An analyst is encountering a large number of false positive results. Legitimate internal network traffic contains valid flows and events which are making it difficult to identify true security incidents.
What can the analyst do to reduce these false positive indicators?
A. Create X-Force rules to detect false positive events.
B. Create an anomaly rule to detect false positives and suppress the event.
C. Filter the network traffic to receive only security related events.
D. Modify rules and/or Building Block to suppress false positive activity.
What is the maximum time period for 3 subsequent events to be coalesced?
A. 10 minutes
B. 10 seconds
C. 5 minutes
D. 60 seconds
An analyst needs to create a new custom dashboard to view dashboard items that meet a particular requirement.
What are the main steps in the process?
A. Select New Dashboard and enter unique name, description, add items and save.
B. Select New Dashboard and copy name, add description, items and save.
C. Request the administrator to create the custom dashboard with required items.
D. Locate existing dashboard and modify to include indexed items required and save.
An analyst noticed that from a particular subnet (203.0.113.0/24), all IP addresses are simultaneously
trying to reach out to the company's publicly hosted FTP server.
The analyst also noticed that this activity has resulted in a Type B Superflow on the Network Activity tab.
Under which category, should the analyst report this issue to the security administrator?
A. Syn Flood
B. Port Scan
C. Network Scan
D. DDoS
An analyst needs to investigate an Offense and navigates to the attached rule(s).
Where in the rule details would the analyst investigate the reason for why the rule was triggered?
A. Rule response limiter
B. List of test conditions
C. Rule actions
D. Rule responses
An analyst has to perform an export of events within a timeframe, but not all the columns are present in the log view for the time period the analyst has selected. The analyst only needs specific columns exported for an external analysis.
How can the analyst accomplish this task?
A. Edit the search and select the extra columns, then export the result with Action/Export to XML/Full Export. This export is only supported in XML.
B. Edit the search and select the extra columns, then export the result with Action/Export to XML/Visible Columns. This export is only supported in XML.
C. Edit the search result and select the extra columns, then export the result with Action/Export to CSV/ Full Export.
D. Edit the search result and select the extra columns, then export the result with Action/Export to CSV/ Visible Columns.
An analyst aims to improve the detection capabilities on all the Offense rules. QRadar SIEM has a tool that allows the analyst to update all the Building Blocks related to Host and Port Definition in a single page.
How is this accomplished?
A. Admin –andgt; Reference Set management
B. Assets –andgt; Asset Profiles
C. Assets –andgt; Server Discovery
D. Admin –andgt; Asset Profile Configuration
An analyst has observed that for a particular user, authentication to an organization's critical server is different than the normal access pattern.
How can the analyst verify that all the authentications initiated from the user are valid?
A. Perform a search with filter Destination IP group by Username, then validate the Username
B. Perform a search with filter Source IP group by Username, then validate the Username
C. Perform a search with filter Username group by Source IP, then validate the Destination IP
D. Perform a search with filter Username group by Source IP, then validate the Source IP
How does an analyst view the base64 encoded string of an event's raw payload that contains unprintable characters?
A. Copy the raw payload and use an external tool to view base64 data
B. Right click on the event –andgt; view base64 data
C. Log Activity –andgt; Under Payload Information, click base64 tab
D. Admin –andgt; Under Payload Information, click base64 tab
What is a valid offense naming mechanism? This information should:
A. set the naming of the associated offense(s).
B. set or replace the naming of the associated offense(s).
C. replace the naming of the associated offense(s).
D. be included in the naming of the associated offense(s).