
Exam C1000-139 IBM Security QRadar SIEM
Authored by Number One
Business
Professional Development

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
37 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
For a Source IP based offense, which field helps determine relative importance of the targets to the business?
Last Event/Flow
Total number of Events
Duration of the offense
Relative importance of Destination IP(s)
2.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
What is a difference between a flow and an event?
A flow occurs at a moment in time while events have a duration from a log source.
An event occur at a moment in time while flows have a duration from the flow source.
An event is a record from a log source, such as a firewall or router device, that describes an action on a network. A flow record provides visibility into layer 7 for applications such as web browsers, NFS, SNMP, Telnet, and FTP.
A flow is a record from a log source, such as a firewall or router device, that describes an action on a network. An event analysis provides visibility into layer 7 for applications such as web browsers, NFS, SNMP, Telnet, and FTP.
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
At the Offense Summary window, the first row of data shows the level of importance that QRadar assigned to the offense. Which statement is the correct description for Magnitude?
QRadar determines it by the weight that the administrator assigned to the networks and assets.
It indicates the threat that an attack poses in relation to how prepared the destination is for the attack
It indicates the relative importance of the offense, calculated based on the relevance, severity, and credibility ratings
It indicates the integrity of the offense as determined by the credibility rating that is configured in the log source. It increases as multiple sources report the same event.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What information is provided by using the Sharing MITRE-mapping files in Use Case Manager?
Mapping directly to rules
Mapping directly to dependencies
Mapping to the customize template
Mapping to the Use Case Explorer page
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which parameter determines the impact of the offense on the network?
Impact
Severity
Relevance
Credibility
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
When prioritizing offenses to investigate, what metric is provided on the Offenses tab specifically to help influence which offenses to investigate first?
Severity
Magnitude
Relevance
Credibility
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Several counts of the system notification message 38750088 - Performance degradation that were detected in the Event pipeline showed in a report.
In this case, what does the Event collection system do?
Queues events in RAM
Routes data to storage
Bypasses EPS Licensing
Drops events from the pipeline
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?