IBM Security QRadar SIEM V7.5 Administration C1000-156 Exam Questions

Page: 1 / 14
Total 62 questions
Question 1

When creating an identity exclusion search, what time range do you select?



Answer : B

When creating an identity exclusion search in IBM QRadar SIEM V7.5, the time range selected is 'Real time (streaming).' This setting ensures that the search continuously monitors and excludes identities in real-time as data is ingested. Here's the process:

Real-time Monitoring: Continuously updates the search results based on incoming data, providing immediate exclusion of specified identities.

Streaming Data: Processes data in a live stream, ensuring that the exclusion criteria are applied instantaneously as new events occur.

Reference The setup and configuration of identity exclusion searches are detailed in the QRadar SIEM administration guides, highlighting the importance of real-time streaming for effective identity management.


Question 2

Which two (2) open standards does the QRadar Threat Intelligence app use for feeds?



Answer : A, C

The QRadar Threat Intelligence app uses open standards to integrate and utilize threat intelligence feeds effectively. The two key standards used are:

TAXII (Trusted Automated eXchange of Indicator Information): This is an application layer protocol used for exchanging cyber threat intelligence over HTTPS. It enables the sharing of threat information across different systems and organizations.

STIX (Structured Threat Information eXpression): This is a standardized language used for representing structured cyber threat information. STIX enables the consistent and machine-readable representation of threat data, facilitating the integration and analysis of threat intelligence.

These standards ensure that threat intelligence data is formatted and exchanged in a consistent and interoperable manner, enhancing the overall effectiveness of the threat intelligence processes in QRadar.

Reference The IBM QRadar SIEM documentation and threat intelligence app configuration guides describe the use of TAXII and STIX for integrating threat intelligence feeds.


Question 3

How can you configure a log source to provide events to different domains?



Answer : C

To configure a log source in IBM QRadar SIEM V7.5 to provide events to different domains, administrators can use custom properties. Here's how it works:

Custom Properties: Create and configure custom properties to tag events with specific domain information.

Assigning Events: When events are ingested from a log source, these custom properties can be used to dynamically assign events to different domains based on predefined criteria.

Domain Management: This approach allows flexibility in managing and segregating data from a single log source across multiple domains, ensuring that each domain receives the relevant events.

Reference The configuration of custom properties for domain assignment is detailed in the QRadar SIEM administration guides, providing step-by-step instructions for setting up and using custom properties for domain management.


Question 4

In which QRadar section can the administrator view the license giveback rate?



Answer : C

In IBM QRadar SIEM V7.5, the license giveback rate can be viewed in the License Pool Management section. Here's the step-by-step process:

Access Admin Tab: The administrator needs to navigate to the Admin tab in the QRadar GUI.

License Pool Management: Under the Admin tab, there is an option for License Pool Management.

View License Giveback Rate: Within the License Pool Management section, the administrator can view details about license usage, including the giveback rate.

Reference The QRadar SIEM administration guide provides detailed steps on accessing and managing license information, including the giveback rate, under the Admin tab.


Question 5

A ORadar administrator creates a new saved search in QRadar and wants to add the search to a dashboard, but the option "Include in my Dashboard" cannot be selected.

What is a possible reason it is unavailable?



Answer : D

If the option 'Include in my Dashboard' cannot be selected when creating a saved search in IBM QRadar SIEM V7.5, a possible reason is insufficient permissions. Here's why:

Permissions: The user needs appropriate permissions to add saved searches to the dashboard.

Role-Based Access Control: QRadar uses role-based access control to manage user permissions. The user's role must include the necessary privileges to modify dashboards.

Verification: Ensure that the user has the correct permissions assigned. This can be checked and adjusted in the user management settings.

Reference IBM QRadar SIEM administration guides explain the permissions required for various actions, including adding saved searches to dashboards, and how to configure user roles and permissions.


Question 6

Which profile database does the Server Discovery function use to discover several types of servers on a network?



Answer : D

The Server Discovery function in IBM QRadar SIEM V7.5 uses the Asset Profile Database to discover various types of servers on a network. This database stores detailed information about the assets, including server types, configurations, and roles within the network. Here's how it works:

Asset Profile Database: This is the central repository that contains all the discovered asset information.

Discovery Process: During the discovery process, QRadar scans the network to identify servers and other devices, collecting information such as IP addresses, open ports, services, and operating systems.

Classification: The collected data is then analyzed and classified, updating the Asset Profile Database with the types of servers discovered.

Reference IBM QRadar SIEM documentation specifies the use of the Asset Profile Database for server discovery functionalities and provides details on configuring and managing asset profiles.


Question 7

When adjusting a custom email template, which two elements do you edit to include the customizations?



Answer : D

When adjusting a custom email template in IBM QRadar SIEM V7.5, the two elements that need to be edited to include customizations are:

<subject>: This element defines the subject line of the email, which can be customized to provide a clear and relevant description of the email's content.

<body>: This element contains the main content of the email. Customizing the body allows administrators to include specific information, formatting, and messages relevant to the recipient.

Customizing these elements ensures that the email notifications are informative and tailored to the needs of the recipients.

Reference The QRadar SIEM user and configuration guides provide instructions on customizing email templates, highlighting the <subject> and <body> elements as key areas for customization.


Page:    1 / 14   
Total 62 questions