IBM C1000-018 Exam Practice Questions (P. 3)
- Full Access (60 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #11
An analyst needs to create a new custom dashboard to view dashboard items that meet a particular requirement.
What are the main steps in the process?
What are the main steps in the process?
- ASelect New Dashboard and enter unique name, description, add items and save.
- BSelect New Dashboard and copy name, add description, items and save.
- CRequest the administrator to create the custom dashboard with required items.
- DLocate existing dashboard and modify to include indexed items required and save.
Correct Answer:
C
C
send
light_mode
delete
Question #12
What event information within an offense would provide the analyst with a deep insight as to how it was created?
send
light_mode
delete
Question #13
How can analyst verify if any host in the deployment is vulnerable to CVE ID: CVE-2010-000?
- AUse the asset search feature, select vulnerability external reference from the list of search parameters, select CVE and then type: 2010-000
- BUse the asset search feature, select vulnerability external reference from the list of search parameters, select CVE and then type: $CVE-2010000
- CUse the asset search feature, select vulnerability external reference from the list of search parameters, select CVE and then type: $2010-000
- DUse the asset search feature, select vulnerability external reference from the list of search parameters, select CVE and then type: CVE-2010000
Correct Answer:
A
A
send
light_mode
delete
Question #14
An analyst investigates an Offense that will need more research to outline what has occurred. The analyst marks a ‘Follow up’ flag on the Offense.
What happens to the Offense after it is tagged with a ‘Follow up’ flag?
What happens to the Offense after it is tagged with a ‘Follow up’ flag?
- AOnly the analyst issuing the follow up flag can now close the Offense.
- BNew events or flows will not be applied to the Offense.
- CA flag icon is displayed for the Offense in the Offense view.
- DOther analysts in QRadar get an email to look at the Offense.
Correct Answer:
C
C
send
light_mode
delete
Question #15
An analyst noticed that from a particular subnet (203.0.113.0/24), all IP addresses are simultaneously trying to reach out to the company’s publicly hosted FTP server.
The analyst also noticed that this activity has resulted in a Type B Superflow on the Network Activity tab.
Under which category, should the analyst report this issue to the security administrator?
The analyst also noticed that this activity has resulted in a Type B Superflow on the Network Activity tab.
Under which category, should the analyst report this issue to the security administrator?
send
light_mode
delete
All Pages