Sample Questions for Exam C1000-156 QRadar SIEM V7.5 Administrator Please note: These questions were developed at the same time and by the same QRadar SIEM V7.5 subject matter experts as the real exam questions. While these sample questions will give you a good idea of the nature of the questions on the real exam, this is not a thorough representation of the material covered by the real exam, so success with these sample questions should not be considered predictive of success on the real exam. For a realistic idea of your readiness for the real certification exam, we suggest you take the full-length Assessment Test available from Pearson VUE. Section 1: System Configuration Administer managed hosts An administrator needs to decommission an App Host. What is the proper order of events to ensure a successful removal? A. B. C. D. Migrate applications to the Console. Shut down the App Host. Ensure that all applications are working on the Console. Remove the App Host. A QRadar administrator wants to add a managed host to increase flow inspection. Which managed host does the administrator add to the deployment? A. B. C. D. QRadar Risk Manager QRadar Network Insights QRadar Incident Forensics QRadar Vulnerability Manager Processor Understand distributed architecture In addition to data collection and data processing, what is the third architectural design layer of the QRadar Security Intelligence Platform? A. B. C. D. Data nodes Data forensics Data searches Data aggregation In a QRadar distributed deployment, which product is used to retrace the step-by-step actions of a potential attacker, and conduct an indepth investigation of suspected malicious network security incidents? A. B. C. D. QRadar Risk Manager QRadar Network Insights QRadar Incident Forensics QRadar Vulnerability Manager Manage configuration and data backups Which is a valid statement about the default QRadar backup and recovery process? A. A backup priority of medium or high has little to no impact on system performance. B. If the backup process exceeds the configured time limit, the backup is stored as incomplete. C. Automatic backups run at midnight and include the configuration information, data, or both, archived in the previous 24 hours. D. The script automatically creates a daily archive capturing only event and flow data at 3:00 AM, which must be restored on the QRadar Console. Configure custom SNMP and email templates Where are the email templates stored in QRadar? A. B. C. D. Ariel database PSQL database reference map of sets XML file on the file system Manage network hierarchy In a single domain QRadar deployment, which IP addresses are considered remote? A. B. C. D. Any public IP address Any private IP address Any IP address that is not defined in the network hierarchy Any IP address that is defined in the network hierarchy as remote Use and manage reference data What is the default time period QRadar uses to periodically remove expired elements from the reference set? A. B. C. D. Every 1 minute Every 5 minutes Every 60 minutes Every 1440 minutes Manage automatic update What does this QRadar command verify? /opt/qradar/bin/UpdateConfs.pl -testConnect 1 0 A. B. C. D. License key GUI https SSL certificate Connection to the auto update server Enablement status of SSL inspection Demonstrate the use of the asset database QRadar receives an event. How does the asset profiler examine the event payload for identity information? A. If the only available identity information is an IP address, the system reconciles the update to the existing asset that has the same IP address. B. If the identity information matches an existing asset in the database, then a new asset is created based on the information in the event payload. C. If the identity information includes a port number, a NetBIOS hostname, or a DNS hostname that is already associated with an asset in the asset database, that asset is merged with previous entry. D. If an asset update has an IP address that matches an existing asset, but the other identity information does not match, the system uses other information to rule out a false-positive match before a new asset is created. Section 2: Performance Optimization Construct identity exclusions When does an edited identity exclusion search start excluding new values? A. B. C. D. Immediately After 5 minutes After 24 hours After a soft clean of the asset database Deal with resource restrictions You are the QRadar administrator for a large Managed Security Service Provider (MSSP). Many MSSP clients have limited access to your deployment and can run searches that might occasionally cause system performance degradation. Which type of resource restriction would limit the searching capabilities of one client? A. B. C. D. Group-based restrictions Tenant-based restrictions Service-based restrictions Resource-based restrictions Configuring, tuning and understanding rules An administrator wants to exclude many IP addresses that use the CIDR format (for example, 192.168.10.0/24) from a set of multiple rules. The administrator needs to be able to easily edit the rule exclusion to add or remove more IP addresses in the future. Which option can be used to accomplish this requirement? A. Enter all the IP addresses into a reference set and exclude the reference set from the rule itself. B. Use a filter rule test and exclude all the IP addresses by using "source IP" and "equals any of" filtering. C. Create an offense rule that includes additional rule tests that help in IP exclusion, which are found only in an offense-based rule. D. Enter all the IP addresses into a building block that uses a source IP rule test, and exclude that building block from the rule itself. Which option creates an OR condition in the Custom Rules Engine? A. When a property equals a property B. When an event matches any of the following rules C. When any event properties are contained in their reference set(s) D. When the false positive signature matches one of the following signatures Index management An administrator performs a routine review of index properties. When opening the Index Management interface, the administrator notices that a certain property has a value of 70% under the "% of Searches Using Property" column, but the property is not indexed. Which action does the administrator take in this situation? A. Enable the index to improve performance. B. Create more rules that use that property to improve property utilization. C. Create more saved searches using the property to improve property utilization. D. Monitor the property further to check for abrupt changes in the "Data Written" column. Search management Which two (2) options can be selected as a Timespan options when you save a search? A. B. C. D. E. Default GV interval Since last deploy Specific interval Real time (streaming) What is prerequisite for a custom property-based offense search? A. The search must be saved before use. B. The search must run with administrator privileges. C. The custom property must be used as a rule index. D. The custom property must be created by the user who performs the search. Manage routing rules and event forwarding Which routing mode ensures that no data is lost? A. B. C. D. Drop Online Offline Log Only Section 3: Data Source Configuration Manage flow sources What type of source is a flow source that connects over a SPAN or TAP? A. B. C. D. Internal flow source External flow source Asymmetrical flow source Omnidirectional flow source Vulnerability information source configuration Which three (3) items are preconfigured scan policies distributed with QRadar Vulnerability Manager? A. B. C. D. E. F. PCI scan Risk scan Asset scan Patch scan Database scan Vulnerability scan Manage custom event and flow properties Which option does the administrator need to select in the Custom Event Properties window to parse and store the custom event property? A. B. C. D. Optimize parsing for rules, flows, and searches Optimize parsing for rules, reports, and events Optimize parsing for rules, reports, and searches Optimize parsing for rules, scanners, and searches Manage custom log source types Which two fields are used by QRadar to map an event to a QID? A. B. C. D. Event ID and Event Name Event Category and Event ID Event Category and High-level Category High-level Category and Low-level Category What column in Log Activity Preview of the DSM Editor indicates that event properties successfully parsed and mapped to a QID record? A. B. C. D. Status Overlook Parsing Status Parsing Success Status Section 4: Accuracy Tuning Understand and implement ADE rules Which type of rule tests event and flow traffic for changes in shortterm events compared against a longer timeframe? A. B. C. D. Anomaly rules Threshold rules Behavioral rules Current trend rules Manage and use building blocks Which framework can be visualized from the Use Case Manager application? A. B. C. D. NIST 800-53 MITRE ATT&CK Lockheed Martin Cyber Kill Chain Diamond Model of Intrusion Analysis Manage content packs A QRadar administrator recently installed a QRadar content pack that comes shipped with a custom Pulse dashboard. What does the administrator do to make the new dashboard available in the Pulse application? A. Use the Synchronize function of the Pulse app in the Admin tab B. Use the interactive API to add the dashboard to the list of available dashboards C. Run the console script SynchronizePulseDashboards.sh after every content pack installation D. After the administrator installs the content pack, the new dashboard automatically becomes available Distinguish native information sources What can Remote to Remote (R2R) events indicate? A. B. C. D. Possible reference data misconfiguration Possible remote networks misconfiguration Possible building blocks misconfiguration Possible network hierarchy misconfiguration Configure integrations What must you enable before you can use the enhanced content that is installed with the IBM QRadar Security Threat Monitoring Content Extension? A. B. C. D. The MaxMind account IBM Security GPG13 Content The X-Force Threat Intelligence feed The IBM X-Force Exchange plug-in for QRadar Section 5: User Management Manage users Which data that is assigned to a user is maintained by QRadar after you delete the user's account? A. B. C. D. Saved searches The security profile The inactivity timeout The username and password Create and update security profiles An admin needs to delete a security profile. What activity must the admin first ensure is completed? A. The admin user can delete any security profile. B. The users assigned to that security profile must first be reassigned. C. The users and log sources that belong to the profile must first be reassigned. D. The security profile must first be removed from the domain and all log sources and users must belong to alternate profiles. Create and update user roles A QRadar Administrator needs to define a new user role with access to only see events in QRadar. Which permissions should be granted to the role? A. B. C. D. Events Networks Log Activity Network Activity Manage user authentication and authorization A QRadar Administrator needs to configure LDAP authentication with TLS in QRadar. What is the name of the folder where the TLS certificate of the LDAP server should be imported? A. B. C. D. valid_certificates known_certificates signed_certificates trusted_certificates Section 6: Reporting, Searching, and Offense Management Manage reports What is the default distribution channel in QRadar that sends the generated report to the Reports Tab? A. B. C. D. Email Report Console Included link to the Report Console Included report as an attachment to the Dashboard What option in QRadar allows you to run a weekly report before the full week has elapsed since you created the report? A. B. C. D. Run Report Toggle Scheduling Run Report on Raw Data Run Report on Accumulated Data Utilize different search types The option to include the data from your saved search on the Dashboard tab is not available when you save the search. How can you make that option available when saving the search? A. B. C. D. Set it as the default Share it with Everyone Include in my Quick Searches Ensure that the search is grouped How can you convert a saved search to an AQL string and modify it to create your own searches in order to quickly find the data you want? A. Select a previously saved search and click Show AQL > Save as JSON B. Select a previously saved search and click Show AQL > Copy to Clipboard C. Select a previously saved search and click Export to AQL > Save as JSON D. Select a previously saved search and click Export to AQL > Copy to Clipboard Manage offenses Which parameters can you use as a base for offense indexing? A. B. C. D. Any event property Indexed customer properties Only predefined normalized properties Only Username, Destination IP, and Source IP What feature influences the offense chaining? A. B. C. D. Severity Indexing Magnitude Source or Destination IP Sharing content among users A QRadar administrator creates a new saved search in QRadar. Which option does the administrator enable to show the data from the search on the Dashboard tab? A. B. C. D. Set as Default Share with Everyone Include in My Dashboard Include in My Quick Searches A QRadar administrator creates a new saved search in QRadar and does not assign it to any search group. To which group is the saved search assigned by default? A. B. C. D. Other group User Reports group Admin Reports group Usage Monitoring group Section 7: Tenants and Domains Differentiate network hierarchy and domain definition What must you do to an interface before it will appear in the Domain configuration window? A. B. C. D. Associate the interface with a tenant Configure the interface as a flow source Add the interface to a domain reference set Associate the interface with a security profile Allocate licenses for multi-tenant An administrator needs to view the events per second (EPS) rate for an individual domain. Which Ariel Query Language (AQL) query provides the information? A. select domain, DOMAINNAME(domain) from events GROUP BY domain last 1 HOURS B. select domainid, DOMAINNAME(domainid) from events GROUP BY domainid last 1 HOURS C. select DOMAINNAME(domain) as LogDomain, sum(eventcount) / 24*60*60 as EPS from events where domain=checkpoint group by domain order by EPS desc last 24 hours D. select DOMAINNAME(domainid) as LogDomain, sum(eventcount) / 24*60*60 as EPS from events where domainid=1 group by domainid order by EPS desc last 24 hours Assign users to tenants Which permission option allows the user to view only events and flows that are associated with both the log sources and networks that are specified in this security profile? A. B. C. D. Network Only Log Sources Only Networks OR Log Sources Networks AND Log Sources Section 8: Troubleshooting Review and respond to system notifications An administrator is reviewing the system notifications and discovers this error: MPC: Unable to create new offense. The maximum number of active offenses has been reached. What is the default number of active offenses that can be open on a system? A. B. C. D. 2500 3000 5000 10,000 Troubleshoot common documented issues You want to perform an upgrade and are getting fully prepared prior to installation. Which program assists with running health checks before major events to determine whether there are any issues that need to be addressed? A. B. C. D. DrQ get_logs health_check Validate_Deployment You set up a new source that uses syslog to send events to an event collector (EC). You note that no data is collected from this source, but other syslog sources configured the same way work fine. Which tool can you use to troubleshoot whether the syslog data has reached the EC? A. B. C. D. ssh netstat tcpdump nslookup You notice some intermittent issues in viewing offenses. Cleaning the SIM data model ensures that offenses are based on the most current rules, discovered servers, and network hierarchy. Which method closes all offenses, but does not remove them from the system? A. B. C. D. Soft clean Hard clean Retention clean Persistent clean Configure, manage and troubleshoot applications IBM QRadar Deployment Intelligence needs what level SEC token to access REST API endpoints and for Ariel searches? A. B. C. D. User level root level Admin level Asset level Perform healthchecks What is the QRadar default setting for backups? A. B. C. D. Data backups only No nightly backups Configuration backups only Configuration and data backups QRadar administrators can use a tool to identify a reported issue that is associated to an APAR and work with IBM QRadar Support on a resolution or workaround. Which command allows administrators to review the logs for reported issues in QRadar? A. B. C. D. /opt/qradar/support/recon /opt/qradar/support/cliniq /opt/qradar/support/qappmanager /opt/qradar/support/defect-inspector Answer key 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. 1=A,2=C,3=D,4=B B C C C D C B C A A B D B A D,E C C A A,D,E C B C A B 26. 27. 28. 29. 30. 31. 32. 33. 34. 35. 36. 37. 38. 39. 40. 41. 42. 43. 44. 45. 46. 47. 48. 49. 50. A D C A B C D B C D B A B C A B D D A A C A C C D