March Sale Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

IBM P1000-017 Dumps

Page: 1 / 2
Total 40 questions

Technical Sales Foundations for IBM QRadar for Cloud (QRoC) V1 Questions and Answers

Question 1

How does event differ from flow in Qradar?

Options:

A.

events are supports by Qradar while flows are not

B.

Events handle network packet while flow handle log data

C.

Events are correlation of network traffic while flows are records from device

D.

Events are records from device that describes an action on network or host and flows

Question 2

What does log source time mean in the event detail page

Options:

A.

Time stamp created when an event arrives at Qradar

B.

Time stamp created when an event processor is started

C.

Time stamp that is extracted from the event payload

D.

Time stamp that is extracted from files when an event data is stored

Question 3

In the scenario where Qradar on cloud client wishes to integrate an AWS hosted data source

Options:

A.

Deploying a dedicated Qradar instance is required in AWS

B.

Deploying data gateway in AWS is required to collect data from the environmentc.

C.

Deploying a Data Gateway in event hub is required for data sources

D.

Deploying a data gateway or utilizing a TLS Connection directly from QRadar – CloudWatch and

CloudTrail

Question 4

Which is a capabilities gap between on Prem QRadar and QRadar on Cloud

Options:

A.

Two Datacenters currently hosts QRadar on Cloud Environment

B.

QRadar on Cloud is unable to Scale beyond 100K events per second

C.

Installation of application tokens required IBM operation team interaction

D.

Investigation of the offences logs and data requires generation of support of service ticket

Question 5

Where does the data gets encrypted in QRadar cloud deployment?

Options:

A.

In Routing rules

B.

In Vulnerability scans

C.

In customer log sources

D.

In transport and storage

Question 6

What type of data sources are supported in Qradar cloud deployments?

Options:

A.

Event data and firewall configurations

B.

Event data, flow data, and firewall configurations

C.

Event data, flow data and LDAP user details

D.

Event data, flow data, vulnerability scan data

Page: 1 / 2
Total 40 questions