Free C1000-140 Sample Questions — IBM Security QRadar SIEM V7.4.3 Deployment

Free C1000-140 sample questions for the IBM Security QRadar SIEM V7.4.3 Deployment exam. No account required: study at your own pace.

Want an interactive quiz? Take the full C1000-140 practice test

Looking for more? Click here to get the full PDF with 61+ practice questions for $5 for offline study and deeper preparation.

Question 1

For tenant data retention, what is the maximum number of buckets for shared data that can be created per tenant?

  • A. 2
  • B. 10
  • C. No limit
  • D. 20
Show Answer
Correct Answer:
B. 10
Question 2

Consider this scenario and instruction. Vulnerability assessment products launch attacks that can result in offense creation. To avoid this behavior and define vulnerability assessment products or any server that you want to ignore as a source, edit the “and when the source IP is one of the following” test to include the IP addresses of the following scanners. VA Scanners - Authorized Scanners - What type of editable building block is described?

  • A. BB:HostDefinition: Authorized ScannersSource IP
  • B. BB:HostDefinition: VA Scanner Source IP
  • C. BB:NetworkDefinition: Server Networks
  • D. BB:HostDefinition: Proxy Servers
Show Answer
Correct Answer:
B. BB:HostDefinition: VA Scanner Source IP
Question 3

Which two of these authentication types are valid for RADIUS authentication? (Choose two.)

  • A. MSCHAP
  • B. ASCII
  • C. TCP
  • D. PAP
  • E. XML
Show Answer
Correct Answer:
  • A. MSCHAP
  • D. PAP
Question 4

While a search runs on the Network Activity tab, the direction of a set of flows is seen as R2R. The source IP of this set of flows is an internal email server. What does this situation suggest about the QRadar configuration?

  • A. QRadar might be having performance issues
  • B. The email server is offline or down
  • C. The email server is not included in the network hierarchy
  • D. The flow pipeline is choked because of high incoming flows
Show Answer
Correct Answer:
C. The email server is not included in the network hierarchy
Question 5

A QRadar deployment professional needs to transfer the configuration of a distributed environment (one Console and one EP, not using HA) onto an All-in-One (AIO) system to run some forensics against data that will be added later. What approach should the deployment professional suggest for building the new AIO?

  • A. Use rsync to transfer the contents of the /store partition to the new system
  • B. The configuration of the source environment should be backed up and then restored on the new AIO. After the system is up, the EP can be removed by use of the GUI
  • C. Because the destination environment does not have the same number of appliances, the only option is to use the content management tool (CMT) to transfer the security configuration
  • D. The configuration of the source environment should be backed up and then restored on the new AIO. After the system is up, the EP can be removed only by use of back-end PSQL commands
Show Answer
Correct Answer:
B. The configuration of the source environment should be backed up and then restored on the new AIO. After the system is up, the EP can be removed by use of the GUI
Question 6

Which of these items is updated when vulnerability scan results from third-party vulnerability scanners are imported into QRadar?

  • A. Assets
  • B. Flow sources
  • C. Event sources
  • D. Vulnerability scanner sources
Show Answer
Correct Answer:
A. Assets
Question 7

What can content management scripts be used to accomplish?

  • A. Update QRadar
  • B. Export content from a QRadar deployment
  • C. Debug the default configuration in QRadar
  • D. Extract the list of offenses in QRadar
Show Answer
Correct Answer:
B. Export content from a QRadar deployment
Question 8

A QRadar deployment professional needs to add a managed host to help reduce the load on the QRadar Console. The managed host should have local storage and also use the QRadar Custom Rule Engine. Which managed host does the deployment professional add?

  • A. Event Collector
  • B. App Host
  • C. Disconnected Log Collector
  • D. Event Processor
Show Answer
Correct Answer:
D. Event Processor
Question 9

Which log source should be used to filter QRadar audit events?

  • A. Health Metrics-2
  • B. SIM Audit-2
  • C. Audit-log
  • D. SIM-Audit-log
Show Answer
Correct Answer:
B. SIM Audit-2
Question 10

Before the creation of a new application instance with QRadar Assistant, with what entity must every application be associated?

  • A. An authorization token
  • B. user role
  • C. security profile
  • D. tenant
Show Answer
Correct Answer:
A. An authorization token

Aced these? Get the Full Exam

Download the complete C1000-140 study bundle with 61+ questions in a single printable PDF.