Leads4pass > IBM > IBM Certified Deployment Professional > C2150-400 > C2150-400 Online Practice Questions and Answers

C2150-400 Online Practice Questions and Answers

Questions 4

Where do you save the "Login Message File" on the system when setting up a banner message for the authentication page?

A. /opt/qradar/conf/

B. /opt/qradar/www

C. /opt/tomcat/conf/

D. /opt/qradar/webapps

Buy Now
Questions 5

A QRadar administrator needs to tune the system by enabling or disabling the appropriate rules in order to ensure that the QRadar console generates meaningful offenses for the environment. Which role permission is required for enabling and disabling the rule?

A. Offenses > Maintain CRE Rules

B. Offenses > Toggle Custom Rules

C. Offenses > Manage Custom Rules

D. Offenses > Maintain Custom Rules

Buy Now
Questions 6

A QRadar SIEM administrator wants to create a Flow Rule that includes a building block definition (BB) that includes applications that indicate communication with file sharing sites. In which group will the administrator find this specified building block?

A. Policy

B. Host Definitions

C. Network Definition

D. Category Definitions

Buy Now
Questions 7

In which two ways can an administrator view all the events that are related to an offense from the Offense Details screen? (Choose two.)

A. Top 5 Source IPs section

B. Click on Display > Sources

C. Click on Display > Destinations

D. Click on Event/Flow Count field's Events link

E. Click on Events button in Last 10 Events section

Buy Now
Questions 8

What is the easiest method to populate host definition building blocks?

A. Setup Rules

B. Server Discovery

C. Authorized Services

D. Manually Define Building Blocks

Buy Now
Questions 9

Assuming a Squid Proxy has logs in the following format:

time elapsed remotehost code/status bytes method URL rfc931 peerstatus/peerhost type And these are some sample logs from Squid server:

1286536310.075 452 192.168.0.227 TCP_MISS/200 5067 GET http://www.test.com/vi/VfnuY/default.jpgDIRECT/10.20.153.118 image/jpeg 1286536310.524 935 192.168.0.68 TCP_MISS/200 1021 POST http://www.test.com/services DIRECT/172.16.41.128 application/xml 1286536310.550 495 192.168.0.227 TCP_MISS/204 406 GET http://test.com/get_video? DIRECT/10.12.231.1.136 text/html 1153239176.287 632 172.16.10.92 TCP_IMS_HIT/304 215 GET http:// www.test.com/index.html - NONE/-text/html

Which regular expression would you use to pull out the bytes field into custom property?

A. \w+/\d+\s+(\d+)\s+(POST|GET)

B. \w+/\d+\S+(\d+)\S+(POST|GET)

C. \w+/\d+\s+(\d+)\s+^(POST|GET)

D. \W+/\D+\D+(\D+)\D+(POST|GET)

Buy Now
Questions 10

Which appliance is used to collect, store, and process event and flow data in case of hardware and network failure?

A. Replicated appliance

B. Secondary appliance

C. High availability appliance

D. High accessibility appliance

Buy Now
Questions 11

In which three ways can you create Log Sources? (Choose three.)

A. Bulkload

B. Manually

C. Automatically

D. Scripting

E. Autoupdate

F. QRadar Enterprise template

Buy Now
Questions 12

Who can view all offenses?

A. All users

B. Admin user

C. User who has access to All Log Sources and All Networks

D. Restricted User who has access to a Specific Log Source and Network

Buy Now
Questions 13

Which action can be performed on a license key?

A. Erase a license key

B. Delete a license key

C. Unload a license key

D. Unallocate a license key

Buy Now
Exam Code: C2150-400
Exam Name: IBM Security Qradar SIEM Implementation v 7.2.1
Last Update: Feb 15, 2025
Questions: 175
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$49.99

VCE

$55.99

PDF + VCE

$65.99