Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the IBM Security Systems C1000-156 Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam C1000-156 Premium Access

View all detail and faqs for the C1000-156 exam


443 Students Passed

91% Average Score

93% Same Questions
Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

When configuring a log source, which protocols are used when receiving data into the event ingress component?

Options:

A.

SFTR HTTP Receiver, SNMP

B.

Syslog, HTTP Receiver, SNMP

C.

Syslog, FTP Receiver, SNMP

D.

Syslog, HTTP Receiver, JDBC

Questions # 2:

An administrator wants to export a list of events to a CSV file. Which items are in the default columns of the search result?

Options:

A.

Log Source. Event Count. High Level Category. Related Offense

B.

Event Name. Application, Username, Log Source

C.

Username. Source Port. Event Count, Magnitude

D.

Protocol. Storage Time, Destination Port, Source Port

Questions # 3:

Which authentication type in QRadar encrypts the username and password and forwards the username and password to the external server for authentication?

Options:

A.

RADIUS authentication

B.

Two-factor authentication

C.

TACACS authentication

D.

System authentication

Questions # 4:

What is the most restrictive permissions a user needs in order to see all of the events from a particular log source in the Log Activity tab?

Options:

A.

The user needs access to the Networks AND Log Sources to see a particular log in the activity tab.

B.

The user's security profile must include that log source, and the profile needs permission to Networks AND Log Sources.

C.

A user needs access to Flow Sources Only.

D.

The log source must be included in the user's security profile and the profile needs its precedence set to Log Sources Only.

Questions # 5:

A QRadar administrator creates a new saved search in QRadar.

Which option does the administrator enable to allow this search to be opened as the Log Activity tab is opened?

Options:

A.

Set as Default

B.

Include in my Quick Searches

C.

Include in my Dashboard

D.

Share with Everyone

Questions # 6:

How can you configure a log source to provide events to different domains?

Options:

A.

Create a saved search on the Network Activity tab to view events in specific domains.

B.

Use the Assistant app to update the domain information for the log source.

C.

Use custom properties to assign events from a single log source to different domains.

D.

Use the Use Case Manager app to update building blocks to support multi domain events.

Questions # 7:

What parameter contributes to the magnitude score of an offense?

Options:

A.

Confidentiality

B.

Availability

C.

Integrity

D.

Credibility

Questions # 8:

Which is a valid routing rule combination?

Options:

A.

Drop and Bypass Correlation

B.

Drop and Log Only

C.

Forward and Bypass Correlation

D.

Bypass Correlation and Log Only

Questions # 9:

A user reports that some data points are missing from a generated report. The logs show these notifications, which are determined to be the root

cause of the problem:

The accumulator was unable to aggregate all events/flows for this interval.

In what timeframe does this system need to complete data aggregation for it to be deemed successful?

Options:

A.

30 seconds

B.

5 seconds

C.

120 seconds

D.

60 seconds

Questions # 10:

Which field is mandatory when you use the DSM Editor to map an event to a OID?

Options:

A.

High-level Category

B.

Low-level Category

C.

Event Category

D.

Event ID

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.