Pass the IBM IBM Security Systems C1000-162 Questions and answers with CertsForce

Viewing page 1 out of 5 pages
Viewing questions 1-10 out of questions
Questions # 1:

What QRadar application can help you ensure that IBM GRadar is optimally configured to detect threats accurately throughout the attack chain?

Options:

A.

Rules Reviewer


B.

Log Source Manager


C.

QRadar Deployment Intelligence


D.

Use Case Manager


Questions # 2:

An analyst wants to implement an AQL search in QRadar. Which two (2) tabs can be used to accomplish this implementation?

Options:

A.

Assets


B.

Vulnerabilities


C.

Log Activity


D.

Offenses


E.

Network Activity


Questions # 3:

Which two (2) tasks are uses of the QRadar network hierarchy?

Options:

A.

Understand network traffic


B.

Monitor traffic and profile the behavior of each group and host within the group


C.

Monitor risky users within your organization


D.

Determine and identify Command and Control systems


E.

Monitor network devices


Questions # 4:

When you create a report, you must choose a chart type for each chart that is included in the report.

Which two (2) chart types can you include in a report?

Options:

A.

Flows


B.

Raw Data


C.

Containers


D.

Scanners


E.

Log Sources


Questions # 5:

Which property types can be used to reduce the overall data volume searched and shorten search time to address searches taking longer than expected?

Options:

A.

Tabled properties


B.

Indexed properties


C.

Stored properties


D.

Common properties


Questions # 6:

A QRadar analyst would like to search for events that have fully matched rules which triggered offenses.

What parameter and value should the analyst add as filter in the event search?

Options:

A.

Associated with Offense is True


B.

Associated with Rule is True


C.

Associated with Rule is False


D.

Associated with Offense is False


Questions # 7:

The Use Case Manager app has an option to see MITRE heat map.

Which two (2) factors are responsible for the different colors in MITRE heat map?

Options:

A.

Number of offenses generated


B.

Number of events associated to offense


C.

Number of rules mapped


D.

Level of mapping confidence


E.

Number of log sources associated


Questions # 8:

Which two (2) statements regarding indexed custom event properties are true?

Options:

A.

The indexed filter adds to portions of the data set.


B.

The indexed filter eliminates portions of the data set and reduces the overall data volume and number of event or flow logs that must be searched.


C.

By default, data retention for the index payload is 7 days.


D.

Indexing searches a full event payload for values.


E.

Use indexed event and flow properties to optimize your searches.


Questions # 9:

How does a Device Support Module (DSM) function?

Options:

A.

A DSM is a configuration file that combines received events from multiple log sources and displays them as offenses in QRadar.


B.

A DSM is a background service running on the QRadar appliance that reaches out to devices deployed in a network for configuration data.


C.

A DSM is a configuration file that parses received events from multiple log sources and converts them to a standard taxonomy format that can be displayed as outputs.


D.

A DSM is an installed appliance that parses received events from multiple log sources and converts them to a standard taxonomy format that can be displayed as outputs.


Questions # 10:

Which two (2) of these elements can be used by the Report wizard to design a report?

Options:

A.

Assets


B.

Network


C.

Traffic


D.

Content


E.

Layout


Viewing page 1 out of 5 pages
Viewing questions 1-10 out of questions