
Exam C1000-162: IBM Security QRadar SIEM V7.5 Analysis
Authored by Number One
Business
Professional Development

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
40 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Which two (2) statements about offense chaining are true?
Offense chaining causes performance issues in IBM QRadar
Offense chaining is based on the offense index field that is specified on the rule
Offense chaining is based on the generated CRE event that is specified in the rule response
A chained offense is identifiable when "preceded by" is in the Descriptions field on the Offense Summary page
If the rule is configured to use the Source IP address as the offense index field, there is only one offense that has that Source IP address, regardless of the offense status
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Offense chaining is possible based on which parameter?
Rule type
Rule response
Offense index field
Rule response limiter
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In QRadar, where is a list of offenses displaying associated source IP addresses?
Offense Summary > By Source IP
Offense Summary > New Search > Advanced Search
Log Activity > Offense Source Summary > Offenses
Log Activity > Add Filter > Source IP > offense_assigned
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A QRadar analyst can export MITRE mappings, which can later be imported into another QRadar deployment. What is another use for the exported MITRE mappings?
Mappings can be a log source configuration backup solution
The export can be a log source group configuration backup solution
MITRE coverage file can be imported into MITRE ATT&CK Navigator
The export contains event details which can be re-run by using the QRadar Experience Center app
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which parameter indicates the reliability of an offense configured in the log source, and is boosted when multiple sources report the same event?
Relevance
Credibility
Event severity
Trustworthiness log
6.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Which two (2) types of information are taken into consideration when calculating the magnitude of an offense?
The number of rules matched to the offense
The number of searches associated with the offense
The CVSS score of the log sources that are involved in the offense
The number of events and flows that are associated with the offense
The categories, severity, relevance, and credibility of the events and flows that contribute to the offense
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What are events called when they are classified in the proper log source?
Stored events
Parsed events
Payload events
Unknown events
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?