IBM C2150-614 Exam Practice Questions (P. 1)
- Full Access (60 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #1
A client has reached the maximum of 5000 EPS for their 3128 All-in-One appliance. They have just completed an acquisition of a competitor company and would like to get them on-board with collecting events for correlation in QRadar. It has been determined that the newly acquired company has a large number of log sources, and it is estimated that its total EPS will be approx. 22000 EPS.
What will meet the hardware requirements when changing to a distributed environment?
What will meet the hardware requirements when changing to a distributed environment?
- A1605 Event Processor
- B1622 Event Processor
- C1624 Event Processor
- D1628 Event Processor
Correct Answer:
D
QRadar Event Processor 1628, with a Basic Licence, can process 2500 events per second (EPS), and with Upgraded license it can process 40,000 events per second.
Incorrect Answers:
A: QRadar Event Processor 1605 has a maximum capacity of events per second.
C: QRadar Event Processor 1624, with a Basic License, can process 2500 events per second (EPS), and with Upgraded license it can process only 20,000 events per second.
References:
http://www.ibm.com/support/knowledgecenter/SS42VS_7.2.7/com.ibm.qradar.doc/c_hwg_1628.html
D
QRadar Event Processor 1628, with a Basic Licence, can process 2500 events per second (EPS), and with Upgraded license it can process 40,000 events per second.
Incorrect Answers:
A: QRadar Event Processor 1605 has a maximum capacity of events per second.
C: QRadar Event Processor 1624, with a Basic License, can process 2500 events per second (EPS), and with Upgraded license it can process only 20,000 events per second.
References:
http://www.ibm.com/support/knowledgecenter/SS42VS_7.2.7/com.ibm.qradar.doc/c_hwg_1628.html
send
light_mode
delete
Question #2
A Deployment Professional is asked to schedule the forwarding of events when the network is quiet, usually around 2 to 3 a.m. console time. The customer states that there is no restriction to bandwidth on the available 1 Gbp/s WAM connection during this time.
Which value should be used for the forward transfer rate?
Which value should be used for the forward transfer rate?
- A0
- B1
- C1,000,000
- D10,000,000
Correct Answer:
A
For the forward transfer rate, a value of 0 means that the transfer rate is unlimited.
References:
http://www.ibm.com/support/knowledgecenter/SS42VS_7.2.7/com.ibm.qradar.doc/t_qradar_adm_create_store_fwd_sch.html
A
For the forward transfer rate, a value of 0 means that the transfer rate is unlimited.
References:
http://www.ibm.com/support/knowledgecenter/SS42VS_7.2.7/com.ibm.qradar.doc/t_qradar_adm_create_store_fwd_sch.html
send
light_mode
delete
Question #3
A Deployment Professional working with IBM Security QRadar SIEM V7.2.7 is noticing system notifications relating to performance degradation of the CRE relating to expensive rules. Upon locating the rules that are being expensive they need to be modified to no longer trigger this notification.
What are three causes for a rule to become expensive? (Choose three.)
What are three causes for a rule to become expensive? (Choose three.)
- AContaining payload matches tests
- BRule consisting of a large scope
- CContaining payload contains tests
- DRule consisting of a narrow scope
- EUtilizing non-standard regular expressions
- FUtilizing non-optimized regular expressions
Correct Answer:
BCF
A user can create a custom rule that has a large scope, uses a regex pattern that is not efficient, includes Payload contains tests, or combines the rule with regular expressions. When this custom rule is used, it negatively impacts performance, which can cause events to be incorrectly routed directly to storage. Events are indexed and normalized but they don't trigger alerts or offenses.
References:
http://www.ibm.com/support/knowledgecenter/SS42VS_7.2.7/com.ibm.qradar.doc/38750120.html
BCF
A user can create a custom rule that has a large scope, uses a regex pattern that is not efficient, includes Payload contains tests, or combines the rule with regular expressions. When this custom rule is used, it negatively impacts performance, which can cause events to be incorrectly routed directly to storage. Events are indexed and normalized but they don't trigger alerts or offenses.
References:
http://www.ibm.com/support/knowledgecenter/SS42VS_7.2.7/com.ibm.qradar.doc/38750120.html
send
light_mode
delete
Question #4
A Deployment Professional is working with IBM Security QRadar SIEM V7.2.7. for a new customer that is trying to create their network hierarchy. The customer currently has more than the maximum of 1,000 network objects and CIDR ranges. A few of the CIDRs of the customer are:
✑ 209.60.128.0/24
✑ 209.60.129.0/24
209.60.130.0/24

✑ 209.60.131.0/24
Which supernet should be used to shrink the amount of network objects for the supplied group of CIDRs?
✑ 209.60.128.0/24
✑ 209.60.129.0/24
209.60.130.0/24

✑ 209.60.131.0/24
Which supernet should be used to shrink the amount of network objects for the supplied group of CIDRs?
- A209.60.128.0/22
- B209.60.129.0/23
- C209.60.128.0/23
- D209.60.127.0/27
Correct Answer:
C
Supernetting, also called Classless Inter-Domain Routing (CIDR), is a way to aggregate multiple Internet addresses of the same class.
Using supernetting, the network address 209.60.128.0/24 and an adjacent address 209.60.129.0/24 can be merged into 209.60.128.0/23. The "23" at the end of the address says that the first 23 bits are the network part of the address, leaving the remaining nine bits for specific host addresses.
References:
http://searchnetworking.techtarget.com/definition/supernetting
C
Supernetting, also called Classless Inter-Domain Routing (CIDR), is a way to aggregate multiple Internet addresses of the same class.
Using supernetting, the network address 209.60.128.0/24 and an adjacent address 209.60.129.0/24 can be merged into 209.60.128.0/23. The "23" at the end of the address says that the first 23 bits are the network part of the address, leaving the remaining nine bits for specific host addresses.
References:
http://searchnetworking.techtarget.com/definition/supernetting
send
light_mode
delete
Question #5
A Deployment Professional has detected a big spike in a customer’s "Malware infection detected" rule that monitors their endpoint anti-virus solution. The spike happened over the weekend, but when the rule was checked, it was not changed. Since Monday morning, the rule has spiked and has not yet stopped generating offenses.
What was added to the customer's QRadar log sources that caused this problem?
What was added to the customer's QRadar log sources that caused this problem?
- AProxies
- BFlow Collectors
- CDomain Controllers
- DGuest network in their offices.
Correct Answer:
B
Rules perform tests on events, flows, or offenses. If all the conditions of a test are met, the rule generates a response.
QRadar QFlow Collector passively collects traffic flows from your network through span ports or network taps. The IBM Security QRadar QFlow Collector also supports the collection of external flow-based data sources, such as NetFlow.
References:
http://www.ibm.com/support/knowledgecenter/SS42VS_7.2.7/com.ibm.qradar.doc/shc_qradar_comps.html http://www.ibm.com/support/knowledgecenter/SS42VS_7.2.7/com.ibm.qradar.doc/c_qradar_gs_rules.html
B
Rules perform tests on events, flows, or offenses. If all the conditions of a test are met, the rule generates a response.
QRadar QFlow Collector passively collects traffic flows from your network through span ports or network taps. The IBM Security QRadar QFlow Collector also supports the collection of external flow-based data sources, such as NetFlow.
References:
http://www.ibm.com/support/knowledgecenter/SS42VS_7.2.7/com.ibm.qradar.doc/shc_qradar_comps.html http://www.ibm.com/support/knowledgecenter/SS42VS_7.2.7/com.ibm.qradar.doc/c_qradar_gs_rules.html
send
light_mode
delete
All Pages