Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

IBM C1000-162 - IBM Security QRadar SIEM V7.5 Analysis

Page: 3 / 5
Total 139 questions

What is the default number of notifications that the System Notification dashboard can display?

A.

50 notifications

B.

20 notifications

C.

10 notifications

D.

5 notifications

Reports can be generated by using which file formats in QRadar?

A.

PDF, HTML, XML, XLS

B.

JPG, GIF, BMP, TIF

C.

TXT, PNG, DOC, XML

D.

CSV, XLSX, DOCX, PDF

Which of these statements regarding the deletion of a generated content report is true?

A.

Only specific reports that were not generated from the report template as well as the report template are deleted.

B.

All reports that were generated from the report template are deleted, but the report template is retained.

C.

All reports that were generated from the report template as well as the report template are deleted.

D.

Only specific reports that were not generated from the report template are deleted, but the report template is retained.

QRadar analysts can download different types of content extensions from the IBM X-Force Exchange portal. Which two (2) types of content extensions are supported by QRadar?

A.

Custom Functions

B.

Events

C.

Flows

D.

FGroup

E.

Offenses

What is the name of the data collection set used in QRadar that can be populated with lOCs or other external data?

A.

Index set

B.

Reference set

C.

IOC set

D.

Data set

Which two (2) options are at the top level when an analyst right-clicks on the Source IP or Destination IP that is associated with an offense at the Offense Summary?

A.

Information

B.

DNS Lookup

C.

Navigate

D.

WHOIS Lookup

E.

Asset Summary page

How can an analyst improve the speed of searches in QRadar?

A.

Narrow the overall data by adding an indexed field in the search query.

B.

Increase the overall data in the search query.

C.

Use Index Management to disable indexing.

D.

Remove all indexed fields from the search query.

What can be considered a log source type?

A.

ICMP

B.

SNMP

C.

Juniper IOP

D.

Microsoft SMBtail

In Rule Response, which two (2) options are available for Offense Naming?

A.

This information should be removed from the current name of the associated offenses

B.

This information should contribute to (he name of the associated offenses

C.

This information should set or replace the name of the associated offenses

D.

This information should contribute to the dispatched event name of the associated offenses.

E.

This information should contribute to the category naming of the associated offenses

How can an analyst search for all events that include the keyword "access"?

A.

Go to the Network Activity tab and run a quick search with the "access" keyword.

B.

Go to the Log Activity tab and run a quick search with the "access" keyword.

C.

Go to the Offenses tab and run a quick search with the "access" keyword.

D.

Go to the Log Activity tab and run this AOL: select * from events where eventname like 'access'.