Which two pieces of information can be found under the Log Activity tab? (Choose two.)
A. Offenses
B. Vulnerabilities
C. Firewall events
D. Destination Bytes
E. Internal QRadar messages
Which approach allows a rule to test for Active Directory (AD) group membership?
A. Import the AD membership information into the Asset Database using AXIS and use an asset rule test
B. Use the build-in LDAP integration to execute a search for each event as it is received by the Event Processor to test for group membership
C. Maintain reference data for the AD group(s) of interest containing lists of usernames and then add rule tests to see if the normalized username is in the reference data
D. Export the AD group membership information to a CSV file and place it in the /store/AD_mapping.csv
file on the console, then use the `is a member of AD group' test in the rule
Given the following supplied payload of a supported Juniper device:
Which QRadar normalized fields will be populated?
A. Policy, Attack, Source IP, Username
B. Source IP, Destination IP, Destination Port, Protocol
C. Source Port, Destination Port, Domain, Source Bytes
D. Source IP, Destination IP, Destination Port, Destination Bytes
What ability does marking a custom property as "optimized" provide?
A. Allows you to use the custom property in a rule test
B. Allows you to process events above your license rating
C. Allows offenses to merge both events and flows into the same offense
D. Allows for offenses, events and flows to be compared directly in real time
Which filter in the Log and Network Activity tabs is supported by both flows and events?
A. Source Payload Contains is [Pattern]
B. Application [Indexed] matches [Application]
C. Source ID [Indexed] equals any of [IP Address]
D. Username [Indexed] equals any of [Username]
Which two actions can be performed on the Offense tab? (Choose two.)
A. Adding notes
B. Deleting notes
C. Hiding offenses
D. Deleting offenses
E. Creating offenses
What are two benefits of using a netflow flow source? (Choose two.)
A. They can include data payload.
B. They can include router interface information.
C. They can include usernames involved in the flow.
D. They can include ASN numbers of remote addresses.
E. They can include authentication methods used to access the network.
Which capability is common to both Rules and Building Blocks?
A. Rules and Building Blocks both set the Magnitude of an Event.
B. Rules and Building Blocks both have the same selection of sets.
C. Rules and Building Blocks can both be Enabled/Disabled through the GUI.
D. Rules and Building Blocks both have Actions; Building Blocks do not have Responses.
Which three optional items can be added to the Default and Custom Dashboards without requiring additional licensing? (Choose three.)
A. Offenses
B. Log Activity
C. Risk change
D. Flow Search
E. Risk Monitoring
F. Asset Management
What is a difference between Rule Actions and Rule Responses?
A. Rule Actions are executed when the Rule is Disabled; Rule Responses require the Rule to be Enabled.
B. Rule Actions are only available for Event and Flow Rules; Rule Responses are available for all Rules.
C. Rule Actions only directly affect the SIEM internals; Rule Responses may send information to external systems.
D. Rule Responses are always processed; Rule Actions may be throttled to ensure they are not executed too frequently.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only IBM exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your C2150-612 exam preparations and IBM certification application, do not hesitate to visit our Vcedump.com to find your solutions here.