Black Friday Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

C1000-162 Questions and Answers

Question # 6

How can an analyst improve the speed of searches in QRadar?

A.

Narrow the overall data by adding an indexed field in the search query.

B.

Increase the overall data in the search query.

C.

Use Index Management to disable indexing.

D.

Remove all indexed fields from the search query.

Full Access
Question # 7

What is the effect of toggling the Global/Local option to Global in a Custom Rule?

A.

It allows a rule to compare events & flows in real time.

B.

It allows a rule to analyze the geographic location of the event source.

C.

It allows rules to be tracked by the central processor for detection by any Event Processor.

D.

It allows a rule to inject new events back into the pipeline to affect and update other incoming events.

Full Access
Question # 8

Which two (2) aggregation types are available for the pie chart in the Pulse app?

A.

Last

B.

Middle

C.

Total

D.

First

E.

Average

Full Access
Question # 9

A QRadar analyst is using the Log Activity screen to investigate the events that triggered an offense.

How can the analyst differentiate events that are associated with an offense?

A.

A red star icon in the first column of event list indicates a fully-matched event

B.

Fully matched events are not indexed

C.

Separate columns named 'Paritally matched’ and 'Fully matched' are populated

D.

Partially matched events are not indexed

Full Access
Question # 10

What is the name of the data collection set used in QRadar that can be populated with lOCs or other external data?

A.

Index set

B.

Reference set

C.

IOC set

D.

Data set

Full Access
Question # 11

The Use Case Manager app has an option to see MITRE heat map.

Which two (2) factors are responsible for the different colors in MITRE heat map?

A.

Number of events associated to offense

B.

Number of rules mapped

C.

Level of mapping confidence

D.

Number of offenses generated

E.

Number of log sources associated

Full Access
Question # 12

What types of data does a Quick filter search operate on?

A.

Raw event or flow data

B.

Flow or parsing data

C.

Raw event or processed data

D.

Flow or processed data

Full Access
Question # 13

What are the behavioral rule test parameter options?

A.

Behavioral rule. Current traffic level, Predicted value

B.

Season, Anomaly detection. Current traffic trend

C.

Season, Current traffic level, Predicted value

D.

Current traffic behavior. Behavioral rule. Current traffic level

Full Access
Question # 14

How can an analyst identify the top rules that generated offenses in the previous week and were closed as false positives or tuned?

A.

From Reports > Offenses Report > Weekly reports > False positives reports

B.

Use Case Manager app > Active Rules > Filter Offenses with start date > Closure Reason > Select False-Positive, Tuned

C.

Use Case Manager app > CRE Report > Filter Offenses with the following direction > R2R > Select False-Positive, Tuned.

D.

From Reports > CRE Report > Weekly reports > False positives reports

Full Access
Question # 15

Which browser is officially supported for QRadar?

A.

Safari version 9.0-3

B.

Chromium version 33

C.

32-bit Internet Explorer 9

D.

Firefox version 38.0 ESR

Full Access
Question # 16

A QRadar analyst would like to search for events that have fully matched rules which triggered offenses.

What parameter and value should the analyst add as filter in the event search?

A.

Associated with Offense is True

B.

Associated with Rule is True

C.

Associated with Rule is False

D.

Associated with Offense is False

Full Access
Question # 17

What type of rules will test events or flows for volume changes that occur in regular patterns to detect outliers?

A.

Behavioral rules

B.

Anomaly rules

C.

Custom rules

D.

Threshold rules

Full Access
Question # 18

Which two (2) tasks are uses of the QRadar network hierarchy?

A.

Understand network traffic

B.

Monitor traffic and profile the behavior of each group and host within the group

C.

Monitor risky users within your organization

D.

Determine and identify Command and Control systems

E.

Monitor network devices

Full Access
Question # 19

Where can you view a list of events associated with an offense in the Offense Summary window?

A.

Destination IPs

B.

Events from Event/Flow count column

C.

Display > Destination IPs

D.

Source IPs

Full Access
Question # 20

When using the Dynamic Search window on the Admin tab, which two (2) data sources are available?

A.

ASSETS

B.

PAYLOAD

C.

OFFENSES

D.

AOL QUERY

E.

SAVED SEARCHES

Full Access
Question # 21

Several systems were initially reviewed as active offenses, but further analysis revealed that the traffic generated by these source systems is legitimate and should not contribute to offenses.

How can the activity be fine-tuned when multiple source systems are found to be generating the same event and targeting several systems?

A.

Edit the building blocks by using the Custom Rules Editor to tune out a destination IP

B.

Use the Log Source Management app to tune the event

C.

Edit the building blocks by using the Custom Rules Editor to tune out the specific event

D.

Edit the building blocks by using the Custom Rules Editor to tune out a source IP

Full Access
Question # 22

To test for authorized access to a patent, create a list that uses a custom event property for Patent id as the key, and the username parameter as the value. Data is stored in records that map a key to multiple values and every key is unique. Use this list to populate a list of authorized users.

The example above refers to what kind of reference data collections?

A.

Reference map of maps

B.

Reference map

C.

Reference map of sets

D.

Reference table

Full Access
Question # 23

A Security Analyst has noticed that an offense has been marked inactive.

How long had the offense been open since it had last been updated with new events or flows?

A.

1 day + 30 minutes

B.

5 days + 30 minutes

C.

10 days + 30 minutes

D.

30 days + 30 minutes

Full Access
Question # 24

To verify whether the login ID that was used to log in to QRadar is assigned to a user, create a list with the LoginlD parameter.

This example refers to what kind of reference data collections?

A.

Reference map of maps

B.

Reference login

C.

Reference map

D.

Reference set

Full Access
Question # 25

What happens when you select "False Positive" from the right-click menu in the Log Activity tab?

A.

You can tune out events that are known to be false positives.

B.

You can investigate an IP address or a user name.

C.

Items are filtered that match or do not match the selection.

D.

The selected event is filtered based on the selected parameter in the event.

Full Access
Question # 26

A mapping of a username to a user’s manager can be stored in a Reference Table and output in a search or a report.

Which mechanism could be used to do this?

A.

Quick Search filters can select users based on their manager’s name.

B.

Reference Table lookup values can be accessed in an advanced search.

C.

Reference Table lookup values can be accessed as custom event properties.

D.

Reference Table lookup values are automatically used whenever a saved search is run.

Full Access
Question # 27

What process is used to perform an IP address X-Force Exchange Lookup in QRadar?

A.

Offense summary tab > right-click IP address > Plugin Option > X-Force Exchange Lookup

B.

Copy the IP address and go to X-Force Exchange to perform the lookup

C.

Run Autoupdate

D.

Run a query on maxmind db

Full Access
Question # 28

What are two (2) Y-axis types that are available in the scatter chart type in the Pulse app?

A.

Linear

B.

Log

C.

General

D.

Threshold

E.

Dynamic

Full Access
Question # 29

Which parameter should be used if a security analyst needs to filter events based on the time when they occurred on the endpoints?

A.

Inspect "Log Time interval"

B.

Evaluate "Storage Time"

C.

Examine "Log Source Time"

D.

Review "Time Period"

Full Access
Question # 30

On the Log Activity tab in QRadar. what are the options available when right-clicking an IP address of an event to access more event filter information?

A.

Filter on. False Positive. More Options. Quick Filter

B.

Filter out, False Negative, More Options, Quick Filter

C.

Filter off, True Positive, Less Options, Quick Search

D.

Filter in, True Negative, Less Options. Quick Search

Full Access
Question # 31

Select all that apply

What is the sequence to create and save a new search called "Offense Data" that shows all the CRE events that are associated with offenses?

Full Access
Question # 32

a selection of events for further investigation to somebody who does not have access to the QRadar system.

Which of these approaches provides an accurate copy of the required data in a readable format?

A.

Log in to the Command Line Interface and use the ACP tool (/opt/qradar/bin/runjava.sh com.qllabs .ariel. Io.acp) with the necessary AQLfilters and destination directory.

B.

Use the Advanced Search option in the Log Activity tab, run an AQL command: copy (select * from events last 2 hours) to ’output_events.csv’ WITH CSV.

C.

Use the "Event Export (with AQL)" option in the Log Activity tab, test your query with the Test button. Then, to run the export, click Export to CSV.

D.

Use the Log Activity tab, filter the events until only those that you require are shown. Then, from the Actions list, select Export to CSV > Full Export (All Columns).

Full Access
Question # 33

On the Reports tab in QRadar. what does the message "Queued (position in the queue)" indicate when generating a report?

A.

The report is scheduled to run, and the message is a count-down timer that specifies when the report will run next.

B.

The report is ready to be viewed in the Generated Reports column.

C.

The report is generating.

D.

The report is queued for generation and the message indicates the position of the report in the queue.

Full Access
Question # 34

After how much time will QRadar mark an Event offense dormant if no new events or flows occur?

A.

2 hours

B.

30 minutes

C.

24 hours

D.

5 minutes

Full Access
Question # 35

Which two (2) of these elements can be used by the Report wizard to design a report?

A.

Assets

B.

Network

C.

Traffic

D.

Content

E.

Layout

Full Access
Question # 36

Which two (2) values are valid for the Offense Type field when a search is performed in the My Offenses or All Offenses tabs?

A.

QID

B.

Any

C.

Risk Score

D.

DDoS

E.

Source IP

Full Access
Question # 37

In QRadar. common rules test against what?

A.

They test against incoming log source data that is processed by QRadar Event Processor

B.

They test the parameters of an offense to trigger more response

C.

They test against event and flow data

D.

They test against incoming flow data that is processed by the QRadar Flow Processor

Full Access
Question # 38

From the Offense Summary window, how is the list of rules that contributed to a chained offense identified?

A.

Select Display > Notes

B.

Select Actions > Rules

C.

Select Display > Rules

D.

Listed in the notes section

Full Access
Question # 39

An analyst must create a reference set collection containing the IPv6 addresses of command-and-control servers in an IBM X-Force Exchange collection in order to write a rule to detect any enterprise traffic with those malicious IP addresses.

What value type should the analyst select for the reference set?

A.

IP

B.

IPv6

C.

IPv4 or IPv6

D.

AlphaNumeric (Ignore Case)

Full Access
Question # 40

Which QRadar component provides the user interface that delivers real-time flow views?

A.

QRadar Viewer

B.

QRadar Console

C.

QRadar Flow Collector

D.

QRadar Flow Processor

Full Access
Question # 41

Which types of information does QRadar analyze to create an offense from the rule?

A.

Known vulnerabilities, known threats, and incoming and outgoing events

B.

Incoming and outgoing events, unknown vulnerabilities, and malware

C.

Malware, asset, firewall, and incoming events

D.

Incoming events and flows, asset information, and known vulnerabilities

Full Access