Pass the IBM IBM Security Systems C1000-162 Questions and answers with CertsForce

Viewing page 3 out of 5 pages
Viewing questions 21-30 out of questions
Questions # 21:

How can an analyst search for all events that include the keyword "access"?

Options:

A.

Go to the Network Activity tab and run a quick search with the "access" keyword.


B.

Go to the Log Activity tab and run a quick search with the "access" keyword.


C.

Go to the Offenses tab and run a quick search with the "access" keyword.


D.

Go to the Log Activity tab and run this AOL: select * from events where eventname like 'access'.


Expert Solution
Questions # 22:

On the Offenses tab, which column explains the cause of the offense?

Options:

A.

Description


B.

Offense Type


C.

Magnitude


D.

IPs


Expert Solution
Questions # 23:

What type of custom property should be used when an analyst wants to combine extraction-based URLs, virus names, and secondary user names into a single property?

Options:

A.

AOL-based property


B.

Absolution-based property


C.

Extraction-based property


D.

Calculation-based property


Expert Solution
Questions # 24:

An analyst wishes to review an event which has a rules test against both event and flow data.

What kind of rule is this?

Options:

A.

Anomaly rules


B.

Threshold rules


C.

Offense rules


D.

Common rules


Expert Solution
Questions # 25:

Which parameter should be used if a security analyst needs to filter events based on the time when they occurred on the endpoints?

Options:

A.

Inspect "Log Time interval"


B.

Evaluate "Storage Time"


C.

Examine "Log Source Time"


D.

Review "Time Period"


Expert Solution
Questions # 26:

What is the effect of toggling the Global/Local option to Global in a Custom Rule?

Options:

A.

It allows a rule to compare events & flows in real time.


B.

It allows a rule to analyze the geographic location of the event source.


C.

It allows rules to be tracked by the central processor for detection by any Event Processor.


D.

It allows a rule to inject new events back into the pipeline to affect and update other incoming events.


Expert Solution
Questions # 27:

What does an analyst need to do before configuring the QRadar Use Case Manager app?

Options:

A.

Create a privileged user.


B.

Create an authorized service token.


C.

Check the license agreement.


D.

Run a QRadar health check.


Expert Solution
Questions # 28:

Offense chaining is based on which field that is specified in the rule?

Options:

A.

Rule action field


B.

Offense response field


C.

Rule response field


D.

Offense index field


Expert Solution
Questions # 29:

For a rule containing the test "and when the source is located in this geographic location" to work properly, what must a QRadar analyst configure?

Options:

A.

IBM X-Force Exchange updates


B.

MaxMind updates


C.

IBM X-Force Exchange ATP updates


D.

Watson updates


Expert Solution
Questions # 30:

Which flow fields should be used to determine how long a session has been active on a network?

Options:

A.

Start time and end time


B.

Start time and storage time


C.

Start time and last packet time


D.

Last packet time and storage time


Expert Solution
Viewing page 3 out of 5 pages
Viewing questions 21-30 out of questions