C1000-163 IBM Certification Practice Questions
C1000-163 IBM Certification Practice Questions
What's Inside:
Important Note:
For full access to the complete question bank and topic-wise explanations, visit:
CertQuestionsBank.com
FB page: https://www.facebook.com/certquestionsbank
Share some C1000-163 exam online questions below.
1.While reviewing apps in QRadar Assistant, an analyst wants to view the apps that work properly.
What sort option should the analyst choose?
A. Running
B. Installed
C. Error/Stopped
D. Install Failed
Answer: A
3.When you install QRadar, the default license key is temporary and gives you access to the system
for __________days from the installation date.
A. 50
B. 60
C. 35
D. 45
Answer: C
5.An organization's QRadar deployment was reviewed. It was determined that more storage is
needed.
Which appliance should be deployed to meet this need?
A. App Host
B. Data Node
C. Flow Collector
D. Event Collector
Answer: B
6.Which port is used for bidirectional traffic between WinCollect agent and QRadar Console?
A. 8082
B. 8844
C. 8080
D. 8413
Answer: D
8.What file format is supported to perform a bulk load of data into a reference set?
A. JSON
B. XML
C. CSV
D. TAXII
Answer: C
9.Which script can detemine which QRadar process is consuming the most resources?
A. /opt/ibm/si/diagnostiq
B. /opt/qradar/support/threadTop.sh
C. /opt/qradar/bin/threadTop.sh
D. /opt/qradar/conf/threadTop.sh
Answer: B
12.What is the directory where a backup archive file needs to be placed so that QRadar can
automatically import it?
A. /store/imports/inbound
B. /store/backupHost/inbound
C. /storetmp/backups
D. /storetmp/imports/backups
Answer: B
14.Which direction value means that an undefined local Source IP accesses an external resource?
A. R2L
B. L2R
C. L2L
D. R2R
Answer: D
15.QRadar uses rules to monitor the events and flows in your network to detect security threats.
When the events and flows meet the test criteria that is defined in the rules, an offense is created to
show that a security attack or policy breach is suspected. Knowing that an offense occurred is only
the first step; identifying the root cause of the offense requires analysis.
These statements refer to what kind of Offense Management?
A. Offense indexing
B. Offense investigations
C. Offense retention
D. Offense actions
Answer: B
16.Before the creation of a new application instance with QRadar Assistant, with what entity must
every application be associated?
A. A tenant
B. An authorization token
C. A security profile
D. A user role
Answer: B
21.A QRadar deployment professional wants to integrate a dynamic data set like asset information so
that QRadar can use the latest information in the new data set to correlate the rules and alerts.
How can the deployment professional achieve this?
A. Use the UCM app.
B. Import the dynamic data in the reference set and use these reference sets in rules and building
blocks.
C. Use the Threat Intelligence app.
D. Use the QRadar Search to search each item in the list of imported data set.
Answer: D
22.In a multidomain and multitenant environment, how is event visibility provided to users?
A. An event is in a domain, a domain is attached to a tenant, and a tenant is referenced in the security
profile of the user.
B. An event is allocated to a tenant, a tenant is attached to a domain, and a domain is referenced in
the security profile of the user.
C. An event is allocated to a tenant, and a tenant is referenced in the security profile of the user.
D. An event is in a domain, and a domain is referenced in the security profile of the user.
Answer: A
24.Which two (2) file formats are available for exporting offenses?
A. XML
B. CSV
C. PDF
D. TXT
E. XLSX
Answer: AB
25.A deployment professional needs to troubleshoot a QRadar application that is not working.
Which tool can be used to aid the troubleshooting of containers and container management on the
QRadar Console or App Host?
A. qapp_debug.sh
B. qdocker ps
C. q_trev.sh
D. recon
Answer: D
27.Which of these is a valid CIDR length value to use when configuring the network hierarchy in
QRadar?
A. /16
B. /38
C. /124
D. /256
Answer: A