Which two (2) statements about offense chaining are true?
Exam C1000-162: IBM Security QRadar SIEM V7.5 Analysis

Quiz
•
Business
•
Professional Development
•
Hard
Number One
FREE Resource
40 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Offense chaining causes performance issues in IBM QRadar
Offense chaining is based on the offense index field that is specified on the rule
Offense chaining is based on the generated CRE event that is specified in the rule response
A chained offense is identifiable when "preceded by" is in the Descriptions field on the Offense Summary page
If the rule is configured to use the Source IP address as the offense index field, there is only one offense that has that Source IP address, regardless of the offense status
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Offense chaining is possible based on which parameter?
Rule type
Rule response
Offense index field
Rule response limiter
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In QRadar, where is a list of offenses displaying associated source IP addresses?
Offense Summary > By Source IP
Offense Summary > New Search > Advanced Search
Log Activity > Offense Source Summary > Offenses
Log Activity > Add Filter > Source IP > offense_assigned
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A QRadar analyst can export MITRE mappings, which can later be imported into another QRadar deployment. What is another use for the exported MITRE mappings?
Mappings can be a log source configuration backup solution
The export can be a log source group configuration backup solution
MITRE coverage file can be imported into MITRE ATT&CK Navigator
The export contains event details which can be re-run by using the QRadar Experience Center app
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which parameter indicates the reliability of an offense configured in the log source, and is boosted when multiple sources report the same event?
Relevance
Credibility
Event severity
Trustworthiness log
6.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Which two (2) types of information are taken into consideration when calculating the magnitude of an offense?
The number of rules matched to the offense
The number of searches associated with the offense
The CVSS score of the log sources that are involved in the offense
The number of events and flows that are associated with the offense
The categories, severity, relevance, and credibility of the events and flows that contribute to the offense
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What are events called when they are classified in the proper log source?
Stored events
Parsed events
Payload events
Unknown events
Create a free account and access millions of resources
Similar Resources on Quizizz
40 questions
IT PROJECT MANAGEMENT

Quiz
•
University - Professi...
35 questions
Banking Quiz Chapter 2

Quiz
•
Professional Development
45 questions
Intro to Biz Final Review

Quiz
•
Professional Development
38 questions
FCPC - Software Engineering - Midterm Exam

Quiz
•
Professional Development
39 questions
Risk Management

Quiz
•
Professional Development
40 questions
NO BRAINER - ETHEREAL

Quiz
•
University - Professi...
37 questions
Exam C1000-139 IBM Security QRadar SIEM

Quiz
•
Professional Development
35 questions
Careers, Certifications, & Users of Accounting Information

Quiz
•
Professional Development
Popular Resources on Quizizz
15 questions
Multiplication Facts

Quiz
•
4th Grade
20 questions
Math Review - Grade 6

Quiz
•
6th Grade
20 questions
math review

Quiz
•
4th Grade
5 questions
capitalization in sentences

Quiz
•
5th - 8th Grade
10 questions
Juneteenth History and Significance

Interactive video
•
5th - 8th Grade
15 questions
Adding and Subtracting Fractions

Quiz
•
5th Grade
10 questions
R2H Day One Internship Expectation Review Guidelines

Quiz
•
Professional Development
12 questions
Dividing Fractions

Quiz
•
6th Grade