Download IBM.PracticeDumps.C2150-614.2017-12-28.1e.60q.vcex

Download Exam

File Info

Exam IBM Security QRadar SIEM V7.2.7 Deployment
Number C2150-614
File Name IBM.PracticeDumps.C2150-614.2017-12-28.1e.60q.vcex
Size 555 Kb
Posted December 28, 2017
Downloads 57

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Coupon: EXAM_HUB

Discount: 20%


Demo Questions

Question 1
A client has reached the maximum of 5000 EPS for their 3128 All-in-One appliance. They have just completed an acquisition of a competitor company and would like to get them on-board with collecting events for correlation in QRadar. It has been determined that the newly acquired company has a large number of log sources, and it is estimated that its total EPS will be approx. 22000 EPS. 
What will meet the hardware requirements when changing to a distributed environment?

  • A: 1605 Event Processor
  • B: 1622 Event Processor
  • C: 1624 Event Processor
  • D: 1628 Event Processor

Question 2
A Deployment Professional is asked to schedule the forwarding of events when the network is quiet, usually around 2 to 3 a.m. console time. The customer states that there is no restriction to bandwidth on the available 1 Gbp/s WAM connection during this time. 
Which value should be used for the forward transfer rate?

  • A: 0
  • B: 1
  • C: 1,000,000
  • D: 10,000,000

Question 3
A Deployment Professional working with IBM Security QRadar SIEM V7.2.7 is noticing system notifications relating to performance degradation of the CRE relating to expensive rules. Upon locating the rules that are being expensive they need to be modified to no longer trigger this notification. 
What are three causes for a rule to become expensive? (Choose three.)

  • A: Containing payload matches tests
  • B: Rule consisting of a large scope
  • C: Containing payload contains tests
  • D: Rule consisting of a narrow scope
  • E: Utilizing non-standard regular expressions
  • F: Utilizing non-optimized regular expressions

Question 4
A Deployment Professional is working with IBM Security QRadar SIEM V7.2.7. for a new customer that is trying to create their network hierarchy. The customer currently has more than the maximum of 1,000 network objects and CIDR ranges. A few of the CIDRs of the customer are: 
Which supernet should be used to shrink the amount of network objects for the supplied group of CIDRs?

  • A:
  • B:
  • C:
  • D:

Question 5
A Deployment Professional has detected a big spike in a customer’s “Malware infection detected” rule that monitors their endpoint anti-virus solution. The spike happened over the weekend, but when the rule was checked, it was not changed. Since Monday morning, the rule has spiked and has not yet stopped generating offenses. 
What was added to the customer's QRadar log sources that caused this problem?

  • A: Proxies
  • B: Flow Collectors
  • C: Domain Controllers
  • D: Guest network in their offices.

Question 6
A customer has existing complex network infrastructure with many redundant links and the IP packets are taking different paths for inbound and outbound traffic. A Deployment Professional needs to configure SFlow. 
What should be configured in IBM Security QRadar SIEM V7.2.7 to support this specific case?

  • A: Enable flow forwarding
  • B: Disable flow forwarding
  • C: Enable asymmetric flows
  • D: Disable symmetric flows

Question 7
In IBM Security QRadar SIEM V7.2.7, the number of Aggregated Data Management Views were increased. 
How many additional views were added?

  • A: 100
  • B: 120
  • C: 130
  • D: 170

Question 8
Two multi-site companies with international presences are merging and consolidating their operations. The companies have decided that the relevant information on each site must be available to the local users only. 
How should IBM Security QRadar SIEM V7.2.7 be configured to comply with this request?

  • A: The domains must be used with security profiles to limit the available information to a group of users within that domain.
  • B: The networks must be used with security profiles to limit the available information to a group of users within that domain.
  • C: The multi-tenancy must be configured to isolate the users and then domains will be used to assign log sources and networks to these users.
  • D: The multi-tenancy must be configured to allow each company to isolate and control their assets, log sources, users, networks, flows, and dashboards.

Question 9
A client has configured a log source to forward events to IBM Security QRadar SIEM V7.2.7. It is recommended that the log source level be configured at the notice level by the DSM Guide, but the client has a policy to log all events at a debug level. 
The Deployment Professional notices that the configured DSM is parsing most events, but some are being labeled as stored. The client is very interested in correlating some of the events that are being stored. 
What should be created to meet this client's goal?

  • A: Custom flow property
  • B: Custom event property
  • C: Custom DSM for parsing overrule
  • D: Custom DSM for parsing enhancement

Question 10
You are tasked with configuring IBM Security QRadar SIEM V7.2.7 to pull a log file that generated daily at midnight from a custom application on a Microsoft© Windows Server. 
Which log source protocol should be used to accomplish this task?

  • A: WinCollect MSRPC
  • B: WinCollect Agent
  • C: WinCollect Log File
  • D: WinCollect File Forwarder



You can buy ProfExam with a 20% discount..

Get Now!


Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen


Use VCE Exam Simulator to open VCE files