IBM C1000-018 IBM QRadar SIEM V7.3.2 Fundamental Analysis Online Training
IBM C1000-018 Online Training
The questions for C1000-018 were last updated at Nov 22,2024.
- Exam Code: C1000-018
- Exam Name: IBM QRadar SIEM V7.3.2 Fundamental Analysis
- Certification Provider: IBM
- Latest update: Nov 22,2024
What happens to a Closed Offense after the offense retention period which defaults to 30 days7
- A . It is automatically archived.
- B . It is hidden from view.
- C . It is deleted from the system.
- D . It is manually deleted by the administrator
What is required to create an anomaly rule?
- A . triggered events
- B . a grouped saved search
- C . triggered flows
- D . baseline anomalies
Which QRadar component stores Event data?
- A . App Host
- B . Event Collector
- C . Event Processor
- D . Flow Collector
Which QRadar timestamp specifies when the event was received from the log source?
- A . Collect time
- B . Start time
- C . Storage time
- D . Log Source time
Which use case type is appropriate for VPN log sources? (Choose two.)
- A . Advanced Persistent Threat (APT)
- B . Insider Threat
- C . Critical Data Protection
- D . Securing the Cloud
What is the intent of the magnitude of an offense?
- A . It measures the age of the event attached to the offense.
- B . It measures the age of the offense.
- C . It measures the importance of the offense.
- D . It measures the importance of the event attached to the offense.
To provide insight into why QRadar considers the event to be threatening, what does QRadar add to the Offense that users cannot edit or delete?
- A . Annotations
- B . Attack path
- C . Location
- D . Source IP
Which component in QRadar collects and creates flow information?
- A . sflow
- B . NetFIow
- C . Qflow
- D . J-Flow
How can an analyst search for all events that include the keyword ‘vims’?
- A . By going to the Network Activity tab and run a quick search with the ‘virus’ keyword.
- B . By going to the Log Activity tab and run a quick search with the ‘virus’ keyword.
- C . By going to the Offenses tab and run a quick search with the ‘virus’ keyword.
- D . By going to the Log Activity tab and run this AQL: select * from events where eventname like "virus’
An analyst has created a custom property from the events for searching for critical information. The analyst also needs to reduce the number of event logs and data volume that is searched when looking for the critical information to maintain the efficiency and performance of QRadar.
Which feature should the analyst use?
- A . Index Management
- B . Log Management
- C . Database Management
- D . Event Management