Download IBM Security QRadar SIEM V7.2.8 Fundamental Administration.C2150-624.PracticeTest.2018-07-30.34q.vcex

Vendor: IBM
Exam Code: C2150-624
Exam Name: IBM Security QRadar SIEM V7.2.8 Fundamental Administration
Date: Jul 30, 2018
File Size: 286 KB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Demo Questions

Question 1
When it comes to licensing, what is the difference between Events and Flows and how they are licensed?
  1. Flows are licensed based on overall count over a minute, where Events are licensed based on overall count per second.
  2. Flows are licensed based on overall count per second, where Events are licensed based on overall count over a minute.
  3. Flows and Events are both licensed by overall count per minute under an Upgraded License and per second on a Basic License.
  4. Flows and Events are both licensed by overall count per second under an Upgraded License and per second on a Basic License.
Correct answer: A
Explanation:
A significant difference between event and flow data is that an event, which typically is a log of a specific action such as a user login, or a VPN connection, occurs at a specific time and the event is logged at that time. A flow is a record of network activity that can last for seconds, minutes, hours, or days, depending on the activity within the session. For example, a web request might download multiple files such as images, ads, video, and last for 5 to 10 seconds, or a user who watches a Netflix movie might be in a network session that lasts up to a few hours. The flow is a record of network activity between two hosts. Reference https://www.ibm.com/support/knowledgecenter/en/SS42VS_7.2.8/com.ibm.qradar.doc/c_qradar_deploy_event_and_flow_pipeline.html
A significant difference between event and flow data is that an event, which typically is a log of a specific action such as a user login, or a VPN connection, occurs at a specific time and the event is logged at that time. A flow is a record of network activity that can last for seconds, minutes, hours, or days, depending on the activity within the session. For example, a web request might download multiple files such as images, ads, video, and last for 5 to 10 seconds, or a user who watches a Netflix movie might be in a network session that lasts up to a few hours. The flow is a record of network activity between two hosts. 
Reference https://www.ibm.com/support/knowledgecenter/en/SS42VS_7.2.8/com.ibm.qradar.doc/c_qradar_deploy_event_and_flow_pipeline.html
Question 2
When an IBM Security QRadar SIEM V7.2.8 distributed deployment requires scaling horizontally to achieve Event per Second (EPS) requirements, what QRadar Component needs to be added to meet the EPS demands?
  1. Event Manager
  2. Event Indexing
  3. Event Collector
  4. Event Processor
Correct answer: D
Explanation:
The QRadar SIEM Event Processor Virtual 1699 appliance supports the following items:Up to 10,000 events per second 2 TB or larger dedicated event storage Reference https://www.ibm.com/support/knowledgecenter/SS42VS_7.2.4/com.ibm.qradar.doc_7.2.4/c_siem_vrt_ap_ov.html
The QRadar SIEM Event Processor Virtual 1699 appliance supports the following items:
  • Up to 10,000 events per second 
  • 2 TB or larger dedicated event storage 
Reference https://www.ibm.com/support/knowledgecenter/SS42VS_7.2.4/com.ibm.qradar.doc_7.2.4/c_siem_vrt_ap_ov.html
Question 3
The event data collected by IBM Security QRadar SIEM V7.2.8 is being deleted after one month. The legal department required the data be kept for two months. 
What can the administrator do to accommodate this requirement?
  1. Change the nightly backup Priority to “High”.
  2. Change the nightly backup to a monthly backup.
  3. Change the Default Event Retention Policy property field “Do not delete data in this bucket” to two months.
  4. Change the Default Event Retention Policy property field “Keep data placed in this bucket for” to two months.
Correct answer: C
Explanation:
When storage space is required - Select this option if you want events or flows that match the Keep data placed in this bucket for parameter to remain in storage until the disk monitoring system detects that storage is required. If used disk space reaches 85% for records and 83% for payloads, data will be deleted. Deletion continues until the used disk space reaches 82% for records and 81% for payloads. When storage is required, only events or flows that match the Keep data placed in this bucket for parameter are deleted. Reference https://www.ibm.com/developerworks/community/forums/atom/download/Event_Flow_Retention_QRadar_72_AdminGuide.pdf?nodeId=593f2b31-a858-4210-b380-4674894a6ad9
When storage space is required - Select this option if you want events or flows that match the Keep data placed in this bucket for parameter to remain in storage until the disk monitoring system detects that storage is required. If used disk space reaches 85% for records and 83% for payloads, data will be deleted. Deletion continues until the used disk space reaches 82% for records and 81% for payloads. 
When storage is required, only events or flows that match the Keep data placed in this bucket for parameter are deleted. 
Reference https://www.ibm.com/developerworks/community/forums/atom/download/Event_Flow_Retention_QRadar_72_AdminGuide.pdf?nodeId=593f2b31-a858-4210-b380-4674894a6ad9
Question 4
Which is an officially supported operating system for IBM Security QRadar SIEM V7.2.8 installations on customer supplied hardware?
  1. Ubuntu Linux
  2. Windows 2012
  3. Fedora Linux
  4. Red Hat Enterprise Linux
Correct answer: D
Explanation:
The IBM Security QRadar Application Framework SDK can be installed on Windows, Linux, or OSX operating system. Reference ftp://ftp.software.ibm.com/software/security/products/qradar/documents/7.2.8/en/b_qradar_appframework_devguide.pdf
The IBM Security QRadar Application Framework SDK can be installed on Windows, Linux, or OSX operating system. 
Reference ftp://ftp.software.ibm.com/software/security/products/qradar/documents/7.2.8/en/b_qradar_appframework_devguide.pdf
Question 5
An Administrator working with IBM Security QRadar SIEM V7.2.8 needs to assign a report to a group named Network Management. 
What is the process for this task to be completed?
  1. Reports Tab -> Select report -> Actions -> Assign Groups -> Item Groups -> select Network Management -> Assign Groups
  2. Admin Tab -> Report Permissions -> select report -> Actions -> Assign Groups -> select Network Management -> Assign
  3. Reports Tab -> Select report -> Actions -> Assign Users -> User Groups -> select Network Management -> Assign Users
  4. Admin Tab -> Report Permissions -> select report -> Actions -> Assign Users -> select Network Management -> Assign
Correct answer: A
Explanation:
You can use the Assign Groups option to assign a report to another group Click the Reports tab. Select the report that you want to assign to a group. From the Actions list box, select Assign Groups. From the Item Groups list, select the check box of the group you want to assign to this report. 5. Click Assign Groups Reference ftp://ftp.software.ibm.com/software/security/products/qradar/documents/7.2.8/en/b_qradar_users_guide.pdf
You can use the Assign Groups option to assign a report to another group 
  1. Click the Reports tab. 
  2. Select the report that you want to assign to a group. 
  3. From the Actions list box, select Assign Groups. 
  4. From the Item Groups list, select the check box of the group you want to assign to this report. 5. Click Assign Groups 
Reference ftp://ftp.software.ibm.com/software/security/products/qradar/documents/7.2.8/en/b_qradar_users_guide.pdf
Question 6
The Administrator of an IBM Security QRadar SIEM V7.2.8 deployment needs to determine which rules are most active in generating offenses. 
How would the Administrator accomplish this from the Offenses tab of the QRadar console?
  1. Rules -> Group -> “Most Active Offenses”.
  2. Rules -> Rules -> Offense Count to reorder the column in descending order.
  3. All Offenses -> All Offenses -> Offense Count to reorder the column in descending order.
  4. All Offenses -> All Offenses -> Events to reorder the column in descending order. Use the Actions menu to view the rule information for a specific offence.
Correct answer: B
Explanation:
Click the Offenses tab. On the navigation menu, click Rules. To determine which rules are most active in generating offenses, from the rules page, click Offense Count to reorder the column in descending order. Double-click any rule to display the Rule Wizard. You can configure a response to each rule. Reference ftp://ftp.software.ibm.com/software/security/products/qradar/documents/7.2.8/en/b_qradar_tuning_guide.pdf
  1. Click the Offenses tab. 
  2. On the navigation menu, click Rules. To determine which rules are most active in generating offenses, from the rules page, click Offense Count to reorder the column in descending order. 
  3. Double-click any rule to display the Rule Wizard. You can configure a response to each rule. 
Reference ftp://ftp.software.ibm.com/software/security/products/qradar/documents/7.2.8/en/b_qradar_tuning_guide.pdf
Question 7
An IBM Security QRadar SIEM V7.2.8 Administrator needs to download a nightly configuration backup file from a past day through the Web Console. 
Which steps must be followed to achieve this?
  1. Admin Tab -> System Configuration -> Backup and Recovery -> Generate new backup -> Save
  2. Admin Tab -> System Configuration -> Backup and Recovery -> Choose the name of an Existing backup
  3. Admin Tab -> System Configuration -> Backup and Recovery -> Import New Backup -> Select file extension -> Save
  4. Admin Tab -> System Configuration -> System Settings -> Database Settings -> Choose the name of an Existing backup
Correct answer: B
Explanation:
The backups are listed in Backup and recovery section of the system configuration in the admin tab. You can click on the existing backup and it will show you the options to download it. Reference ftp://ftp.software.ibm.com/software/security/products/qradar/documents/7.2.8/en/b_qradar_admin_guide.pdf
The backups are listed in Backup and recovery section of the system configuration in the admin tab. You can click on the existing backup and it will show you the options to download it. 
Reference ftp://ftp.software.ibm.com/software/security/products/qradar/documents/7.2.8/en/b_qradar_admin_guide.pdf
Question 8
Which permission can be assigned to a user from User Roles in the IBM Security QRadar SIEM V7.2.8 Console?
  1. Admin
  2. DSM Updates
  3. Flow Activity
  4. Configuration Management
Correct answer: A
Explanation:
Grants administrative access to the user interface. You can grant specific Admin permissions. Users with System Administrator permission can access all areas of the user interface. Users who have this access cannot edit other administrator accounts. Reference ftp://ftp.software.ibm.com/software/security/products/qradar/documents/7.2.8/en/b_qradar_admin_guide.pdf
Grants administrative access to the user interface. You can grant specific Admin permissions. Users with System Administrator permission can access all areas of the user interface. Users who have this access cannot edit other administrator accounts. 
Reference ftp://ftp.software.ibm.com/software/security/products/qradar/documents/7.2.8/en/b_qradar_admin_guide.pdf
Question 9
An Administrator working with IBM Security QRadar SIEM V7.2.8 needs to copy data and configuration backup files from the previous day to an off-site location. 
What is the default location where these files can be found?
  1. /store/backup
  2. /store/exports
  3. /store/postgres
  4. /store/backupHost
Correct answer: A
Explanation:
The default location is /store/backup. This path must exist before the backup process is initiated. If this path does not exist, the backup process aborts. If you modify this path, make sure the new path is valid on every system in your deployment. Reference ftp://ftp.software.ibm.com/software/security/products/qradar/documents/7.2.8/en/b_qradar_admin_guide.pdf
The default location is /store/backup. This path must exist before the backup process is initiated. If this path does not exist, the backup process aborts. If you modify this path, make sure the new path is valid on every system in your deployment. 
Reference ftp://ftp.software.ibm.com/software/security/products/qradar/documents/7.2.8/en/b_qradar_admin_guide.pdf
Question 10
How many dashboards come by default in IBM Security QRadar SIEM V7.2.8?
  1. 1
  2. 5
  3. 7
  4. 10
Correct answer: B
Explanation:
There are five default dashboards:application overview compliance overview network overview system monitoring threat and security monitoring Reference ftp://ftp.software.ibm.com/software/security/products/qradar/documents/7.2.8/en/b_qradar_users_guide.pdf
There are five default dashboards:
  1. application overview 
  2. compliance overview 
  3. network overview 
  4. system monitoring 
  5. threat and security monitoring 
Reference ftp://ftp.software.ibm.com/software/security/products/qradar/documents/7.2.8/en/b_qradar_users_guide.pdf
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!