IBM C2150-624 Exam Practice Questions (P. 2)
- Full Access (60 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #6
An Administrators will add a secondary host to an IBM Security QRadar SIEM V7.2.8 Console in a High Availability (HA) deployment scenario.
After checking the compatibility between primary and secondary HA pairs, what other prerequisite should the Administrator check within Managed Interfaces?
After checking the compatibility between primary and secondary HA pairs, what other prerequisite should the Administrator check within Managed Interfaces?
- AThe shared external storage.
- BThe server certificate that is issued by the local CA.
- CThe existence of an additional distributed file system.
- DThe communication for Distributed Replicated Block Device.
Correct Answer:
D
CP port 7789 must be open and allow communication between the primary and secondary for Distributed Replicated Block Device (DRBD) traffic.
DRBD traffic is responsible for disk replication and is bidirectional between the primary and secondary host.
Reference -
https://www.ibm.com/support/knowledgecenter/SS42VS_7.2.7/com.ibm.qradar.doc/c_qradar_appliance_require.html
D
CP port 7789 must be open and allow communication between the primary and secondary for Distributed Replicated Block Device (DRBD) traffic.
DRBD traffic is responsible for disk replication and is bidirectional between the primary and secondary host.
Reference -
https://www.ibm.com/support/knowledgecenter/SS42VS_7.2.7/com.ibm.qradar.doc/c_qradar_appliance_require.html
send
light_mode
delete
Question #7
An Administrator working with IBM Security QRadar SIEM V7.2.8 needs to delete a single value named User1 from a reference set with the name "Allowed Users" from the command line interface.
Which command will accomplish this?
Which command will accomplish this?
- A./UtilReferenceSet.sh purge "Allowed Users" User1
- B./ReferenceSetUtil.sh purge "Allowed Users" User1
- C./ReferenceSetUtil.sh delete "Allowed\ Users" User1
- D./UtilReferenceSet.sh delete "Allowed\ Users" User1
Correct Answer:
B
The Referencesetutil.sh purge is the correct syntax of the command. It deletes the specific user when you mention it within the reference set.
Reference -
https://www.ibm.com/developerworks/community/forums/html/topic?id=77777777-0000-0000-0000-000014967953
B
The Referencesetutil.sh purge is the correct syntax of the command. It deletes the specific user when you mention it within the reference set.
Reference -
https://www.ibm.com/developerworks/community/forums/html/topic?id=77777777-0000-0000-0000-000014967953
send
light_mode
delete
Question #8
When it comes to licensing, what is the difference between Events and Flows and how they are licensed?
- AFlows are licensed based on overall count over a minute, where Events are licensed based on overall count per second.
- BFlows are licensed based on overall count per second, where Events are licensed based on overall count over a minute.
- CFlows and Events are both licensed by overall count per minute under an Upgraded License and per second on a Basic License.
- DFlows and Events are both licensed by overall count per second under an Upgraded License and per second on a Basic License.
Correct Answer:
A
A significant difference between event and flow data is that an event, which typically is a log of a specific action such as a user login, or a VPN connection, occurs at a specific time and the event is logged at that time. A flow is a record of network activity that can last for seconds, minutes, hours, or days, depending on the activity within the session. For example, a web request might download multiple files such as images, ads, video, and last for 5 to 10 seconds, or a user who watches a Netflix movie might be in a network session that lasts up to a few hours. The flow is a record of network activity between two hosts.
Reference -
https://www.ibm.com/support/knowledgecenter/en/SS42VS_7.2.8/com.ibm.qradar.doc/c_qradar_deploy_event_and_flow_pipeline.html
A
A significant difference between event and flow data is that an event, which typically is a log of a specific action such as a user login, or a VPN connection, occurs at a specific time and the event is logged at that time. A flow is a record of network activity that can last for seconds, minutes, hours, or days, depending on the activity within the session. For example, a web request might download multiple files such as images, ads, video, and last for 5 to 10 seconds, or a user who watches a Netflix movie might be in a network session that lasts up to a few hours. The flow is a record of network activity between two hosts.
Reference -
https://www.ibm.com/support/knowledgecenter/en/SS42VS_7.2.8/com.ibm.qradar.doc/c_qradar_deploy_event_and_flow_pipeline.html
send
light_mode
delete
Question #9
When an IBM Security QRadar SIEM V7.2.8 distributed deployment requires scaling horizontally to achieve Event per Second (EPS) requirements, what QRadar
Component needs to be added to meet the EPS demands?
Component needs to be added to meet the EPS demands?
- AEvent Manager
- BEvent Indexing
- CEvent Collector
- DEvent Processor
Correct Answer:
D
The QRadar SIEM Event Processor Virtual 1699 appliance supports the following items:
✑ Up to 10,000 events per second
✑ 2 TB or larger dedicated event storage
Reference -
https://www.ibm.com/support/knowledgecenter/SS42VS_7.2.4/com.ibm.qradar.doc_7.2.4/c_siem_vrt_ap_ov.html
D
The QRadar SIEM Event Processor Virtual 1699 appliance supports the following items:
✑ Up to 10,000 events per second
✑ 2 TB or larger dedicated event storage
Reference -
https://www.ibm.com/support/knowledgecenter/SS42VS_7.2.4/com.ibm.qradar.doc_7.2.4/c_siem_vrt_ap_ov.html
send
light_mode
delete
Question #10
The event data collected by IBM Security QRadar SIEM V7.2.8 is being deleted after one month. The legal department required the data be kept for two months.
What can the administrator do to accommodate this requirement?
What can the administrator do to accommodate this requirement?
- AChange the nightly backup Priority to "High".
- BChange the nightly backup to a monthly backup.
- CChange the Default Event Retention Policy property field "Do not delete data in this bucket" to two months.
- DChange the Default Event Retention Policy property field "Keep data placed in this bucket for" to two months.
Correct Answer:
C
When storage space is required - Select this option if you want events or flows that match the Keep data placed in this bucket for parameter to remain in storage until the disk monitoring system detects that storage is required. If used disk space reaches 85% for records and 83% for payloads, data will be deleted. Deletion continues until the used disk space reaches 82% for records and 81% for payloads.
When storage is required, only events or flows that match the Keep data placed in this bucket for parameter are deleted.
Reference -
https://www.ibm.com/developerworks/community/forums/atom/download/Event_Flow_Retention_QRadar_72_AdminGuide.pdf?nodeId=593f2b31- a858-4210-b380-4674894a6ad9
C
When storage space is required - Select this option if you want events or flows that match the Keep data placed in this bucket for parameter to remain in storage until the disk monitoring system detects that storage is required. If used disk space reaches 85% for records and 83% for payloads, data will be deleted. Deletion continues until the used disk space reaches 82% for records and 81% for payloads.
When storage is required, only events or flows that match the Keep data placed in this bucket for parameter are deleted.
Reference -
https://www.ibm.com/developerworks/community/forums/atom/download/Event_Flow_Retention_QRadar_72_AdminGuide.pdf?nodeId=593f2b31- a858-4210-b380-4674894a6ad9
send
light_mode
delete
All Pages