Exam C1000-139 IBM Security QRadar SIEM

Exam C1000-139 IBM Security QRadar SIEM

Professional Development

37 Qs

quiz-placeholder

Similar activities

My personal finance questions quiz

My personal finance questions quiz

Professional Development

39 Qs

Exam C1000-162: IBM Security QRadar SIEM V7.5 Analysis

Exam C1000-162: IBM Security QRadar SIEM V7.5 Analysis

Professional Development

40 Qs

CH 08 - Agency Contracts, Sales, and Related Products

CH 08 - Agency Contracts, Sales, and Related Products

Professional Development

33 Qs

4 - LIFE INSURANCE PREMIUMS, PROCEEDS AND BENEFICIARIES

4 - LIFE INSURANCE PREMIUMS, PROCEEDS AND BENEFICIARIES

Professional Development

35 Qs

Pengantar Pemasaran 01

Pengantar Pemasaran 01

Professional Development

40 Qs

Key Skills and Work Priorities Quiz

Key Skills and Work Priorities Quiz

Professional Development

37 Qs

SAP FICO Certification Review 2

SAP FICO Certification Review 2

Professional Development

40 Qs

Accounting Study Guide 2

Accounting Study Guide 2

University - Professional Development

36 Qs

Exam C1000-139 IBM Security QRadar SIEM

Exam C1000-139 IBM Security QRadar SIEM

Assessment

Quiz

Business

Professional Development

Hard

Created by

Number One

FREE Resource

37 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

For a Source IP based offense, which field helps determine relative importance of the targets to the business?

Last Event/Flow

Total number of Events

Duration of the offense

Relative importance of Destination IP(s)

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is a difference between a flow and an event?

A flow occurs at a moment in time while events have a duration from a log source.

An event occur at a moment in time while flows have a duration from the flow source.

An event is a record from a log source, such as a firewall or router device, that describes an action on a network. A flow record provides visibility into layer 7 for applications such as web browsers, NFS, SNMP, Telnet, and FTP.

A flow is a record from a log source, such as a firewall or router device, that describes an action on a network. An event analysis provides visibility into layer 7 for applications such as web browsers, NFS, SNMP, Telnet, and FTP.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

At the Offense Summary window, the first row of data shows the level of importance that QRadar assigned to the offense. Which statement is the correct description for Magnitude?

QRadar determines it by the weight that the administrator assigned to the networks and assets.

It indicates the threat that an attack poses in relation to how prepared the destination is for the attack

It indicates the relative importance of the offense, calculated based on the relevance, severity, and credibility ratings

It indicates the integrity of the offense as determined by the credibility rating that is configured in the log source. It increases as multiple sources report the same event.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What information is provided by using the Sharing MITRE-mapping files in Use Case Manager?

Mapping directly to rules

Mapping directly to dependencies

Mapping to the customize template

Mapping to the Use Case Explorer page

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which parameter determines the impact of the offense on the network?

Impact

Severity

Relevance

Credibility

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When prioritizing offenses to investigate, what metric is provided on the Offenses tab specifically to help influence which offenses to investigate first?

Severity

Magnitude

Relevance

Credibility

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Several counts of the system notification message 38750088 - Performance degradation that were detected in the Event pipeline showed in a report.

In this case, what does the Event collection system do?

Queues events in RAM

Routes data to storage

Bypasses EPS Licensing

Drops events from the pipeline

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?