Labour Day Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

C1000-162 Sample Questions Answers

Questions 4

The Use Case Manager app has an option to see MITRE heat map.

Which two (2) factors are responsible for the different colors in MITRE heat map?

Options:

A.

Number of events associated to offense

B.

Number of rules mapped

C.

Level of mapping confidence

D.

Number of offenses generated

E.

Number of log sources associated

Buy Now
Questions 5

Which are types of reference data collections in QRadar?

Options:

A.

Reference set. Reference data, and Reference rule

B.

Reference set, Reference map. and Reference map of maps

C.

Reference data. Reference table, and Reference event

D.

Reference event, Reference map of sets, and Reference data

Buy Now
Questions 6

When an analyst is investigating an offense, what is the property that specifies the device that attempts to breach the security of a component on the network?

Options:

A.

Source IP

B.

Network

C.

Destination IP

D.

Port

Buy Now
Questions 7

What can be considered a log source type?

Options:

A.

ICMP

B.

SNMP

C.

Juniper IOP

D.

Microsoft SMBtail

Buy Now
Questions 8

Which parameters are used to calculate the magnitude rating of an offense?

Options:

A.

Relevance, urgency, credibility

B.

Relevance, credibility, time

C.

Severity, relevance, credibility

D.

Severity, impact, urgency

Buy Now
Questions 9

An analyst runs a search with correct AQL. but no errors or results are shown.

What is one reason this could occur?

Options:

A.

The Quick Filter option is selected.

B.

The AQL search needs to be saved as a Quick Search before it can display any query.

C.

Microsoft Edge is not a supported browser.

D.

AQL search needs to be enabled in System Settings.

Buy Now
Questions 10

New vulnerability scanners are deployed in the company's infrastructure and generate a high number of offenses. Which function in the Use Case Manager app does an analyst use to update the list of vulnerability scanners?

Options:

Buy Now
Questions 11

The Pulse app contains which two (2) widget chart types?

Options:

A.

Small number chart

B.

Hexadecimal chart

C.

Binary chart

D.

Scatter chart

E.

Big number chart

Buy Now
Questions 12

Which type of rule requires a saved search that must be grouped around a common parameter

Options:

A.

Flow Rule

B.

Event Rule

C.

Common Rule

D.

Anomaly Rule

Buy Now
Questions 13

When searching for all events related to "Login Failure", which parameter should a security analyst use to filter the events?

Options:

A.

Event Asset Name

B.

Event Collector

C.

Anomaly Detection Event

D.

Event Name

Buy Now
Questions 14

What does this example of a YARA rule represent?

Options:

A.

Flags containing hex sequence and str1 less than three times

B.

Flags content that contains the hex sequence, and hex! at least three times

C.

Flags for str1 at an offset of 25 bytes into the file

D.

Flags content that contains the hex sequence, and str1 greater than three times

Buy Now
Questions 15

Which two (2) values are valid for the Offense Type field when a search is performed in the My Offenses or All Offenses tabs?

Options:

A.

QID

B.

Any

C.

Risk Score

D.

DDoS

E.

Source IP

Buy Now
Questions 16

What types of data does a Quick filter search operate on?

Options:

A.

Raw event or flow data

B.

Flow or parsing data

C.

Raw event or processed data

D.

Flow or processed data

Buy Now
Questions 17

Which two (2) aggregation types ate available for the pie chart in the Pulse app?

Options:

A.

Last

B.

Total

C.

Average

D.

First

E.

Middle

Buy Now
Questions 18

From which tabs can a QRadar custom rule be created?

Options:

A.

Log Activity or Network Action tabs

B.

Offenses or Admin tabs

C.

Offenses, Log Activity, or Network Activity tabs

D.

Offenses. Assets, or Log Action tabs

Buy Now
Questions 19

Which QRadar component provides the user interface that delivers real-time flow views?

Options:

A.

QRadar Viewer

B.

QRadar Console

C.

QRadar Flow Collector

D.

QRadar Flow Processor

Questions 20

Offense chaining is based on which field that is specified in the rule?

Options:

A.

Rule action field

B.

Offense response field

C.

Rule response field

D.

Offense index field

Buy Now
Questions 21

Which two (2) AQL functions are used for calculations and formatting?

Options:

A.

INCIDR

B.

START

C.

LOWER

D.

STRLEN

E.

GROUP BY

Buy Now
Questions 22

What right-click menu option can an analyst use to find information about an IP or URL?

Options:

A.

IBM Advanced Threat lookup

B.

Watson Advisor Al IOC Lookup

C.

QRadar Anomaly lookup

D.

X-Force Exchange Lookup

Buy Now
Questions 23

What happens when you select "False Positive" from the right-click menu in the Log Activity tab?

Options:

A.

You can tune out events that are known to be false positives.

B.

You can investigate an IP address or a user name.

C.

Items are filtered that match or do not match the selection.

D.

The selected event is filtered based on the selected parameter in the event.

Buy Now
Questions 24

What is the primary use of viewing the Magnitude metric on the Offenses tab?

Options:

A.

Determine which events to investigate last.

B.

Determine the credibility rating that is configured in the log source.

C.

Understand the type of offense we are facing.

D.

Identify the importance of the offense in your environment.

Buy Now
Questions 25

Which two (2) options are at the top level when an analyst right-clicks on the Source IP or Destination IP that is associated with an offense at the Offense Summary?

Options:

A.

Information

B.

DNS Lookup

C.

Navigate

D.

WHOIS Lookup

E.

Asset Summary page

Buy Now
Questions 26

Which two (2) aggregation types are available for the pie chart in the Pulse app?

Options:

A.

Last

B.

Middle

C.

Total

D.

First

E.

Average

Buy Now
Questions 27

Which parameter should be used if a security analyst needs to filter events based on the time when they occurred on the endpoints?

Options:

A.

Inspect "Log Time interval"

B.

Evaluate "Storage Time"

C.

Examine "Log Source Time"

D.

Review "Time Period"

Buy Now
Questions 28

In QRadar. common rules test against what?

Options:

A.

They test against incoming log source data that is processed by QRadar Event Processor

B.

They test the parameters of an offense to trigger more response

C.

They test against event and flow data

D.

They test against incoming flow data that is processed by the QRadar Flow Processor

Buy Now
Questions 29

On which lab can an analyst perform a "Flow Bias" Quick Search?

Options:

A.

Asset Management app

B.

Log Activity tab

C.

Log Source Management app

D.

Network Activity tab

Buy Now
Questions 30

What is the benefit of using default indexed properties for searching in QRadar?

Options:

A.

It increases the amount of data required to be searched.

B.

It improves the speed of searches.

C.

It returns fewer results than non-indexed properties.

D.

It reduces the number of indexed search values.

Buy Now
Questions 31

What does the logical operator != in an AQL query do?

Options:

A.

Compares a property to a value and returns false if they are unequal

B.

Takes a value and raises it to the specified power and returns the result

C.

Sets the value on the left of the operator equal to the right

D.

Compares two values and returns true if they are unequal

Buy Now
Questions 32

Which two (2) types of data can be displayed by default in the Application Overview dashboard?

Options:

A.

Login Failures by User {real-time)

B.

Flow Rate (Flows per Second - Peak 1 Min)

C.

Top Applications (Total Bytes)

D.

Outbound Traffic by Country (Total Bytes)

E.

ICMP Type/Code (Total Packets)

Buy Now
Questions 33

A Security Analyst was asked to search for an offense on a specific day. The requester was not sore of the time frame, but had Source Host information to use as well as networks involved, Destination IP and username.

Which fitters can the Security Analyst use to search for the information requested?

Options:

A.

Offense ID, Source IP, Username

B.

Magnitude, Source IP, Destination IP

C.

Description, Destination IP. Host Name

D.

Specific Interval, Username, Destination IP

Buy Now
Questions 34

Which statement regarding the time series chart is true?

Options:

A.

It displays static time series charts that represent the records that match and unmatch a specific time range search

B.

It displays interactive time series charts that represent the records that match a specific time range search

C.

The length of time that is required to export your data depends on the number of parameters specified and hidden

D.

The length of time that is required to export your data depends on the number of parameters specified

Buy Now
Questions 35

What type of custom property should be used when an analyst wants to combine extraction-based URLs, virus names, and secondary user names into a single property?

Options:

A.

AOL-based property

B.

Absolution-based property

C.

Extraction-based property

D.

Calculation-based property

Buy Now
Questions 36

Which action is performed in Edit Search to create a report from Offense data?

Options:

A.

Under Search Parameters, select "Use Offense Data".

B.

In the Select Data Source for report field, select "Offense".

C.

In the Data Source field, type offense.

D.

Under Search Parameters, select "Associated With Offense Equals True".

Buy Now
Questions 37

Which two (2) components are necessary for generating a report using the QRadar Report wizard?

Options:

A.

Saved search

B.

Dynamic search

C.

Layout

D.

Quick search

E.

Email address

Buy Now
Questions 38

A new log source was configured to send events to QRadar to help detect a malware outbreak. A security analyst has to create an offense based on properties from this payload but not all the information is parsed correctly.

What is the sequence of steps to ensure that the correct information is pulled from the payload to use in a rule?

Options:

Buy Now
Exam Code: C1000-162
Exam Name: IBM Security QRadar SIEM V7.5 Analysis
Last Update: May 7, 2024
Questions: 127
$64  $159.99
$48  $119.99
$40  $99.99
buy now C1000-162