An Administrator is adding a log source in IBM Security QRadar SIEM V7.2.8.
What required software application that supports the log source should be used for this procedure?
A. QRadarQFlow Collector
B. QRadar Event Collector
C. Device Support Module (DSM)
D. IBM X-Force Exchange plug-in for QRadar
What are three protocols that collect flow data from network devices, such as routers, and send this data to IBM Security QRadar SIEM V7.2.8?
A. NetFlow, J-Flow and sFlow
B. NetFlow, IPFIX and syslog
C. NetFlow, rsyslog and sFlow
D. NetFlow, Packeteer and syslog
How can an IBM Security QRadar SIEM V7.2.8 Administrator capture specific data to a reference set when QRadar receives the data from events or flow data?
A. Create or modify a report so the required data is exported to a Reference: Set.
B. On the Admin tab. create or modify the reference set to capture the required data.
C. On the Admin tab define a Custom Action to add the required data to a Reference: Set.
D. Create or modify a rule so the Rule Response will add the required data to a Reference: Set.
An Administrator of an IBM Security QRadar SIEM V7.2.8 deployment needs to exclude the mail servers
from a custom rule.
How would the Administrator complete this task?
A. Create a building block that includes the IP addresses of all mail servers, use that building block in the custom rule, to exclude those hosts.
B. Create several rules excluding each mail server. Place these rules with the custom rule in a master rule, making sure the custom rule is last in the sequence.
C. Create a custom rule. In the "Rule Response" section of the Rule Wizard, select the Trigger Scan option. Add the mail server IP Addresses to the table and select exclude.
D. Create the custom rule. Create a Custom Action from the Admin Tab, to exclude the mail servers IP Addresses. In the "Rule Response" section of the Rule Wizard, select the Execute Custom Action option, selecting the appropriate Custom Action.
An IBM Security QRadar SIEM V7.2.8 Administrator needs to retain authentication failure data to a specific
domain, for a longer period than the rest of the event data being collected.
How is this task completed?
A. The administrator will need to create a custom rule with the appropriate filters and retention period.
B. The administrator will need to create a new Event Retention Bucket with the appropriate filters and retention period.
C. The administrator will need to create a custom filter in the log activity tab with the appropriate parameters and retention period.
D. The administrator will need to create a custom report with the appropriate parameters and use the report format TAR (Tape archive).
An Administrator using IBM Security QRadar SIEM V7.2.8 is using the RegEx syntax below:
(\b\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}\b)
What type of information is it designed to extract?
A. An IP Address
B. GPS Coordinates
C. A Telephone Number
D. A simple integer no longer than 4 digits
An Administrator needs to create a new user role in the IBM Security QRadar SIEM V7.2.8 system. What steps need to be followed?
A. System Configuration tab -> Users and Roles -> Add New Role -> Add
B. Admin tab -> System Configuration -> User Management -> User Roles -> New
C. Admin tab -> System and Settings -> Users and Roles -> Role Management -> New
D. System Management tab -> System Configuration -> User Management -> User Roles -> New
When replacing a Console appliance in an IBM Security QRadar SIEM V7.2.8 deployment using a new IP address or host name, what must be the same on the two Console appliances?
A. The amount of storage must be the same.
B. The Basic and Upgrade license must be the same.
C. The software versions of both appliances must match.
D. The Network Configuration and Protocol must be the same.
An Administrator working with IBM Security QRadar SIEM V7.2.8 was tasked with adding a new Microsoft Azure log source.
What protocol is supported for this?
A. FTP
B. JDBC
C. Syslog
D. WinCollect
An Administrator working with IBM Security QRadar SIEM V7.2.8 only needs to remove a single host
(10.1.95.142)
from the reference set with the name "Asset Reconciliation IPv4 Whitelist" from the
command line interface.
Which command would accomplish this task?
A.
./RefereceSetUtil.sh purge Asset\ Reconciliation\ IPv4\ Whitelist 10.1.95.142
B.
./RefereceSetUtil.sh delete Asset\ Reconciliation\ IPv4\ Whitelist 10.1.95.142
C.
./RefereceSetData.sh purge Asset\ Reconciliation\ IPv4\ Whitelist 10.1.95.142
D.
./RefereceSetData.sh delete Asset\ Reconciliation\ IPv4\ Whitelist 10.1.95.142
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only IBM exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your C2150-624 exam preparations and IBM certification application, do not hesitate to visit our Vcedump.com to find your solutions here.