IBM C1000-018 IBM QRadar SIEM V7.3.2 Fundamental Analysis Online Training
IBM C1000-018 Online Training
The questions for C1000-018 were last updated at Nov 22,2024.
- Exam Code: C1000-018
- Exam Name: IBM QRadar SIEM V7.3.2 Fundamental Analysis
- Certification Provider: IBM
- Latest update: Nov 22,2024
QRadar collects information from numerous log sources and other agents. Sometimes these agents stop reporting to QRadar for a variety of reasons. There is a default rule in QRadar to help identify these cases called the Device Stopped Sending Events (DSSE) Rule.
What does the DSSE Rule do?
- A . It checks for log sources which are reporting that they have not had any communication in a certain amount of time.
- B . It checks for Rules which have fired due to an absence of Events.
- C . It runs when there is an absence of Events.
- D . It listens for log sources that send out regular health events and triggers the Rule when encountered
An analyst is encountering a large number of false positive results. Legitimate internal network traffic contains valid flows and events which are making it difficult to identify true security incidents.
What can the analyst do to reduce these false positive indicators?
- A . Create X-Force rules to detect false positive events.
- B . Create an anomaly rule to detect false positives and suppress the event.
- C . Filter the network traffic to receive only security related events.
- D . Modify rules and/or Building Block to suppress false positive activity.
A new analyst is tasked to identify potential false positive Offenses, then send details of those Offenses to the Security Operations Center (SOC) manager for review by using the send email notification feature.
- A . Total number of sources, top five categories, total number of destinations. Contributing CRE rules total number of packets.
- B . Total number of sources, top five sources by magnitude, total number of destinations, destination networks, total number of packets.
- C . Total number of sources, top five sources by magnitude, total number of destinations, destination networks, total number of events.
- D . Total number of sources, top five number of categories, total number of destinations, destination networks, total number of packets.
What event information within an offense would provide the analyst with a deep insight as to how it was created?
- A . Event Category
- B . Event QID
- C . Event Payload
- D . Event Magnitude
An analyst needs to create a rule that includes a building block definition that identifies a communication to a local SMTP server that then connects to an unapproved remote peer.
In which group will the analyst find this specified building block?
- A . Category Definitions
- B . Host Definitions
- C . Network Definitions
- D . Policy
An analyst needs to create a new custom dashboard to view dashboard items that meet a particular requirement.
What are the main steps in the process?
- A . Select New Dashboard and enter unique name, description, add items and save.
- B . Select New Dashboard and copy name, add description, items and save.
- C . Request the administrator to create the custom dashboard with required items.
- D . Locate existing dashboard and modify to include indexed items required and save.
Which statement about False Positive Building Blocks applies?
Using False Positive Building Blocks:
- A . helps to prevent unwanted alerts, but there is no effect on performance.
- B . helps to prevent unwanted alerts, and reduces the performance impact of testing rules that do not need to be tested.
- C . has no impact on unwanted alerts, but it does reduce the performance impact of testing rules that do not need to be tested.
- D . has no impact on unwanted alerts, or performance.
An analyst needs to find all events that are creating offenses that are triggered by rules that contain the word suspicious in the rule name.
Which query can the analyst use as a working sample?
- A . SELECT LOGSOURCENAME(logsourceid), * from events where RULENAME(creeventlist) ILIKE ‘%suspicious%’
- B . SELECT LOGGEDOFFENSE(logsourceid), * from offense_events where RULENAME(creeventlist) ILIKE ,%suspicious%’
- C . SELECT LOGSOURCETYPE(logsourceid), – from log_events where RULENAME(creeventlist) ILIKE ‘%suspicious%’
- D . SELECT LOGSOURCERULES(logsourceid), " from rule_events where RULENAME(creeventlist) ILIKE ‘%suspicious%’
Where can an analyst working with Offenses add a regular expression test into an existing rule?
- A . Top
- B . Right
- C . Bottom
- D . Left
Where can an analyst investigate a security incident to determine the root cause of an issue, and then work to resolve it?
- A . Risk tab
- B . Network Activity tab
- C . Offense tab
- D . Vulnerabilities tab