QRadar#2 Flashcards

(45 cards)

1
Q

Difference between Local and global rules

5 login failures by the same user in 10 minutes

A

local - all 5 login failures must appears on the same event processor
global - if 3 login fails were on an EP and 2 on second

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
A QRadar user needs to enable/disable few of the rules. Which role permission is required for
enabling and disabling the rule?
A. Offenses > Maintain CRE Rules
B. Offenses > Maintain Use Cases
C. Offenses > Toggle Custom Rules
D. Offenses > Maintain Custom Rules
A

D. Offenses > Maintain Custom Rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which mode provides an analyst with a real-time view of their current event activity by
displaying a continuously updating sample of the most recent events?
A. Live Events
B. Real Time (displaying)
C. Real Time (streaming)
D. Last Interval (auto refresh)

A

C. Real Time (streaming)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does an analyst determine which rules are most active in generating Offenses?
A. Assets -> Rules -> click Offense Count to reorder the column in ascending order
B. Admin -> Rules -> click Offense Count to reorder the column in descending order
C. Offenses -> Rules -> click Offense Count to reorder the column in ascending order
D. Offenses -> Rules -> click Offense Count to reorder the column in descending order

A

D. Offenses -> Rules -> click Offense Count to reorder the column in descending order

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
What is the maximum length of the Notes field in the Offenses tab?
A. 1000
B. 1200
C. 1500
D. 2000
A

D. 2000

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
How many active Offenses can be in the QRadar system? 
A. 2500
B. 3000
C. 3500
D. 4000
A

A. 2500

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The analyst needs to export an Offense outside QRadar to make a report of the incident.
Which export format is supported? (Choose two)
A. TSV (Tab Separated Values)
B. CSV (Comma Separated Values)
C. Fixed Field Text (Plain Text)
D. XML (Extensible Markup Language)
E. HTML (Hypertext Markup Language)

A

B. CSV (Comma Separated Values)

D. XML (Extensible Markup Language)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
What period of inactivity causes an offense to go into dormant state?
A. 5 days
B. 5 hours
C. 30 days
D. 30 minutes
A

D. 30 minutes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A high number of Offenses are being generated for a specific event type.
What can the analyst do to investigate why Offenses are being created?
A. Review the health notification Offense rules.
B. Review the rules used in creating the Offense.
C. Review the Offense and enable the Offense high event rules.
D. Review the log sources and enable the anomaly Offense detection rules

A

B. Review the rules used in creating the Offense.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
Which time stamp is used to determine whether events are being queued in the event pipeline
for performance or licensing reasons?
A. Start Time
B. Device Time
C. Storage Time
D. Log Source Time
A

C. Storage Time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

When is the offense magnitude re-evaluated

A

when new events are added to the offense.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the chart types in the dashboard.

A

Pie, Table, Bar, Time Series

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the chart types in the report

A

Bar, Pie, Table, Line, Stacked Line, Stacked Bar

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
Super flow types:
Type A - network sweep
Type B - DDoS
Type C - port scan
Standard
A

Type B - DDos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Where is the vulnerability information located?

A

Asset tab

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Base 64

A

Payload -> base 64

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
Schedule report is every Monday and the first day of mount. When they want a report on Thursday.
MON - WED
MON - THU (THU - WED)
whole last week 
from last week to THU
A

whole last week

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

DSSE (device stop sending events)

A

runs in the absence of events.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Search for all viruses

A

Pause event/flow, double-click it, press Extract Property to extract virus (e.g. MD5),
Creating custom rule that use extracted property as an offense index field. Search by offense type.

20
Q

Analyst. Manually generation report

A

Does not restart the existing report schedule.

21
Q

Where are the Notes and Annotations located?

A

Bottom offense summary page

22
Q

For 10min 15 mails received and see only 1 offense

23
Q

What columns are defaultly displayed in offense log?

A

QID

Log source

24
Q

New log source was created and low level category is stored

A

Events are not correctly parsed

Admin tab > log sources > parsing order

25
Where are offenses collected - console - node - processor - collector
console
26
Where is the VPN log source
Advanced persistent threat, securing the cloud, insider threat, critical data protection.
27
AQL - 2
/.*pdf/or/.*exe/
28
How does a Device Support Module (DSM) function? A DSM is a configuration file that combines received events from multiple log sources and displays them as offenses in QRadar. A DSM is a background service running on the QRadar appliance that reaches out to devices deployed in a network for configuration data. A DSM is a configuration file that parses received events from multiple log sources and converts them to a standard taxonomy format that can be displayed as outputs A DSM is an installed appliance that parses received events from multiple log sources and converts them to a standard taxonomy format that can be displayed as outputs.
A DSM is a configuration file that parses received events from multiple log sources and converts them to a standard taxonomy format that can be displayed as outputs
29
Share the offense summary information with another person by sending an email. The body of the email message includes the following information, if available:
Total number of sources Top five sources by magnitude Total number of destinations Top five categories
30
See if Auth. are valid
Filter Username group by source IP, then validate the source IP
31
How offense was created
Event: QID, payload, category, management
32
How offense was created
Event: QID, payload, category, management
33
Creating a new custom property
Event Based
34
Events routed directly to storage by CRE
High loss
35
Filter in LA tab to get list of log sources not reporting to QRadar
Log sources status =/ active
36
Quick search saved
advanced query
37
Offense naming mechanism
set of associated
38
Default log activity page
Protocol, log S, QID, E name, Qmap
39
Checkpoint
CP ResetAPI, syslog, OPsecilea, jobc, sftp.
40
Repeated offenders and IPs that have many attacks
Ev. Cat. or Ev. Source, Source IP or D. IP, E or F, Log S. IP or Ev. source
41
Assets tab
triggered off, events and flows, network devices and log sources
42
Where in rules details can you find why the rules were triggered?
Rule: responses, actions, response limiters, list of test conditions.
43
regex tests
position of rule tests that evaluate regular expressions
44
regex test answers
the most expensive, stateful-last, building blocks, the most specific
45
geo location
GPS and Map, longitude and latitude, log activity, and network activity, group and IP.