40 likes | 46 Views
IBM Certification C1000-018 Test Questions from Killtest are valid for you to pass the test easily.
E N D
The safer , easier way to help you pass any IT exams. 1.An analyst needs to investigate an Offense and navigates to the attached rule(s). Where in the rule details would the analyst investigate the reason for why the rule was triggered? A. Rule actions B. List of test conditions C. Rule responses D. Rules response limiter Answer: D C1000-018 IBM Security IBM Questions Killtest 2.How does an analyst view which rule triggered an Offense in the Offense summary page? A. Display -> Rules B. Actions -> View Rules C. Actions -> Display Rules D. Display -> Triggered Rules Answer: A 3.An analyst needs to review additional information about the Offense top contributors, including notes and annotations that are collected about the Offense. Where can the analyst review this information? A. In the top portion of the Offense main view B. In the bottom portion of the Offense main view C. In the top portion of the Offense Summary window D. In the bottom portion of the Offense Summary window Answer: B 4.An analyst has been assigned a task to modify a rule in such a manner that Source IP of the triggered Offense from this rule should be stored in a Reference set. Under which section of the rule wizard can the analyst achieve this? A. Rule Response B. Rule Action C. Rule Test Stack Editor D. Rule Response Limiter Answer: C 5.An analyst notices that there are a number of invalid Offenses being created from a network node. This node has been determined to be in Domain 2 and has the following log sources sending it events: (3Com 8800 Series Switch from 172.18.1.1, Cisco ACE Firewall from 172.18.1.2, FireEye from 172.18.1.3, and Palo Alto PA Series from 172.18.1.8). The analyst should create a False Positive Building Block that has a filter: A. "when the destination IP is in 172.18.0.0/16" B. "when the local network is Domain 2 and when the source IP is in 172.18.0.0/16" C. "when the remote IP is one of the following 172.18.1.1, 172.18.1.2. 1.3 172. 18.18.1.8 D. "when the local network is Domain 2 and when the source IP is in 172.18.0.0/16" Answer: D 2 / 3
The safer , easier way to help you pass any IT exams. 6.Where can an analyst investigate a security incident to determine the root cause of an issue, and then work to resolve it? A. Risk tab B. Network Activity tab C. Offense tab D. Vulnerabilities tab Answer: D 7.Which considering the ability to tune False Positives with the Confidence factor Setting, which statement applies? A. Secure areas should have a lower confidence value, while less secure areas should have a higher confidence value. B. Secure areas should have a higher confidence value, while less secure areas should have a lower confidence value a higher,, C. When setting a confidence factor, using a higher value will result in a higher number of Offenses. D. To ensure that the results are comparable, it is important to apply a common Confidence Factor across all network segments. Answer: B C1000-018 IBM Security IBM Questions Killtest 3 / 3