Certification Overview
IBM Security QRadar SIEM Analysis Exam Summary:
Exam Name
|
IBM Certified Analyst - Security QRadar SIEM V7.5
|
Exam Code
|
C1000-162
|
Exam Price
|
$200 (USD)
|
Duration
|
90 mins
|
Number of Questions
|
64
|
Passing Score
|
64%
|
Books / Training | |
Sample Questions
|
|
Practice Exam
|
IBM C1000-162 Exam Syllabus Topics:
Topic | Details | Weights |
Offense Analysis |
- QRadar uses rules to monitor the events and flows in your network to detect security threats. When the events and flows meet the test criteria that is defined in the rules, an offense is created to show that a security attack or policy breach is suspected. But knowing that an offense occurred is only the first step. Offense Analysis is all about initially identifying how it happened, where it happened, and who are the players involved in the offense. ◉ Triage initial offense |
23% |
Rules and Building Block Design |
- QRadar rules are applied to all incoming events, flows, or offenses to search for or detect anomalies. If all the conditions of a test are met, the rule generates a response. A building block is a collection of tests that don't result in a response or an action. A building block groups commonly used tests to build complex logic so that it can be reused in rules. As an Analyst you need to fully understand how rules and building blocks are designed and used, and although you are not responsible for implementing new or tuning existing rules and building blocks, you can and should make recommendations on updating QRadar components that may improve rules and building block design based on your daily exposure to them. ◉ Interpret rules that test for regular expressions |
18% |
Threat Hunting |
- After the initial Offense Analysis and based on technical skills in understanding QRadar rules and building block design, it is time to focus on the Analyst's main task of Threat Hunting. Starting with the results presented in an offense, the Analyst will investigate the evidence inside an offense, such as event and flow details, triggered rules, payloads, and more. Utilizing filters and advanced searches the Analyst will be able to distinguish real threats from false positives. ◉ Investigate Event and Flow parameters |
24% |
Dashboard Management |
- Use the QRadar Dashboard tab to focus on specific areas of your network security. The workspace supports multiple dashboards on which you can display your views of network security, activity, or data that is collected. You can use the QRadar Pulse app for an enhanced dashboard experience. ◉ Use the default QRadar dashboard to create, view, and maintain a dashboard based on common searches |
14% |
Searching and Reporting |
- Effectively utilizing QRadar's search capability represents one of the foundational skills for an Analyst. These capabilities include filtering event, flow, and asset related data as well as creating quick and advanced searches, including the Ariel Query Language. Filters and searches can be used in various parts of the QRadar UI. ◉ Explain the different uses and benefits for each Ariel search type |
21% |
0 comments:
Post a Comment