Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the IBM Security Systems C1000-162 Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam C1000-162 Premium Access

View all detail and faqs for the C1000-162 exam


476 Students Passed

92% Average Score

91% Same Questions
Viewing page 1 out of 5 pages
Viewing questions 1-10 out of questions
Questions # 1:

Many offenses are generated and an analyst confirms that they match some kind of vulnerability scanning.

Which building block group needs to be updated to include the source IP of the vulnerability assessment (VA) scanner to reduce the number of offenses that are being generated?

Options:

A.

Host reference

B.

Host definitions

C.

Behavior definition

D.

Device definition

Questions # 2:

AQRadar analyst can check the rule coverage of MITRE ATT&CK tactics and techniques by using Use Case Manager.

In the Use Case Manager app, how can a QRadar analyst check the offenses triggered and mapped to MITRE ATT&CK framework?

Options:

A.

By navigating to "CRE Report"

B.

From Offenses tab

C.

By clicking on "Tuning Home"

D.

By navigating to "Detected in timeframe"

Questions # 3:

What does the Next Run Time column display when a report is queued for generation in QRadar?

Options:

A.

Time the report ran last

B.

Number of times the report ran

C.

Position of the report in the queue

D.

Time it takes to generate the report

Questions # 4:

How do events appear in QRadar if there was an error in the JSON parser for a new log source to which a custom log source extension was created?

Options:

A.

SIM events

B.

Parsed events

C.

Stored events

D.

CRE events

Questions # 5:

Which parameter is calculated based on the relevance, severity, and credibility of an offense?

Options:

A.

Magnitude rating

B.

Severity age

C.

Impact rating

Questions # 6:

When an analyst is investigating an offense, what is the property that specifies the device that attempts to breach the security of a component on the network?

Options:

A.

Source IP

B.

Network

C.

Destination IP

D.

Port

Questions # 7:

Several systems were initially reviewed as active offenses, but further analysis revealed that the traffic generated by these source systems is legitimate and should not contribute to offenses.

How can the activity be fine-tuned when multiple source systems are found to be generating the same event and targeting several systems?

Options:

A.

Edit the building blocks by using the Custom Rules Editor to tune out a destination IP

B.

Use the Log Source Management app to tune the event

C.

Edit the building blocks by using the Custom Rules Editor to tune out the specific event

D.

Edit the building blocks by using the Custom Rules Editor to tune out a source IP

Questions # 8:

What type of reference data collection would you use to correlate a unique key to a value?

Options:

A.

Reference map

B.

Reference list

C.

Reference table

D.

Reference set

Questions # 9:

Which two (2) columns are valid for searches in the My Offenses and All Offenses tabs in QRadar?

Options:

A.

Impact

B.

Source IPs

C.

Relevance

D.

Weight

E.

Id

Questions # 10:

A QRadar analyst wants to limit the time period for which an AOL query is evaluated. Which functions and clauses could be used for this?

Options:

A.

START, BETWEEN. LAST. NOW. PARSEDATETIME

B.

START, STOP. LAST, NOW, PARSEDATETIME

C.

START. STOP. BETWEEN, FIRST

D.

START, STOP. BETWEEN, LAST

Viewing page 1 out of 5 pages
Viewing questions 1-10 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.