After working with an Offense, an analyst set the Offense as hidden. What does the analyst need to do to view the Offense at a later time?
A. In the all Offenses view, at the top of the view, select “Show hidden” from the “Select an option” drop-down.
B. Search for all Offenses owned by the analyst.
C. Click Clear Filter next to the “Exclude Hidden Offenses”.
D. In the all Offenses view, select Actions, then select show hidden Offenses.
An analyst is performing an investigation regarding an Offense. The analyst is uncertain to whom some of the external destination IP addresses in List of Events are registered.
How can the analyst verify to whom the IP addresses are registered?
A. Right-click on the destination address, More Options, then Navigate, and then Destination Summary
B. Right-click on the destination address, More Options, then IP Owner
C. Right-click on the destination address, More Options, then Information, and then WHOIS Lookup
D. Right-click on the destination address, More Options, then Information, and then DNS Lookup
An analyst needs to perform Offense management.
In QRadar SIEM, what is the significance of “Protecting” an offense?
A. Escalate the Offense to the QRadar administrator for investigation.
B. Hide the Offense in the Offense tab to prevent other analysts to see it.
C. Prevent the Offense from being automatically removed from QRadar.
D. Create an Action Incident response plan for a specific type of cyber attack.
Which consideration should be given to the position of rule tests that evaluate regular expressions (Regex tests)?
A. They can only be used in Building Blocks to ensure they are evaluated as infrequently as possible.
B. They are usually the most specific. As such, they should appear first in the order.
C. They are usually the most expensive. As such, they should appear last in the order.
D. They are stateful tests. As such QRadar automatically evaluates them last.
What information is included in flow details but is not in event details?
A. Log source information
B. Number of bytes and packets transferred
C. Network summary information
D. Magnitude information
An analyst is investigating a user's activities and sees that they have repeatedly executed an action which triggers a rule that emails the SOC team and creates an Offense, indexed on Username.
The SOC team complained that they have received 15 emails in the space of 10 minutes, but the analyst can only see one Offense in the Offenses tab.
How is this explained?
A. There is a Rule Limiter on the Rule Action which creates the Offense, this should also be applied to the Rule Responses.
B. This is expected behavior, the offense will contain the information about all 15 events.
C. An Offense rule has been configured to send multiple emails upon Offense creation.
D. The Custom Rules Engine (CRE) has fallen behind and the additional Offenses will be created shortly.
An analyst is investigating a series of events that triggered an Offense. The analyst wants to get more detailed information about the IP address from the reference set.
How can the analyst accomplish this?
A. Click on Searches tab then perform an Advanced Search
B. Click on Log Activity tab then perform a Quick Search
C. Click on Searches tab then perform a Quick Search
D. Click on Log Activity tab then perform an Advanced Search
An analyst needs to find events coming from unparsed log sources in the Log Activity tab. What is the log source type of unparsed events?
A. SIM Generic
B. SIM Unparsed
C. SIM Error
D. SIM Unknown
Which are the supported protocol configurations for Check Point integration with QRadar? (Choose two.)
A. CHECKPOINT REST API
B. SYSLOG
C. JDBC
D. SFTP
E. OPSEC/LEA
What is a valid offense naming mechanism? This information should:
A. set the naming of the associated offense(s).
B. set or replace the naming of the associated offense(s).
C. replace the naming of the associated offense(s).
D. be included in the naming of the associated offense(s).