Exam C1000-162: IBM Security QRadar SIEM V7.5 Analysis

Exam C1000-162: IBM Security QRadar SIEM V7.5 Analysis

Professional Development

40 Qs

quiz-placeholder

Similar activities

Technical Test

Technical Test

Professional Development

36 Qs

Accounting Study Guide 2

Accounting Study Guide 2

University - Professional Development

36 Qs

Management Business English Test

Management Business English Test

Professional Development

35 Qs

5-LIFE INSURANCE UNDERWRITING AND POLICY ISSUE

5-LIFE INSURANCE UNDERWRITING AND POLICY ISSUE

Professional Development

45 Qs

AAA - Module 1 Quiz

AAA - Module 1 Quiz

Professional Development

38 Qs

Basic Financial Statement

Basic Financial Statement

Professional Development

37 Qs

Pengantar Pemasaran 01

Pengantar Pemasaran 01

Professional Development

40 Qs

Reading 2 - The Time Value of Money in Finance

Reading 2 - The Time Value of Money in Finance

Professional Development

38 Qs

Exam C1000-162: IBM Security QRadar SIEM V7.5 Analysis

Exam C1000-162: IBM Security QRadar SIEM V7.5 Analysis

Assessment

Quiz

Business

Professional Development

Hard

Created by

Number One

FREE Resource

40 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which two (2) statements about offense chaining are true?

Offense chaining causes performance issues in IBM QRadar

Offense chaining is based on the offense index field that is specified on the rule

Offense chaining is based on the generated CRE event that is specified in the rule response

A chained offense is identifiable when "preceded by" is in the Descriptions field on the Offense Summary page

If the rule is configured to use the Source IP address as the offense index field, there is only one offense that has that Source IP address, regardless of the offense status

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Offense chaining is possible based on which parameter?

Rule type

Rule response

Offense index field

Rule response limiter

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In QRadar, where is a list of offenses displaying associated source IP addresses?

Offense Summary > By Source IP

Offense Summary > New Search > Advanced Search

Log Activity > Offense Source Summary > Offenses

Log Activity > Add Filter > Source IP > offense_assigned

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A QRadar analyst can export MITRE mappings, which can later be imported into another QRadar deployment. What is another use for the exported MITRE mappings?

Mappings can be a log source configuration backup solution

The export can be a log source group configuration backup solution

MITRE coverage file can be imported into MITRE ATT&CK Navigator

The export contains event details which can be re-run by using the QRadar Experience Center app

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which parameter indicates the reliability of an offense configured in the log source, and is boosted when multiple sources report the same event?

Relevance

Credibility

Event severity

Trustworthiness log

6.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which two (2) types of information are taken into consideration when calculating the magnitude of an offense?

The number of rules matched to the offense

The number of searches associated with the offense

The CVSS score of the log sources that are involved in the offense

The number of events and flows that are associated with the offense

The categories, severity, relevance, and credibility of the events and flows that contribute to the offense

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are events called when they are classified in the proper log source?

Stored events

Parsed events

Payload events

Unknown events

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?