SIEM V7.5 Analysis

Question # 4

After conducting a thorough analysis, it was discovered that the traffic generated by an attacker targeting one system through many unique events in different categories is legitimate and should not be classified as an offense.

Which tuning methodology guideline can be used to tune out this traffic?

A.

Edit the Log Source Management app to tune the category

B.

Edit the buildingblocks byusingtheCustomRulesEditor to tune the category

C.

Edit the buildingblocks byusingtheCustomRulesEditor to tune the specific event

D.

Edit the buildingblocks byusingtheCustomRulesEditor to tune the destinationIP address

Full Access
Question # 5

What two (2) guidelines should you follow when you define your network hierarchy?

A.

Do not configure a network group with more than 15 objects.

B.

Organize your systems and networks by role or similar traffic patterns.

C.

Use the autoupdates feature to automatically populate the network hierarchy.

D.

Import scan results into QRadar.

E.

Use flow data to build the asset database.

Full Access
Question # 6

Which log source and protocol combination delivers events to QRadar in real time?

A.

Sophos Enterprise console via JDBC

B.

McAfee ePolicy Orchestrator via JDBC

C.

McAfee ePolicy Orchestrator via SNMP

D.

Solaris Basic Security Mode (BSM) via Log File Protocol

Full Access
Question # 7

Which two (2) options are used to search offense data on the By Networks page?

A.

Raw/Flows

B.

Events/Flows

C.

NetIP

D.

Severity

E.

Network

Full Access
Question # 8

Which parameter should be used if a security analyst needs to filter events based on the time when they occurred on the endpoints?

A.

Inspect "Log Time interval"

B.

Evaluate "Storage Time"

C.

Examine "Log Source Time"

D.

Review "Time Period"

Full Access
Question # 9

How can an analyst improve the speed of searches in QRadar?

A.

Narrow the overall data by adding an indexed field in the search query.

B.

Increase the overall data in the search query.

C.

Use Index Management to disable indexing.

D.

Remove all indexed fields from the search query.

Full Access
Question # 10

When using the Dynamic Search window on the Admin tab, which two (2) data sources are available?

A.

ASSETS

B.

PAYLOAD

C.

OFFENSES

D.

AOL QUERY

E.

SAVED SEARCHES

Full Access
Question # 11

To test for authorized access to a patent, create a list that uses a custom event property for Patent id as the key, and the username parameter as the value. Data is stored in records that map a key to multiple values and every key is unique. Use this list to populate a list of authorized users.

The example above refers to what kind of reference data collections?

A.

Reference map of maps

B.

Reference map

C.

Reference map of sets

D.

Reference table

Full Access
Question # 12

Which two (2) are valid options available for configuring the frequency of report execution in the QRadar Report wizard?

A.

Quarterly

B.

Automatically

C.

Monthly

D.

Yearly

E.

Manually

Full Access
Question # 13

From which tabs can a QRadar custom rule be created?

A.

Log Activity or Network Action tabs

B.

Offenses or Admin tabs

C.

Offenses, Log Activity, or Network Activity tabs

D.

Offenses. Assets, or Log Action tabs

Full Access
Question # 14

What does the logical operator != in an AQL query do?

A.

Compares a property to a value and returns false if they are unequal

B.

Takes a value and raises it to the specified power and returns the result

C.

Sets the value on the left of the operator equal to the right

D.

Compares two values and returns true if they are unequal

Full Access
Question # 15

Which two (2) dashboards in the Pulse app by default?

A.

Active threats

B.

System metrics

C.

Summary view

D.

Compliance overview

E.

Offense overview

Full Access
Question # 16

What is the name of the data collection set used in QRadar that can be populated with lOCs or other external data?

A.

Index set

B.

Reference set

C.

IOC set

D.

Data set

Full Access
Question # 17

A QRadar analyst wants to limit the time period for which an AOL query is evaluated. Which functions and clauses could be used for this?

A.

START, BETWEEN. LAST. NOW. PARSEDATETIME

B.

START, STOP. LAST, NOW, PARSEDATETIME

C.

START. STOP. BETWEEN, FIRST

D.

START, STOP. BETWEEN, LAST

Full Access
Question # 18

For a rule containing the test "and when the source is located in this geographic location" to work properly, what must a QRadar analyst configure?

A.

IBM X-Force Exchange updates

B.

MaxMind updates

C.

IBM X-Force Exchange ATP updates

D.

Watson updates

Full Access
Question # 19

Which two (2) options are at the top level when an analyst right-clicks on the Source IP or Destination IP that is associated with an offense at the Offense Summary?

A.

Information

B.

DNS Lookup

C.

Navigate

D.

WHOIS Lookup

E.

Asset Summary page

Full Access
Question # 20

Which action is performed in Edit Search to create a report from Offense data?

A.

Under Search Parameters, select "Use Offense Data".

B.

In the Select Data Source for report field, select "Offense".

C.

In the Data Source field, type offense.

D.

Under Search Parameters, select "Associated With Offense Equals True".

Full Access
Question # 21

Which two (2) of these custom property expression types are supported in QRadar?

A.

XLS

B.

YAML

C.

JSON

D.

Regex

E.

HTML

Full Access
Question # 22

How does a Device Support Module (DSM) function?

A.

A DSM is a configuration file that combines received events from multiple log sources and displays them as offenses in QRadar.

B.

A DSM is a background service running on the QRadar appliance that reaches out to devices deployed in a network for configuration data.

C.

A DSM is a configuration file that parses received events from multiple log sources and converts them to a standard taxonomy format that can be displayed as outputs.

D.

A DSM is an installed appliance that parses received events from multiple log sources and converts them to a standard taxonomy format that can be displayed as outputs.

Full Access
Question # 23

Which browser is officially supported for QRadar?

A.

Safari version 9.0-3

B.

Chromium version 33

C.

32-bit Internet Explorer 9

D.

Firefox version 38.0 ESR

Full Access
Question # 24

How does a QRadar analyst get to more information about a MITRE entry in the Use Case Manager?

A.

Hover over the entry and read the tooltip

B.

Highlight the entry and click the help button

C.

Click the Tactic’s Explore icon to reveal and open the MITRE web page

D.

Use the Threat Intelligence app

Full Access
Question # 25

AQRadar analyst can check the rule coverage of MITRE ATT&CK tactics and techniques by using Use Case Manager.

In the Use Case Manager app, how can a QRadar analyst check the offenses triggered and mapped to MITRE ATT&CK framework?

A.

By navigating to "CRE Report"

B.

From Offenses tab

C.

By clicking on "Tuning Home"

D.

By navigating to "Detected in timeframe"

Full Access
Question # 26

Which flow fields should be used to determine how long a session has been active on a network?

A.

Start time and end time

B.

Start time and storage time

C.

Start time and last packet time

D.

Last packet time and storage time

Full Access
Question # 27

What type of custom property should be used when an analyst wants to combine extraction-based URLs, virus names, and secondary user names into a single property?

A.

AOL-based property

B.

Absolution-based property

C.

Extraction-based property

D.

Calculation-based property

Full Access
Question # 28

When investigating an offense, how does one find the number of flows or events associated with it?

A.

EvenVFIow count field

B.

List Events/Flows

C.

Export count to CSV

D.

Display > Events

Full Access
Question # 29

a selection of events for further investigation to somebody who does not have access to the QRadar system.

Which of these approaches provides an accurate copy of the required data in a readable format?

A.

Log in to the Command Line Interface and use the ACP tool (/opt/qradar/bin/runjava.sh com.qllabs .ariel. Io.acp) with the necessary AQLfilters and destination directory.

B.

Use the Advanced Search option in the Log Activity tab, run an AQL command: copy (select * from events last 2 hours) to ’output_events.csv’ WITH CSV.

C.

Use the "Event Export (with AQL)" option in the Log Activity tab, test your query with the Test button. Then, to run the export, click Export to CSV.

D.

Use the Log Activity tab, filter the events until only those that you require are shown. Then, from the Actions list, select Export to CSV > Full Export (All Columns).

Full Access
Question # 30

Which two (2) values are valid for the Offense Type field when a search is performed in the My Offenses or All Offenses tabs?

A.

QID

B.

Any

C.

Risk Score

D.

DDoS

E.

Source IP

Full Access
Question # 31

What process is used to perform an IP address X-Force Exchange Lookup in QRadar?

A.

Offense summary tab > right-click IP address > Plugin Option > X-Force Exchange Lookup

B.

Copy the IP address and go to X-Force Exchange to perform the lookup

C.

Run Autoupdate

D.

Run a query on maxmind db

Full Access
Question # 32

QRadar analysts can download different types of content extensions from the IBM X-Force Exchange portal. Which two (2) types of content extensions are supported by QRadar?

A.

Custom Functions

B.

Events

C.

Flows

D.

FGroup

E.

Offenses

Full Access
Question # 33

What types of data does a Quick filter search operate on?

A.

Raw event or flow data

B.

Flow or parsing data

C.

Raw event or processed data

D.

Flow or processed data

Full Access
Question # 34

From the Offense Summary window, how is the list of rules that contributed to a chained offense identified?

A.

Select Display > Notes

B.

Select Actions > Rules

C.

Select Display > Rules

D.

Listed in the notes section

Full Access
Question # 35

On the Log Activity tab in QRadar. what are the options available when right-clicking an IP address of an event to access more event filter information?

A.

Filter on. False Positive. More Options. Quick Filter

B.

Filter out, False Negative, More Options, Quick Filter

C.

Filter off, True Positive, Less Options, Quick Search

D.

Filter in, True Negative, Less Options. Quick Search

Full Access
Question # 36

Which type of rule should you use to test events or (lows for activities that are greater than or less than a specified range?

A.

Behavioral rules

B.

Anomaly rules

C.

Custom rules

D.

Threshold rules

Full Access
Question # 37

When an analyst is investigating an offense, what is the property that specifies the device that attempts to breach the security of a component on the network?

A.

Source IP

B.

Network

C.

Destination IP

D.

Port

Full Access
Question # 38

The Use Case Manager app has an option to see MITRE heat map.

Which two (2) factors are responsible for the different colors in MITRE heat map?

A.

Number of events associated to offense

B.

Number of rules mapped

C.

Level of mapping confidence

D.

Number of offenses generated

E.

Number of log sources associated

Full Access