Exam2pass
0 items Sign In or Register
  • Home
  • IT Exams
  • Guarantee
  • FAQs
  • Reviews
  • Contact Us
  • Demo
Exam2pass > IBM > IBM Certifications > C2150-612 > C2150-612 Online Practice Questions and Answers

C2150-612 Online Practice Questions and Answers

Questions 4

How is an event magnitude calculated?

A. As the sum of the three properties Severity, Credibility and Relevance of the Event

B. As the sum of the three properties Severity, Credibility and Importance of the Event

C. As a weighted mean of the three properties Severity, Credibility and Relevance of the Event

D. As a weighted mean of the three properties Severity, Credibility and Importance of the Event

Buy Now

Correct Answer: C

Questions 5

When reviewing Network Activity, a flow shows a communication between a local server on port 443, and a

random, remote port. The bytes from the local destination host are 2 GB, and the bytes from the remote,

source host address are 40KB.

What is the flow bias of this session?

A. Other

B. Mostly in

C. Near-same D. Mostly out

Buy Now

Correct Answer: D

Questions 6

How does flow data contribute to the Asset Database?

A. Correlated Flows are used to populate the Asset Database.

B. It provides administrators visibility on how systems are communicating on the network.

C. Flows are used to enrich the Asset Database except for the assets that were discovered by scanners.

D. It delivers vulnerability and ports information collected from scanners responsible for evaluating network assets.

Buy Now

Correct Answer: C

Questions 7

When QRadar processes an event it extracts normalized properties and custom properties.

Which list includes only Normalized properties?

A. Start time, Source IP, Username, Unix Filename

B. Start time, Username, Unix Filename, RACF Profile

C. Start time, Low Level Category, Source IP, Username

D. Low Level Category, Source IP, Username, RACF Profile

Buy Now

Correct Answer: C

Questions 8

Which Anomaly Detection Rule type is designed to test event and flow traffic for changes in short term events when compared against a longer time frame?

A. Outlier Rule

B. Anomaly Rule

C. Threshold Rule

D. Behavioral Rule

Buy Now

Correct Answer: B

Reference: http://www.ibm.com/support/knowledgecenter/en/SS42VS_7.2.7/com.ibm.qradar.doc/ c_qradar_rul_anomaly_detection.html

Questions 9

What are two benefits of using a netflow flow source? (Choose two.)

A. They can include data payload.

B. They can include router interface information.

C. They can include usernames involved in the flow.

D. They can include ASN numbers of remote addresses.

E. They can include authentication methods used to access the network.

Buy Now

Correct Answer: BD

Reference: https://developer.ibm.com/qradar/2018/01/09/qradar-flow-faq/

Questions 10

Which two actions can be performed on the Offense tab? (Choose two.)

A. Adding notes

B. Deleting notes

C. Hiding offenses

D. Deleting offenses

E. Creating offenses

Buy Now

Correct Answer: AC

Reference: https://www.ibm.com/support/knowledgecenter/en/SS42VS_7.3.0/com.ibm.qradar.doc/ c_qradar_off_mgmt_tasks.html

Questions 11

Which approach allows a rule to test for Active Directory (AD) group membership?

A. Import the AD membership information into the Asset Database using AXIS and use an asset rule test

B. Use the build-in LDAP integration to execute a search for each event as it is received by the Event Processor to test for group membership

C. Maintain reference data for the AD group(s) of interest containing lists of usernames and then add rule tests to see if the normalized username is in the reference data

D. Export the AD group membership information to a CSV file and place it in the /store/AD_mapping.csv

file on the console, then use the `is a member of AD group' test in the rule

Buy Now

Correct Answer: A

Questions 12

A Security Analyst is looking on the Assets Tab at an asset with offenses associated to it.

With a "Right Click" on the IP address, where could the Security Analyst go to obtain all offenses associated with it?

A. Information > Asset Profile

B. Navigate > View by Network

C. Run Vulnerability Scan > Source offenses

D. Navigate > View Source Summary or Destination Summary

Buy Now

Correct Answer: A

Reference: https://www.ibm.com/support/knowledgecenter/SS42VS_7.3.1/com.ibm.qradar.doc/ b_qradar_users_guide.pdf

Questions 13

Which feature of a Next Generation Firewall is not available on previous firewalls?

A. VPN Support

B. Layer 3 based firewall rules

C. Integrated signature based IPS engine

D. Network and Port-Address Translation (NAT)

Buy Now

Correct Answer: C

Exam Code: C2150-612
Exam Name: IBM Security QRadar SIEM V7.2.6 Associate Analyst
Last Update: Jun 11, 2025
Questions: 105

PDF (Q&A)

$45.99
ADD TO CART

VCE

$49.99
ADD TO CART

PDF + VCE

$59.99
ADD TO CART

Exam2Pass----The Most Reliable Exam Preparation Assistance

There are tens of thousands of certification exam dumps provided on the internet. And how to choose the most reliable one among them is the first problem one certification candidate should face. Exam2Pass provide a shot cut to pass the exam and get the certification. If you need help on any questions or any Exam2Pass exam PDF and VCE simulators, customer support team is ready to help at any time when required.

Home | Guarantee & Policy |  Privacy & Policy |  Terms & Conditions |  How to buy |  FAQs |  About Us |  Contact Us |  Demo |  Reviews

2025 Copyright @ exam2pass.com All trademarks are the property of their respective vendors. We are not associated with any of them.