When creating an identity exclusion search, what time range do you select?
When creating an identity exclusion search, what time range do you select?A . Previous 7 daysB . Real time (streaming)C . Previous 30 daysD . Previous 5 minutesView AnswerAnswer: B Explanation: When creating an identity exclusion search in IBM QRadar SIEM V7.5, the time range selected is "Real time (streaming)."...
What is the default value of the maximum number?
In the QRadar GUI. you notice that no new offenses were generated today. A review of the notifications shows: MPC: Unable to create new offense. The maximum number of active offenses has been reached. What is the default value of the maximum number?A . 3500B . 1500C . 5000D ....
What is the primary method used by QRadar to alert users to problems?
What is the primary method used by QRadar to alert users to problems?A . System NotificationsB . System SummaryC . Use Case ManagerD . QRadar AssistantView AnswerAnswer: A Explanation: The primary method used by IBM QRadar SIEM V7.5 to alert users to problems is through System Notifications. Here’s how it...
What Iwo things are required for an administrator to deobfuscate data in QRadar?
What Iwo things are required for an administrator to deobfuscate data in QRadar?A . Public key and the password for the key that is used to obfuscate dataB . Private key and the password for the key that is used to obfuscate dataC . Private key and public key that...
Which command does the administrator use?
A QRadar administrator needs to quickly check the disk space for all managed hosts. Which command does the administrator use?A . /opt/qradar/support/all_servers.sh 'Is -ltrsh"B . /opt/qradar/support/all_servers.sh "rra -rf /store'C . /opt/qradar/support/all_servers.sh -C -k 'df -Th'D . /opt/qradar/support/all_servers.sh -C -K 'watch Is'View AnswerAnswer: C Explanation: To quickly check the disk space...
Which two (2) open standards does the QRadar Threat Intelligence app use for feeds?
Which two (2) open standards does the QRadar Threat Intelligence app use for feeds?A . TAXIIB . AQLC . STIXD . JSONE . OSINTView AnswerAnswer: A, C Explanation: The QRadar Threat Intelligence app uses open standards to integrate and utilize threat intelligence feeds effectively. The two key standards used are:...
What is the default day and time setting for when QRadar generates weekly reports?
What is the default day and time setting for when QRadar generates weekly reports?A . Sunday 01:00 AMB . Monday 02:00 AMC . Sunday 02:00 AMD . Monday 01:00 AMView AnswerAnswer: A Explanation: In IBM QRadar SIEM V7.5, the default setting for generating weekly reports is configured to occur on:...
Which profile database does the Server Discovery function use to discover several types of servers on a network?
Which profile database does the Server Discovery function use to discover several types of servers on a network?A . Flow profile databaseB . Network profile databaseC . Domain profile databaseD . Asset profile databaseView AnswerAnswer: D Explanation: The Server Discovery function in IBM QRadar SIEM V7.5 uses the Asset Profile...
From which two (2) resources can an administrator download QRadar security content?
From which two (2) resources can an administrator download QRadar security content?A . QRadar Application RepositoryB . IBM Applications DatabaseC . IBM Fix CentralD . IBM App CentralE . IBM Security App ExchangeView AnswerAnswer: A, E Explanation: Administrators can download QRadar security content from the following two resources: QRadar Application...
Which event advanced search query will check an IP address against the Spam X-Force category with a confidence greater than 3?
Which event advanced search query will check an IP address against the Spam X-Force category with a confidence greater than 3?A . select * from events where XFORCE_IP_CONFIDENCE( 'Spam', sourceip>>3B . select * from flows where XFORCE_IP_CONFIDENCE{'Spam', sourceip)<3C . select * from flows where XF0RCE_iP_C0NFiDEKCE{*Malware',sourceip)-3D . select * from events...