Tuesday 1 October 2019

IBM C2150-614 Questions Answers

A Deployment Professional needs to create and share a saved search with other users.
What are the requirements for this action?


A. The user must be in the Admin role, and the saved search must have at least one “Grouped By” field.
B. Any user can share a saved search that must have exactly one “Grouped by” field.
C. The user must be in the Admin role, and the saved search must have at least one “[indexed]” field.
D. Any user can share a saved search that must contain at least one “Grouped By” + and one “[indexed] fields.

Answer: A



Which set of rules should be adhered to in order to create valid expression for creating custom properties?


A. SQL
B. Java
C. Perl
D. Python

Answer: B

Thursday 27 December 2018

IBM C2150-614 Questions Answers

A Deployment Professional has created a new Building Block (BB), and it's not returning any expected events. The Deployment Professional has checked to ensure the BB is enabled and active. No errors are returned. What should be done to this BB problem?

A. Add your new custom BB to the “System: Load Building Blocks” rule
B. Ensure that the BB has been set to “use” and a Deploy Full Configuration was done
C. Make sure that you use “Global System” so that all of the QRadar deployment uses it
D. Manually enter in all QID's of the events it till monitor so it will automatically be used

Answer: A   


A Deployment Professional has come on-site to upgrade a IBM Security QRadar SIEM V7.2.7 deployment to a new fix level. Before running the upgrade, the software and fix versions must be verified. What must the Deployment Professional verify?

A. Appliances in a deployment must be same version and same fix level.
B. Appliances in a deployment could be different version and different fix level.
C. Appliances in a deployment must be same version but fix level could be different.
D. Appliances in a deployment could be different version but fix level must be the same.

Answer: A

Friday 21 December 2018

IBM C2150-614 Question Answer

You are tasked with configuring IBM Security QRadar SIEM V7.2.7 to pull a log file that generated daily at midnight from a custom application on a Microsoft© Windows Server.
Which log source protocol should be used to accomplish this task?


A. WinCollect MSRPC
B. WinCollect Agent
C. WinCollect Log File
D. WinCollect File Forwarder

Answer: B


A Deployment Professional has a reference list of usernames that is used in rules. The Deployment Professional needs to be able to remove a username from the reference list when an offense is detected from a log event.
How can a Deployment Professional accomplish this goal?


A. As a rule response, select update Reference Set option
B. As a rule response, select remove from Reference Set option
C. As a rule response, select execute custom action in order to call REST-API:
UPDATE: /reference_data/sets/{name}
D. As a rule response, select execute custom action in order to call REST-API:
REMOVE: /reference_data/sets/{name}/{value}

Answer: B

Sunday 5 August 2018

IBM C2150-614 Question Answer

Two multi-site companies with international presences are merging and consolidating their operations. The companies have decided that the relevant information on each site must be available to the local users only.
How should IBM Security QRadar SIEM V7.2.7 be configured to comply with this request?


A. The domains must be used with security profiles to limit the available information to a group of users within that domain.
B. The networks must be used with security profiles to limit the available information to a group of users within that domain.
C. The multi-tenancy must be configured to isolate the users and then domains will be used to assign log sources and networks to these users.
D. The multi-tenancy must be configured to allow each company to isolate and control their assets, log sources, users, networks, flows, and dashboards.

Answer: C


A client has configured a log source to forward events to IBM Security QRadar SIEM V7.2.7. It is recommended that the log source level be configured at the notice level by the DSM Guide, but the client has a policy to log all events at a debug level. The Deployment Professional notices that the configured DSM is parsing most events, but some are being labeled as stored. The client is very interested in correlating some of the events that are being stored.
What should be created to meet this client's goal?


A. Custom flow property
B. Custom event property
C. Custom DSM for parsing overrule
D. Custom DSM for parsing enhancement

Answer: D

Monday 26 February 2018

IBM C2150-614 Question Answer

A customer has existing complex network infrastructure with many redundant links and the IP packets are taking different paths for inbound and outbound traffic. A Deployment Professional needs to configure SFlow. What should be configured in IBM Security QRadar SIEM V7.2.7 to support this specific case?

A. Enable flow forwarding
B. Disable flow forwarding
C. Enable asymmetric flows
D. Disable symmetric flows

Answer: C                                                            C2150-614 Braindumps



In IBM Security QRadar SIEM V7.2.7, the number of Aggregated Data Management Views were increased. How many additional views were added?

A. 100
B. 120
C. 130
D. 170

Answer: D

Wednesday 27 December 2017

Why legacy tech companies like IBM are betting big on blockchain while chipmakers like Nvidia hedge


(IBM) is betting heavily on blockchain technology, while many chip makers in Silicon Valley are protecting cryptocurrencies.

The Blockchain technology will be one of the largest capacity users in 60 IBM data centers rented worldwide in 2018, according to Bloomberg. The boom in the blockchain products and services market could continue to drive new revenue streams for the old line technology companies like IBM and Microsoft Corp.

Even Oracle Corp., based in Redwood City, formed its own Blockchain Cloud Service in October.

"All these things will have a new life thanks to the chain of blocks," Jerry Cuomo, vice president of technology at IBM Blockchain, told Bloomberg. "Our sales team loves blockchain because a customer that is buying blockchain rarely leaves the store with only blockchain, they go with several things in their cart."

Blockchain is the technology used by cryptocurrency users to create and record transactions instantly. Financial institutions are slowly approaching cryptocurrencies and blockchain networks could eventually facilitate the issuance and transfer of financial values, currencies, gift cards, mobile minutes, loyalty points and energy credits.

In addition to all those benefits, the use of cryptographic signatures prevents fraud, making blockchain-based transfers one of the most secure online transactions.

It is expected that the sector of products and services related to Blockchain reach $ 7.7 billion in 2022, according to the researcher Markets & Markets. IBM was at the forefront of blockchain technology, offering code to an open source project and allowing startups to use the technology for free in their cloud, according to Bloomberg.

Many of the most prominent venture capital firms in Silicon Valley have also opted for Bitcoin and Blockchain investing hundreds of millions of dollars in cryptocurrency startups:

The largest investors of VC cryptocurrencies


Despite its potential, Silicon Valley chip makers are not moving as fast in the cryptocurrency market. Companies such as Nvidia Corp. based in Santa Clara and Sunnyvale-based Advanced Micro Devices (AMD) produce graphic processing units, or GPUs, that are used by cryptocurrency "miners".

According to The Wall Street Journal, none of the chip makers wants to rely too much on supplying the cryptocurrency market, which has proven to be volatile: any disruption in the underlying technology can drastically affect the value of mining. So far this month, the value of bitcoin, the best-known cryptocurrency, has rebounded, reaching a point close to $ 20,000, before falling briefly to $ 11,000 and then rising again to $ 15,181 on Tuesday,

In addition, cryptocurrencies are not having a dramatic impact on the final results of chip makers. Nvidia earned about $ 220 million in revenues during the last two quarters driven by the demand for cryptocurrencies, a number that represents only 5 percent of its total sales. AMD CEO Lisa Su told the Wall Street Journal that she only expects cryptocurrency demands to generate a one-digit percentage of the company's 23 percent growth in 2017.

It remains to be seen how fast block chains and cryptocurrencies impact large companies. About six out of 10 large companies have blockchain technologies under consideration, according to Juniper Research. Two thirds expect the block chain to be integrated into their systems by the end of 2018.

Monday 30 October 2017

IBM C2150-614 Question Answer

A Deployment Professional has detected a big spike in a customer’s “Malware infection detected” rule that monitors their endpoint anti-virus solution. The spike happened over the weekend, but when the rule was checked, it was not changed. Since Monday morning, the rule has spiked and has not yet stopped generating offenses. What was added to the customer's QRadar log sources that caused this problem?

A. Proxies
B. Flow Collectors
C. Domain Controllers
D. Guest network in their offices.

Answer: B