Summer Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

After conducting a thorough analysis, it was discovered that the traffic generated by an attacker targeting one system through many unique events in different categories is legitimate and should not be classified as an offense.

Which tuning methodology guideline can be used to tune out this traffic?

A.

Edit the Log Source Management app to tune the category

B.

Edit the buildingblocks byusingtheCustomRulesEditor to tune the category

C.

Edit the buildingblocks byusingtheCustomRulesEditor to tune the specific event

D.

Edit the buildingblocks byusingtheCustomRulesEditor to tune the destinationIP address

Full Access
Question # 5

What can be considered a log source type?

A.

ICMP

B.

SNMP

C.

Juniper IOP

D.

Microsoft SMBtail

Full Access
Question # 6

From the Offense Summary window, how is the list of rules that contributed to a chained offense identified?

A.

Select Display > Notes

B.

Select Actions > Rules

C.

Select Display > Rules

D.

Listed in the notes section

Full Access
Question # 7

In QRadar. common rules test against what?

A.

They test against incoming log source data that is processed by QRadar Event Processor

B.

They test the parameters of an offense to trigger more response

C.

They test against event and flow data

D.

They test against incoming flow data that is processed by the QRadar Flow Processor

Full Access
Question # 8

Which two (2) statements regarding indexed custom event properties are true?

A.

The indexed filter adds to portions of the data set.

B.

The indexed filter eliminates portions of the data set and reduces the overall data volume and number of event or flow logs that must be searched.

C.

By default, data retention for the index payload is 7 days.

D.

Indexing searches a full event payload for values.

E.

Use indexed event and flow properties to optimize your searches.

Full Access
Question # 9

When an analyst is investigating an offense, what is the property that specifies the device that attempts to breach the security of a component on the network?

A.

Source IP

B.

Network

C.

Destination IP

D.

Port

Full Access
Question # 10

Which two (2) dashboards in the Pulse app by default?

A.

Active threats

B.

System metrics

C.

Summary view

D.

Compliance overview

E.

Offense overview

Full Access
Question # 11

Which kind of information do log sources provide?

A.

User login actions

B.

Operating system updates

C.

Flows generated by users

D.

Router configuration exports.

Full Access
Question # 12

What feature in QRadar uses existing asset profile data so administrators can define unknown server types and assign them to a server definition in building blocks and in the network hierarchy?

A.

Server roles

B.

Active servers

C.

Server discovery

D.

Server profiles

Full Access
Question # 13

Which two high level Event Categories are used by QRadar? (Choose two.)

A.

Policy

B.

Direction

C.

Localization

D.

Justification

E.

Authentication

Full Access
Question # 14

Which flow fields should be used to determine how long a session has been active on a network?

A.

Start time and end time

B.

Start time and storage time

C.

Start time and last packet time

D.

Last packet time and storage time

Full Access
Question # 15

QRadar analysts can download different types of content extensions from the IBM X-Force Exchange portal. Which two (2) types of content extensions are supported by QRadar?

A.

Custom Functions

B.

Events

C.

Flows

D.

FGroup

E.

Offenses

Full Access
Question # 16

What QRadar application can help you ensure that IBM GRadar is optimally configured to detect threats accurately throughout the attack chain?

A.

Rules Reviewer

B.

Log Source Manager

C.

QRadar Deployment Intelligence

D.

Use Case Manager

Full Access
Question # 17

Which two (2) options are at the top level when an analyst right-clicks on the Source IP or Destination IP that is associated with an offense at the Offense Summary?

A.

Information

B.

Asset Summary page

C.

Navigate

D.

WHOIS Lookup

E.

DNS Lookup

Full Access
Question # 18

For a rule containing the test "and when the source is located in this geographic location" to work properly, what must a QRadar analyst configure?

A.

IBM X-Force Exchange updates

B.

MaxMind updates

C.

IBM X-Force Exchange ATP updates

D.

Watson updates

Full Access
Question # 19

From which tabs can a QRadar custom rule be created?

A.

Log Activity or Network Action tabs

B.

Offenses or Admin tabs

C.

Offenses, Log Activity, or Network Activity tabs

D.

Offenses. Assets, or Log Action tabs

Full Access
Question # 20

What does the Next Run Time column display when a report is queued for generation in QRadar?

A.

Time the report ran last

B.

Number of times the report ran

C.

Position of the report in the queue

D.

Time it takes to generate the report

Full Access
Question # 21

How can adding indexed properties to QRadar improve the efficiency of searches?

A.

By reducing the size of the data set required to find non-indexed search values

B.

By increasing the size of the data set required to find non-indexed search values

C.

By slowing down the search process

D.

By reducing the number of indexed search values

Full Access
Question # 22

New vulnerability scanners are deployed in the company's infrastructure and generate a high number of offenses. Which function in the Use Case Manager app does an analyst use to update the list of vulnerability scanners?

Full Access
Question # 23

How can an analyst identify the top rules that generated offenses in the previous week and were closed as false positives or tuned?

A.

From Reports > Offenses Report > Weekly reports > False positives reports

B.

Use Case Manager app > Active Rules > Filter Offenses with start date > Closure Reason > Select False-Positive, Tuned

C.

Use Case Manager app > CRE Report > Filter Offenses with the following direction > R2R > Select False-Positive, Tuned.

D.

From Reports > CRE Report > Weekly reports > False positives reports

Full Access
Question # 24

Which statement regarding the use of the internal structured language of the QRadar database is true?

A.

Use AQL to extract, filter, and perform actions on event and flow data that you extract from the Ariel database

B.

Use AQL to extract, filter and manipulate event, flow and use cases data from the Ariel database

C.

Use AQL to accelerate and make tuning event and flow data from the Ariel database

D.

Use AQL to accelerate and make tuning event, flow and use cases data from the Ariel database

Full Access
Question # 25

Which of the configured parameters is found in the Event Details page?

A.

Event Processor UUID

B.

High Level Category

C.

Log Source Time

D.

Log Source Group

Full Access
Question # 26

When investigating an offense, how does one find the number of flows or events associated with it?

A.

EvenVFIow count field

B.

List Events/Flows

C.

Export count to CSV

D.

Display > Events

Full Access
Question # 27

When you create a report, you must choose a chart type for each chart that is included in the report.

Which two (2) chart types can you include in a report?

A.

Flows

B.

Raw Data

C.

Containers

D.

Scanners

E.

Log Sources

Full Access
Question # 28

How does a Device Support Module (DSM) function?

A.

A DSM is a configuration file that combines received events from multiple log sources and displays them as offenses in QRadar.

B.

A DSM is a background service running on the QRadar appliance that reaches out to devices deployed in a network for configuration data.

C.

A DSM is a configuration file that parses received events from multiple log sources and converts them to a standard taxonomy format that can be displayed as outputs.

D.

A DSM is an installed appliance that parses received events from multiple log sources and converts them to a standard taxonomy format that can be displayed as outputs.

Full Access
Question # 29

Which type of rule should you use to test events or (lows for activities that are greater than or less than a specified range?

A.

Behavioral rules

B.

Anomaly rules

C.

Custom rules

D.

Threshold rules

Full Access
Question # 30

Which two (2) options are used to search offense data on the By Networks page?

A.

Raw/Flows

B.

Events/Flows

C.

NetIP

D.

Severity

E.

Network

Full Access
Question # 31

Which two (2) of these custom property expression types are supported in QRadar?

A.

XLS

B.

YAML

C.

JSON

D.

Regex

E.

HTML

Full Access
Question # 32

Select all that apply

What is the sequence to create and save a new search called "Offense Data" that shows all the CRE events that are associated with offenses?

Full Access
Question # 33

The Pulse app contains which two (2) widget chart types?

A.

Small number chart

B.

Hexadecimal chart

C.

Binary chart

D.

Scatter chart

E.

Big number chart

Full Access
Question # 34

A mapping of a username to a user’s manager can be stored in a Reference Table and output in a search or a report.

Which mechanism could be used to do this?

A.

Quick Search filters can select users based on their manager’s name.

B.

Reference Table lookup values can be accessed in an advanced search.

C.

Reference Table lookup values can be accessed as custom event properties.

D.

Reference Table lookup values are automatically used whenever a saved search is run.

Full Access
Question # 35

An analyst runs a search with correct AQL. but no errors or results are shown.

What is one reason this could occur?

A.

The Quick Filter option is selected.

B.

The AQL search needs to be saved as a Quick Search before it can display any query.

C.

Microsoft Edge is not a supported browser.

D.

AQL search needs to be enabled in System Settings.

Full Access
Question # 36

Which statement regarding the Assets tab is true?

A.

The display is populated with all discovered assets in your network.

B.

It displays flow information to determine how and what network traffic is communicated.

C.

It displays connection information to determine how different network devices are connected.

D.

The display is populated with all eliminated and recreated assets in your network.

Full Access
Question # 37

Which two (2) components are necessary for generating a report using the QRadar Report wizard?

A.

Saved search

B.

Dynamic search

C.

Layout

D.

Quick search

E.

Email address

Full Access
Question # 38

Which two (2) are valid options available for configuring the frequency of report execution in the QRadar Report wizard?

A.

Quarterly

B.

Automatically

C.

Monthly

D.

Yearly

E.

Manually

Full Access
Question # 39

Which two (2) options are at the top level when an analyst right-clicks on the Source IP or Destination IP that is associated with an offense at the Offense Summary?

A.

Information

B.

DNS Lookup

C.

Navigate

D.

WHOIS Lookup

E.

Asset Summary page

Full Access
Question # 40

a selection of events for further investigation to somebody who does not have access to the QRadar system.

Which of these approaches provides an accurate copy of the required data in a readable format?

A.

Log in to the Command Line Interface and use the ACP tool (/opt/qradar/bin/runjava.sh com.qllabs .ariel. Io.acp) with the necessary AQLfilters and destination directory.

B.

Use the Advanced Search option in the Log Activity tab, run an AQL command: copy (select * from events last 2 hours) to ’output_events.csv’ WITH CSV.

C.

Use the "Event Export (with AQL)" option in the Log Activity tab, test your query with the Test button. Then, to run the export, click Export to CSV.

D.

Use the Log Activity tab, filter the events until only those that you require are shown. Then, from the Actions list, select Export to CSV > Full Export (All Columns).

Full Access
Question # 41

Which log source and protocol combination delivers events to QRadar in real time?

A.

Sophos Enterprise console via JDBC

B.

McAfee ePolicy Orchestrator via JDBC

C.

McAfee ePolicy Orchestrator via SNMP

D.

Solaris Basic Security Mode (BSM) via Log File Protocol

Full Access