Labour Day - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

C1000-162 Questions and Answers

Question # 6

Which two (2) types of categories comprise events?

A.

Unsupported

B.

Unfound

C.

Stored

D.

Found

E.

Parsed

Full Access
Question # 7

The Use Case Manager app has an option to see MITRE heat map.

Which two (2) factors are responsible for the different colors in MITRE heat map?

A.

Number of offenses generated

B.

Number of events associated to offense

C.

Number of rules mapped

D.

Level of mapping confidence

E.

Number of log sources associated

Full Access
Question # 8

A task is set up to identify events that were missed by the Custom Rule Engine. Which two (2) types of events does an analyst look for?

A.

Log Only Events sent to a Data Store

B.

High Level Category: User Defined Events

C.

Forwarded Events to different destination

D.

High Level Category Unknown Events

E.

Low Level Category: Stored Events

Full Access
Question # 9

What does an analyst need to do before configuring the QRadar Use Case Manager app?

A.

Create a privileged user.

B.

Run a QRadar health check.

C.

Check the license agreement.

D.

Create an authorized service token.

Full Access
Question # 10

Which of these statements regarding the deletion of a generated content report is true?

A.

Only specific reports that were not generated from the report template as well as the report template are deleted.

B.

All reports that were generated from the report template are deleted, but the report template is retained.

C.

All reports that were generated from the report template as well as the report template are deleted.

D.

Only specific reports that were not generated from the report template are deleted, but the report template is retained.

Full Access
Question # 11

Which statement regarding the time series chart is true?

A.

It displays static time series charts that represent the records that match and unmatch a specific time range search

B.

It displays interactive time series charts that represent the records that match a specific time range search

C.

The length of time that is required to export your data depends on the number of parameters specified and hidden

D.

The length of time that is required to export your data depends on the number of parameters specified

Full Access
Question # 12

What type of custom property should be used when an analyst wants to combine extraction-based URLs, virus names, and secondary user names into a single property?

A.

AOL-based property

B.

Absolution-based property

C.

Extraction-based property

D.

Calculation-based property

Full Access
Question # 13

What type of building blocks would you use to categorize assets and server types into CIDR/IP ranges to exclude or include entire asset categories in rule tests?

A.

User tuning

B.

Category definition

C.

Policy

D.

Host definition

Full Access
Question # 14

An analyst runs a search with correct AQL. but no errors or results are shown.

What is one reason this could occur?

A.

The Quick Filter option is selected.

B.

The AQL search needs to be saved as a Quick Search before it can display any query.

C.

Microsoft Edge is not a supported browser.

D.

AQL search needs to be enabled in System Settings.

Full Access
Question # 15

Which two (2) options are used to search offense data on the By Networks page?

A.

Raw/Flows

B.

Events/Flows

C.

NetIP

D.

Severity

E.

Network

Full Access
Question # 16

How can an analyst improve the speed of searches in QRadar?

A.

Narrow the overall data by adding an indexed field in the search query.

B.

Increase the overall data in the search query.

C.

Use Index Management to disable indexing.

D.

Remove all indexed fields from the search query.

Full Access
Question # 17

For a rule containing the test "and when the source is located in this geographic location" to work properly, what must a QRadar analyst configure?

A.

IBM X-Force Exchange updates

B.

MaxMind updates

C.

IBM X-Force Exchange ATP updates

D.

Watson updates

Full Access
Question # 18

When you create a report, you must choose a chart type for each chart that is included in the report.

Which two (2) chart types can you include in a report?

A.

Flows

B.

Raw Data

C.

Containers

D.

Scanners

E.

Log Sources

Full Access
Question # 19

Events can be exported from the QRadar Log Activity tab in which file formats?

A.

JSON. XML, and CSV

B.

XLS and CSV

C.

JSON and XML

D.

XML and CSV

Full Access
Question # 20

A QRadar analyst wants to limit the time period for which an AOL query is evaluated. Which functions and clauses could be used for this?

A.

START, BETWEEN. LAST. NOW. PARSEDATETIME

B.

START, STOP. LAST, NOW, PARSEDATETIME

C.

START. STOP. BETWEEN, FIRST

D.

START, STOP. BETWEEN, LAST

Full Access
Question # 21

Which browser is officially supported for QRadar?

A.

Safari version 9.0-3

B.

Chromium version 33

C.

32-bit Internet Explorer 9

D.

Firefox version 38.0 ESR

Full Access
Question # 22

Which two (2) are valid options available for configuring the frequency of report execution in the QRadar Report wizard?

A.

Quarterly

B.

Automatically

C.

Monthly

D.

Yearly

E.

Manually

Full Access
Question # 23

Which log source and protocol combination delivers events to QRadar in real time?

A.

Sophos Enterprise console via JDBC

B.

McAfee ePolicy Orchestrator via JDBC

C.

McAfee ePolicy Orchestrator via SNMP

D.

Solaris Basic Security Mode (BSM) via Log File Protocol

Full Access
Question # 24

Which type of rule requires a saved search that must be grouped around a common parameter

A.

Flow Rule

B.

Event Rule

C.

Common Rule

D.

Anomaly Rule

Full Access
Question # 25

On the Log Activity tab in QRadar. what are the options available when right-clicking an IP address of an event to access more event filter information?

A.

Filter on. False Positive. More Options. Quick Filter

B.

Filter out, False Negative, More Options, Quick Filter

C.

Filter off, True Positive, Less Options, Quick Search

D.

Filter in, True Negative, Less Options. Quick Search

Full Access
Question # 26

What is the difference between an unknown event and a stored event?

A.

Stored events are mapped to the proper log source. Unknown events are collected and parsed.

B.

Stored events are collected and parsed but cannot be mapped or categorized to a specific log source. Unknown events cannot be understood or parsed by QRadar.

C.

Unknown events are mapped to the proper log source. Stored events are collected and parsed.

D.

Unknown events are collected and parsed, but cannot be mapped or categorized to a specific log source and stored events cannot be understood or parsed by QRadar.

Full Access
Question # 27

Many offenses are generated and an analyst confirms that they match some kind of vulnerability scanning.

Which building block group needs to be updated to include the source IP of the vulnerability assessment (VA) scanner to reduce the number of offenses that are being generated?

A.

Host reference

B.

Host definitions

C.

Behavior definition

D.

Device definition

Full Access
Question # 28

Which two (2) options are at the top level when an analyst right-clicks on the Source IP or Destination IP that is associated with an offense at the Offense Summary?

A.

Information

B.

Asset Summary page

C.

Navigate

D.

WHOIS Lookup

E.

DNS Lookup

Full Access
Question # 29

Which parameters are used to calculate the magnitude rating of an offense?

A.

Relevance, urgency, credibility

B.

Relevance, credibility, time

C.

Severity, relevance, credibility

D.

Severity, impact, urgency

Full Access
Question # 30

From which tabs can a QRadar custom rule be created?

A.

Log Activity or Network Action tabs

B.

Offenses or Admin tabs

C.

Offenses, Log Activity, or Network Activity tabs

D.

Offenses. Assets, or Log Action tabs

Full Access
Question # 31

An analyst wants to implement an AQL search in QRadar. Which two (2) tabs can be used to accomplish this implementation?

A.

Assets

B.

Vulnerabilities

C.

Log Activity

D.

Offenses

E.

Network Activity

Full Access
Question # 32

In Rule Response, which two (2) options are available for Offense Naming?

A.

This information should be removed from the current name of the associated offenses

B.

This information should contribute to (he name of the associated offenses

C.

This information should set or replace the name of the associated offenses

D.

This information should contribute to the dispatched event name of the associated offenses.

E.

This information should contribute to the category naming of the associated offenses

Full Access
Question # 33

Several systems were initially reviewed as active offenses, but further analysis revealed that the traffic generated by these source systems is legitimate and should not contribute to offenses.

How can the activity be fine-tuned when multiple source systems are found to be generating the same event and targeting several systems?

A.

Edit the building blocks by using the Custom Rules Editor to tune out a destination IP

B.

Use the Log Source Management app to tune the event

C.

Edit the building blocks by using the Custom Rules Editor to tune out the specific event

D.

Edit the building blocks by using the Custom Rules Editor to tune out a source IP

Full Access
Question # 34

What two (2) guidelines should you follow when you define your network hierarchy?

A.

Do not configure a network group with more than 15 objects.

B.

Organize your systems and networks by role or similar traffic patterns.

C.

Use the autoupdates feature to automatically populate the network hierarchy.

D.

Import scan results into QRadar.

E.

Use flow data to build the asset database.

Full Access
Question # 35

Which IBM X-Force Exchange feature could be used to query QRadar to see if any of the lOCs were detected for COVID-19 activities?

A.

TAXI I automatic updates

B.

STIX Bundle

C.

Threat Intelligence ATP

D.

Ami Affected

Full Access
Question # 36

An analyst must create a reference set collection containing the IPv6 addresses of command-and-control servers in an IBM X-Force Exchange collection in order to write a rule to detect any enterprise traffic with those malicious IP addresses.

What value type should the analyst select for the reference set?

A.

IP

B.

IPv6

C.

IPv4 or IPv6

D.

AlphaNumeric (Ignore Case)

Full Access
Question # 37

What is the name of the data collection set used in QRadar that can be populated with lOCs or other external data?

A.

Index set

B.

Reference set

C.

IOC set

D.

Data set

Full Access
Question # 38

A Security Analyst was asked to search for an offense on a specific day. The requester was not sore of the time frame, but had Source Host information to use as well as networks involved, Destination IP and username.

Which fitters can the Security Analyst use to search for the information requested?

A.

Offense ID, Source IP, Username

B.

Magnitude, Source IP, Destination IP

C.

Description, Destination IP. Host Name

D.

Specific Interval, Username, Destination IP

Full Access