Pass4itsure > IBM > IBM Certified Deployment Professional > C2150-400 > C2150-400 Online Practice Questions and Answers

C2150-400 Online Practice Questions and Answers

Questions 4

What does QRadar use to group the event or flow according to the network?

A. Network mapping

B. Network hierarchy

C. Application mapping

D. Application hierarchy

Buy Now
Questions 5

Which attribute is valid when defining the user roles to provide the necessary access?

A. Reports: Maintain Templates

B. Network Activity: View Custom Rules

C. Network Activity: Manage Times Series

D. Log Activity: User Defined Event Properties

Buy Now
Questions 6

What is required to allow authentication to work properly when using a vendor authentication module like Active Directory?

A. Authentication Bind password

B. An SSH tunnel between QRadar and the authentication server

C. QRadar and the authentication server must be on the same subnet

D. Time Synchronization between QRadar and the authentication server

Buy Now
Questions 7

An off-site source can be connected to which component?

A. QFlow

B. Event Collector

C. Flow Processor

D. Event Processor

Buy Now
Questions 8

Which three user-defined parameters contributes to the calculation of the Common Vulnerability Scoring System (CVSS) score on QRadar Assets tab? (Choose three.)

A. Severity Requirement

B. Security Requirement

C. Capacity Requirement

D. Availability Requirement

E. Confidentiality Requirement

F. Collateral Damage Potential

Buy Now
Questions 9

Assuming a Squid Proxy has logs in the following format:

time elapsed remotehost code/status bytes method URL rfc931 peerstatus/peerhost type And these are some sample logs from Squid server:

1286536310.075 452 192.168.0.227 TCP_MISS/200 5067 GET http://www.test.com/vi/VfnuY/default.jpgDIRECT/10.20.153.118 image/jpeg 1286536310.524 935 192.168.0.68 TCP_MISS/200 1021 POST http://www.test.com/services DIRECT/172.16.41.128 application/xml 1286536310.550 495 192.168.0.227 TCP_MISS/204 406 GET http://test.com/get_video? DIRECT/10.12.231.1.136 text/html 1153239176.287 632 172.16.10.92 TCP_IMS_HIT/304 215 GET http:// www.test.com/index.html - NONE/-text/html

Which regular expression would you use to pull out the bytes field into custom property?

A. \w+/\d+\s+(\d+)\s+(POST|GET)

B. \w+/\d+\S+(\d+)\S+(POST|GET)

C. \w+/\d+\s+(\d+)\s+^(POST|GET)

D. \W+/\D+\D+(\D+)\D+(POST|GET)

Buy Now
Questions 10

Which scanners report vulnerabilities on all ports? (Choose two.)

A. Axis

B. NMap

C. Qualys

D. tcpdump

E. nCircle IP360

Buy Now
Questions 11

Which operating system is supported for creating a bootable flash drive for recovery?

A. Cisco IOS

B. Sun Solaris

C. Debian Linux

D. MS Windows Vista

Buy Now
Questions 12

Which icon on the Admin tab do you select when setting up QRadar to use an external authentication method?

A. Users

B. Authentication

C. System Settings

D. Authorized Services

Buy Now
Questions 13

A customer is observing the Asset tab on the QRadar console and is getting duplicate assets in the console.

What is the reason for this asset duplication?

A. There are multiple heterogeneous assets present in environment.

B. There are multiple assets having same configuration details present in environment.

C. QRadar creates duplicate assets after a specific periodic interval without considering asset activity or inactivity.

D. Asset doesn't appear in network for specific time period; when it came back QRadar detects it and

created a new asset for the same.

Buy Now
Exam Code: C2150-400
Exam Name: IBM Security Qradar SIEM Implementation v 7.2.1
Last Update: Dec 29, 2024
Questions: 175
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$49.99

VCE

$55.99

PDF + VCE

$65.99