Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

C1000-162 Exam Dumps - IBM Security QRadar SIEM V7.5 Analysis

Question # 4

What are the behavioral rule test parameter options?

A.

Behavioral rule. Current traffic level, Predicted value

B.

Season, Anomaly detection. Current traffic trend

C.

Season, Current traffic level, Predicted value

D.

Current traffic behavior. Behavioral rule. Current traffic level

Full Access
Question # 5

When using the Dynamic Search window on the Admin tab, which two (2) data sources are available?

A.

ASSETS

B.

PAYLOAD

C.

OFFENSES

D.

AOL QUERY

E.

SAVED SEARCHES

Full Access
Question # 6

What is the benefit of using default indexed properties for searching in QRadar?

A.

It increases the amount of data required to be searched.

B.

It improves the speed of searches.

C.

It returns fewer results than non-indexed properties.

D.

It reduces the number of indexed search values.

Full Access
Question # 7

How can an analyst identify the top rules that generated offenses in the previous week and were closed as false positives or tuned?

A.

From Reports > Offenses Report > Weekly reports > False positives reports

B.

Use Case Manager app > Active Rules > Filter Offenses with start date > Closure Reason > Select False-Positive, Tuned

C.

Use Case Manager app > CRE Report > Filter Offenses with the following direction > R2R > Select False-Positive, Tuned.

D.

From Reports > CRE Report > Weekly reports > False positives reports

Full Access
Question # 8

How can an analyst search for all events that include the keyword "access"?

A.

Go to the Network Activity tab and run a quick search with the "access" keyword.

B.

Go to the Log Activity tab and run a quick search with the "access" keyword.

C.

Go to the Offenses tab and run a quick search with the "access" keyword.

D.

Go to the Log Activity tab and run this AOL: select * from events where eventname like 'access'.

Full Access
Question # 9

A QRadar analyst is using the Log Activity screen to investigate the events that triggered an offense.

How can the analyst differentiate events that are associated with an offense?

A.

A red star icon in the first column of event list indicates a fully-matched event

B.

Fully matched events are not indexed

C.

Separate columns named 'Paritally matched’ and 'Fully matched' are populated

D.

Partially matched events are not indexed

Full Access
Question # 10

Which are types of reference data collections in QRadar?

A.

Reference set. Reference data, and Reference rule

B.

Reference set, Reference map. and Reference map of maps

C.

Reference data. Reference table, and Reference event

D.

Reference event, Reference map of sets, and Reference data

Full Access
Question # 11

Reports can be generated by using which file formats in QRadar?

A.

PDF, HTML, XML, XLS

B.

JPG, GIF, BMP, TIF

C.

TXT, PNG, DOC, XML

D.

CSV, XLSX, DOCX, PDF

Full Access
Question # 12

How can an analyst improve the speed of searches in QRadar?

A.

Narrow the overall data by adding an indexed field in the search query.

B.

Increase the overall data in the search query.

C.

Use Index Management to disable indexing.

D.

Remove all indexed fields from the search query.

Full Access
Question # 13

A QRadar analyst is investigating the events of an offense. For a particular event on the list, the analyst wants to know which rules were fully ditched for the event.

where can the analyst check to see if the event has any fully matched rules?

A.

On default dashboard

B.

On offense details

C.

On Pulse dashboard

D.

On event details page

Full Access
Question # 14

What process is used to perform an IP address X-Force Exchange Lookup in QRadar?

A.

Offense summary tab > right-click IP address > Plugin Option > X-Force Exchange Lookup

B.

Copy the IP address and go to X-Force Exchange to perform the lookup

C.

Run Autoupdate

D.

Run a query on maxmind db

Full Access
Question # 15

Which reference set data element attribute governs who can view its value?

A.

Tenant Assignment

B.

Origin

C.

Reference Set Management MSSP

D.

Domain

Full Access
Question # 16

Which type of rule should you use to test events or (lows for activities that are greater than or less than a specified range?

A.

Behavioral rules

B.

Anomaly rules

C.

Custom rules

D.

Threshold rules

Full Access
Question # 17

A QRadar analyst wants predefined searches, reports, custom rules, and custom properties for HIPAA compliance.

Which option does the QRadar analyst use to look for HIPAA compliance on QRadar?

A.

Use Case Manager app

B.

QRadar Pulse app

C.

IBM X-Force Exchange portal to download content packs

D.

IBM Fix Central to download new rules

Full Access
Question # 18

Which two (2) statements regarding indexed custom event properties are true?

A.

The indexed filter adds to portions of the data set.

B.

The indexed filter eliminates portions of the data set and reduces the overall data volume and number of event or flow logs that must be searched.

C.

By default, data retention for the index payload is 7 days.

D.

Indexing searches a full event payload for values.

E.

Use indexed event and flow properties to optimize your searches.

Full Access
Question # 19

When investigating an offense, how does one find the number of flows or events associated with it?

A.

EvenVFIow count field

B.

List Events/Flows

C.

Export count to CSV

D.

Display > Events

Full Access
Question # 20

From which tabs can a QRadar custom rule be created?

A.

Log Activity or Network Action tabs

B.

Offenses or Admin tabs

C.

Offenses, Log Activity, or Network Activity tabs

D.

Offenses. Assets, or Log Action tabs

Full Access
Question # 21

The Use Case Manager app has an option to see MITRE heat map.

Which two (2) factors are responsible for the different colors in MITRE heat map?

A.

Number of offenses generated

B.

Number of events associated to offense

C.

Number of rules mapped

D.

Level of mapping confidence

E.

Number of log sources associated

Full Access
Question # 22

Several systems were initially reviewed as active offenses, but further analysis revealed that the traffic generated by these source systems is legitimate and should not contribute to offenses.

How can the activity be fine-tuned when multiple source systems are found to be generating the same event and targeting several systems?

A.

Edit the building blocks by using the Custom Rules Editor to tune out a destination IP

B.

Use the Log Source Management app to tune the event

C.

Edit the building blocks by using the Custom Rules Editor to tune out the specific event

D.

Edit the building blocks by using the Custom Rules Editor to tune out a source IP

Full Access
Question # 23

An analyst runs a search with correct AQL. but no errors or results are shown.

What is one reason this could occur?

A.

The Quick Filter option is selected.

B.

The AQL search needs to be saved as a Quick Search before it can display any query.

C.

Microsoft Edge is not a supported browser.

D.

AQL search needs to be enabled in System Settings.

Full Access
Question # 24

Which two (2) options are at the top level when an analyst right-clicks on the Source IP or Destination IP that is associated with an offense at the Offense Summary?

A.

Information

B.

DNS Lookup

C.

Navigate

D.

WHOIS Lookup

E.

Asset Summary page

Full Access
Question # 25

To verify whether the login ID that was used to log in to QRadar is assigned to a user, create a list with the LoginlD parameter.

This example refers to what kind of reference data collections?

A.

Reference map of maps

B.

Reference login

C.

Reference map

D.

Reference set

Full Access
Question # 26

What is the name of the data collection set used in QRadar that can be populated with lOCs or other external data?

A.

Index set

B.

Reference set

C.

IOC set

D.

Data set

Full Access
Question # 27

After how much time will QRadar mark an Event offense dormant if no new events or flows occur?

A.

2 hours

B.

30 minutes

C.

24 hours

D.

5 minutes

Full Access
Question # 28

What is the effect of toggling the Global/Local option to Global in a Custom Rule?

A.

It allows a rule to compare events & flows in real time.

B.

It allows a rule to analyze the geographic location of the event source.

C.

It allows rules to be tracked by the central processor for detection by any Event Processor.

D.

It allows a rule to inject new events back into the pipeline to affect and update other incoming events.

Full Access
Question # 29

Which type of rule requires a saved search that must be grouped around a common parameter

A.

Flow Rule

B.

Event Rule

C.

Common Rule

D.

Anomaly Rule

Full Access
Question # 30

Which action is performed in Edit Search to create a report from Offense data?

A.

Under Search Parameters, select "Use Offense Data".

B.

In the Select Data Source for report field, select "Offense".

C.

In the Data Source field, type offense.

D.

Under Search Parameters, select "Associated With Offense Equals True".

Full Access
Question # 31

What is an effective method to fix an event that is parsed an determined to be unknown or in the wrong QReader category/

A.

Create a DSM extension to extract the category from the payload

B.

Create a Custom Property to extract the proper Category from the payload

C.

Open the event details, select map event, and assign it to the correct category

D.

Write a Custom Rule, and use Rule Response to send a new event in the proper category

Full Access
Question # 32

Which of these statements regarding the deletion of a generated content report is true?

A.

Only specific reports that were not generated from the report template as well as the report template are deleted.

B.

All reports that were generated from the report template are deleted, but the report template is retained.

C.

All reports that were generated from the report template as well as the report template are deleted.

D.

Only specific reports that were not generated from the report template are deleted, but the report template is retained.

Full Access
Question # 33

To test for authorized access to a patent, create a list that uses a custom event property for Patent id as the key, and the username parameter as the value. Data is stored in records that map a key to multiple values and every key is unique. Use this list to populate a list of authorized users.

The example above refers to what kind of reference data collections?

A.

Reference map of maps

B.

Reference map

C.

Reference map of sets

D.

Reference table

Full Access
Question # 34

A Security Analyst was asked to search for an offense on a specific day. The requester was not sore of the time frame, but had Source Host information to use as well as networks involved, Destination IP and username.

Which fitters can the Security Analyst use to search for the information requested?

A.

Offense ID, Source IP, Username

B.

Magnitude, Source IP, Destination IP

C.

Description, Destination IP. Host Name

D.

Specific Interval, Username, Destination IP

Full Access
Question # 35

Which two (2) are valid options available for configuring the frequency of report execution in the QRadar Report wizard?

A.

Quarterly

B.

Automatically

C.

Monthly

D.

Yearly

E.

Manually

Full Access
Question # 36

A QRadar analyst would like to search for events that have fully matched rules which triggered offenses.

What parameter and value should the analyst add as filter in the event search?

A.

Associated with Offense is True

B.

Associated with Rule is True

C.

Associated with Rule is False

D.

Associated with Offense is False

Full Access
Question # 37

How do events appear in QRadar if there was an error in the JSON parser for a new log source to which a custom log source extension was created?

A.

SIM events

B.

Parsed events

C.

Stored events

D.

CRE events

Full Access
Question # 38

Which two (2) options are at the top level when an analyst right-clicks on the Source IP or Destination IP that is associated with an offense at the Offense Summary?

A.

Information

B.

Asset Summary page

C.

Navigate

D.

WHOIS Lookup

E.

DNS Lookup

Full Access
Question # 39

On the Offenses tab, which column explains the cause of the offense?

A.

Description

B.

Offense Type

C.

Magnitude

D.

IPs

Full Access
Question # 40

On the Reports tab in QRadar. what does the message "Queued (position in the queue)" indicate when generating a report?

A.

The report is scheduled to run, and the message is a count-down timer that specifies when the report will run next.

B.

The report is ready to be viewed in the Generated Reports column.

C.

The report is generating.

D.

The report is queued for generation and the message indicates the position of the report in the queue.

Full Access
Question # 41

New vulnerability scanners are deployed in the company's infrastructure and generate a high number of offenses. Which function in the Use Case Manager app does an analyst use to update the list of vulnerability scanners?

Full Access