최신 IBM Technical Mastery - IBM Security P1000-017 무료샘플문제:
1. Where does the data gets encrypted in QRadar cloud deployment?
A) In Vulnerability scans
B) In transport and storage
C) In customer log sources
D) In Routing rules
2. How are investigations performed from event and flow data?
A) Via log source management
B) Via the log activity and network activity tabs
C) Via indexing all properties in QRadar
D) Via Vulnerability scans
3. What is the main difference between building blocks and rules?
A) Building blocks are collection of tests without actions and responses while rules may have actions and responses
B) Building blocks are released via IBM security App exchange while rules are released via auto updates
C) Building blocks analyzes normalize data while rules analyze raw data
D) Building blocks are analyzed by event collectors while the rules are analyzed by event processors
4. Why are offenses created in Qradar?
A) To group non correlated vulnerabilities data into single view
B) To correlate index properties grouped in dashboards
C) To eliminate the need to perform security investigations
D) To connect multiple suspicious symptoms into a single incident
질문과 대답:
질문 # 1 정답: B | 질문 # 2 정답: B | 질문 # 3 정답: A | 질문 # 4 정답: D |