C2150-614 Dumps - Real Exam Questions

Practice Our C2150-614 Dumps Exam Questions and Pass Your Exam Easily.

C2150-614 Dumps

C2150-614 Dumps

You can pass easily using C2150-614 dumps. We keep postings these C2150-614 exam questions answers on this site regularly. Some search words are C2150-614 braindumps, past papers, study material and C2150-614 dumps. Pass your exam using C2150-614 exam questions. Passing guarantee. 


A Deployment Professional using IBM Security QRadar SIEM V7.2.7 needs to discover all mail servers, but some of the mail servers are listening on TCP port 10025. Which server type and port could be configured in server discovery to accomplish this goal?

A. Mail Servers predefined server type should be used.
B. Application predefined server type with destination port 10025 only should be used.
C. Mail Servers predefined server type with destination port 10025 added to
BB:PortDefinition: Mail Ports should be used.
D. Application Servers predefined server type with destination port 10025 added to
BB:PortDefinition: Mail Ports should be used.

Answer: C


Use the BB:PortDefinition: Mail Ports building block to include all common ports used by mail servers.

A customer has existing complex network infrastructure with many redundant links and the IP packets are taking different paths for inbound and outbound traffic. A Deployment Professional needs to configure SFlow. What should be configured in IBM Security QRadar SIEM V7.2.7 to support this specific case?

A. Enable flow forwarding
B. Disable flow forwarding
C. Enable asymmetric flows
D. Disable symmetric flows

Answer: C


In some networks, traffic is configured to take alternate paths for inbound and outbound traffic. This routing is called asymmetric routing. However, if you want to combine flows from multiple QRadar QFlow Collector components, you must configure flow sources in the Asymmetric Flow Source Interface(s) parameter in the QRadar QFlow Collector configuration. The Yes option enables the QRadar QFlow Collector to recombine asymmetric flows. The No option prevents the QRadar QFlow Collector from recombining asymmetric flows.

Which two permissions are required to modify custom properties? (Choose two.)

A. Maintain Custom Rules
B. Normalized Event Properties
C. User Defined Flow Properties
D. User Defined Event Properties
E. Normalized Flow Properties

Answer: C,D

A Deployment Professional has created a new Building Block (BB), and it’s not returning any expected events. The Deployment Professional has checked to ensure the BB is enabled and active. No errors are returned. What should be done to correct this BB problem?

A. Add your new custom BB to the “System: Load Building Blocks” rule
B. Ensure that the BB has been set to “use” and a Deploy Full Configuration was done
C. Make sure that you use “Global System” so that all of the QRadar deployment uses it
D. Manually enter in all QID’s of the events it till monitor so it will automatically be used

Answer: A


Note: Question Will a building block of type: Common work when added to ‘System: Load Building Blocks’?


The rule, System: Load Building Blocks is an Event only rule. If a building block is created from Type:
Common, which includes both Events and Flows, and is then added to the System:
Load Building Blocks rule, it will load, but will only reflect Event offenses and not Flow offenses. Flow offenses can be triggered when using Flow rules, which are then bound to the building block used in a Flow rule.

Which task can be completed by using the Historical Correlation feature?

A. Generating weekly reports on a new offense rule
B. Using a new custom rule to create a quick search
C. Investigating previously closed offenses generated a custom rule
D. Testing a new offense rule against data that was previously captured

Answer: C

After creating a custom Log Source Extension to parse a Source IP address from this event snippet ‘IP Address: (, the Source IP is not being extracted from the payload. The Log Source Extension is showing the following:
Which Regular Expression should be used to ensure the Source IP is parsed properly?

A. IP\sAddress\s\((\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})\)
B. IP\sAddress:\s\((\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}))
C. IP\sAddress:\s\((\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})\)
D. IP\sAddress:\s\((\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{13})\)

Answer: B

page 1 from 1

Recent Post