IBM C1000-156 Exam Questions

Questions for the C1000-156 were updated on : Dec 01 ,2025

Page 1 out of 5. Viewing questions 1-15 out of 62

Question 1

Which is a valid routing rule combination?

  • A. Drop and Bypass Correlation
  • B. Drop and Log Only
  • C. Forward and Bypass Correlation
  • D. Bypass Correlation and Log Only
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
Forward: Data is forwarded to a specified destination. It is also stored in the database and processed
by the Custom Rules Engine (CRE).
Drop: Data is dropped, meaning it is not stored in the database and is not processed by the CRE. If
you select the “Drop” option, any events that match this rule are credited back 100% to the license.
Bypass Correlation: Data bypasses the CRE but is stored in the database. This option allows events to
be used in analytic apps and for historical correlation runs. It’s useful when you want specific events
to skip real-time rules.
Log Only (Exclude Analytics): Events are stored in the database and flagged as “Log Only.” They
bypass the CRE and are not available for historical correlation. These events contribute to neither
offenses nor real-time analytics.
Now, let’s look at the valid combinations:
Forward and Drop: Data is forwarded to a specified destination, but it is not stored in the database or
processed by the CRE. Dropped events are credited back to the license.
Forward and Bypass Correlation: Data is forwarded to a destination and stored in the database, but
CRE rules do not run on it. Useful for scenarios where you want events to bypass real-time rules but
still be available for historical correlation.
Forward and Log Only (Exclude Analytics): Events are forwarded to a destination, stored as “Log
Only,” and bypass the CRE. They are not available for historical correlation and are credited back to
the license.

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 2

Which is a valid statement about the process of restoring a backup archive?

  • A. A configuration restore must be performed on a console where the IP address matches the IP address of a managed host in the backup.
  • B. A backup archive can only be restored for the same software version, including fix pack versions.
  • C. When restoring all configuration items included in the backup archive, only configuration information, offense data, and asset data are restored.
  • D. A restoration might fail if you restore the configuration backup before the data backup.
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
When restoring a backup archive in QRadar, it is essential to ensure that the software version
matches exactly. This includes both the base version and any fix pack versions.
Attempting to restore a backup archive from a different software version can lead to compatibility
issues, data corruption, and system instability.
Always verify that the backup archive corresponds to the same QRadar version before initiating the
restoration process.
Reference:
IBM QRadar SIEM V7.5 Administration documentation.

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 3

The Report wizard provides a step-by-step guide to design, schedule, and generate reports. Which
three (3) key elements does the report wizard use to help you create a report?

  • A. Content
  • B. Format
  • C. Container
  • D. Display
  • E. Banner
  • F. Layout
Answer:

A, B, F

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
F
50%

Explanation:
The Report wizard in IBM QRadar SIEM provides a structured approach to designing, scheduling, and
generating reports. The three key elements used by the Report wizard to help you create a report
are:
Content: This element involves selecting the specific data and metrics you want to include in the
report. It can include various log sources, events, and other relevant security data.
Format: This element defines how the data will be presented in the report. It includes selecting the
type of report (e.g., tabular, graphical) and the specific visualizations that will best represent the
data.
Layout: This element refers to the overall structure and design of the report, including the
arrangement of content and visual elements to ensure the report is easily readable and
professionally formatted.
These elements together ensure that the reports generated are comprehensive, visually appealing,
and tailored to the specific needs of the organization.
Reference
IBM QRadar SIEM documentation

Discussions
vote your answer:
A
B
C
D
E
F
0 / 1000

Question 4

How many vulnerability processors can you have in your deployment?

  • A. 5
  • B. 3
  • C. 10
  • D. 1
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
In QRadar SIEM V7.5, the number of vulnerability processors is limited to​1.
These vulnerability processors are responsible for handling and processing vulnerability data within
the system.
Having multiple vulnerability processors is not supported in this version of QRadar.
Reference:
IBM QRadar SIEM V7.5 Administration documentation.

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 5

When restoring backups of your apps in a QRadar environment, what information is restored?

  • A. The last known good version of your apps configuration, your application data, and any apps that were configured on an App Host are restored.
  • B. The applications that are installed on the Console are restored, and any applications that are installed on an AppHost must be backed up separately.
  • C. The apps configuration, the console configuration, and app data are restored.
  • D. The apps configuration and app data are restored.
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
When restoring backups of your apps in a QRadar environment, the system restores the last known
good version of your apps' configuration, your application data, and any apps that were configured
on an App Host. This comprehensive restoration process ensures that all critical components of your
applications, including their configurations and data, are recovered to their previous states. This is
crucial for maintaining the integrity and functionality of the applications after a restoration.
Reference
QRadar SIEM V7.5 Administration Guide - Chapter on Backup and Restore Procedures

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 6

Which field is mandatory when you use the DSM Editor to map an event to a OID?

  • A. High-level Category
  • B. Low-level Category
  • C. Event Category
  • D. Event ID
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
When using the DSM (Device Support Module) Editor in IBM QRadar to map an event to an OID
(Object Identifier), the Event ID field is mandatory. The Event ID uniquely identifies the event within
QRadar and is essential for ensuring that the correct event data is associated with the appropriate
OID. This mapping process allows QRadar to properly categorize and handle events based on their
unique identifiers.
Reference
QRadar SIEM V7.5 Administration Guide - Chapter on DSM Editor and Event Mapping

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 7

Which two (2) data sources can be assigned to a domain in the Domain Management function?

  • A. Users
  • B. Rules
  • C. Flow collectors
  • D. Log sources
  • E. X-Force Integration Feed
Answer:

C, D

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%

Explanation:
In the Domain Management function of IBM QRadar SIEM, two key data sources that can be assigned
to a domain are Flow Collectors and Log Sources. Flow collectors capture and analyze network flow
data, while log sources refer to various devices and applications that send log data to QRadar for
analysis. By assigning these data sources to a domain, administrators can segment and manage the
data more effectively, ensuring that the correct flow and log data are processed and analyzed within
the designated domain. This segmentation enhances security and performance by isolating data
handling according to domain-specific policies.
Reference
QRadar SIEM V7.5 Administration Guide - Chapter on Domain Management and Data Source
Assignment

Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 8

An administrator is reviewing the system notifications and discovers this error:
Insufficient disk space to complete data export request.
The Export Directory property in the System Settings has the default configuration.
Which disk partition does the administrator need to check?

  • A. /store/ariel/events/exports
  • B. /var/log/exports
  • C. /storetmp/exports
  • D. /store/exports
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
When the error "Insufficient disk space to complete data export request" is encountered, and the
Export Directory property in the System Settings has the default configuration, the disk partition that
needs to be checked is /store/ariel/events/exports. This directory is typically used for exporting
event data in QRadar SIEM. The error indicates that the available disk space in this partition is
insufficient to handle the export operation. Administrators should check the storage usage of this
partition and manage the space by either cleaning up unnecessary files or expanding the storage
capacity.
Reference
QRadar SIEM V7.5 Administration Guide - Chapter on System Notifications and Disk Management

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 9

Domain assignments lake precedence over the settings of which other elements from a security
profile?

  • A. Security profiles, Networks, and Log Sources tabs
  • B. Security profiles. Networks, and Domains
  • C. Permission Precedence, and Log Sources tabs
  • D. Permission Precedence. Networks, and Log Sources tabs
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
In IBM QRadar SIEM, domain assignments take precedence over the settings of other elements from
a security profile, specifically Permission Precedence, Networks, and Log Sources tabs. This
hierarchical precedence ensures that the domain settings are enforced across different security
configurations. The domain settings effectively override other configurations to maintain consistency
and security across the environment. This structure helps in managing access and permissions more
effectively by ensuring that the domain-level policies are the primary controlling factor.
Reference
QRadar SIEM V7.5 Administration Guide - Chapter on Domain Management and Security Profiles

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 10

How can an administrator configure a rule response to add event data to a reference set?

  • A. Write a custom script.
  • B. Use AQL functions.
  • C. Use the "add the following data to a reference set" rule test.
  • D. Use the "add to reference set" rule response.
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
Administrators can configure a rule response in QRadar to add event data to a reference set by using
the "add to reference set" rule response. This is a predefined response action in QRadar that allows
specific event data to be added to a reference set when the rule conditions are met.
Navigate to the "Offenses" tab in the QRadar console.
Select "Rules" from the navigation pane.
Create a new rule or edit an existing rule.
In the "Rule Response" section, add a new response.
Select the "Add to Reference Set" response.
Specify the reference set and the data to be added.
Save and deploy the rule.
Reference
IBM QRadar SIEM V7.5 Administration documentation

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 11

You are using the command line interface (CLI) and need to fix a storage issue. What command do
you use to verify disk usage levels?

  • A. df -h
  • B. Is -laF
  • C. lsof -h
  • D. du -h
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
To verify disk usage levels in a Linux environment, the df -h command is used. This command
provides an overview of the disk space usage, displaying the available and used space in a human-
readable format.
Open the terminal or CLI on the system.
Type df -h and press Enter.
Review the output, which will show the filesystem, size, used space, available space, and usage
percentage for all mounted filesystems.
Reference
IBM QRadar SIEM V7.5 Administration documentation.

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 12

On which managed hosts is QRadar event data stored in the Ariel database?

  • A. On the Event Collector and attached Data Node
  • B. On the Data Gateway and attached Data Node
  • C. On the Event Processor and attached Data Node
  • D. On the App Host and attached Data Node
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
QRadar event data is stored in the Ariel database on the Event Processor and any attached Data
Nodes. The Event Processor is responsible for processing incoming events, performing correlation,
and storing the event data. The attached Data Nodes provide additional storage capacity and can be
used to extend the storage available to the Event Processor.
Reference
IBM QRadar SIEM V7.5 Administration documentation.

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 13

Before configuring a WinCollect log source, which two ports does a QRadar administrator ensure are
open?

  • A. 514 and 8413
  • B. 445 and 8413
  • C. 443 and 8413
  • D. 8080 and 8413
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
Before configuring a WinCollect log source in QRadar, the administrator must ensure that specific
network ports are open to facilitate communication. The required ports are:
Port 514: This is the default port for syslog, a standard protocol used to send system log or event
messages to a specific server. WinCollect uses this port to send logs from Windows machines to the
QRadar server.
Port 8413: This port is used for communication between the WinCollect agent and the QRadar
Console. It is necessary for managing the WinCollect agent and ensuring proper data transmission.
Ensuring these ports are open is crucial for the seamless operation and integration of WinCollect
with QRadar, allowing the secure and efficient collection of log data from Windows environments.
Reference
IBM Security QRadar SIEM and IBM Security QRadar EDR integration.pdf​

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 14

A QRadar administrator creates a new saved search in QRadar.
Which option does the administrator enable to allow this search to be opened as the Log Activity tab
is opened?

  • A. Set as Default
  • B. Include in my Quick Searches
  • C. Include in my Dashboard
  • D. Share with Everyone
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
Similar to the previous question, when a QRadar administrator creates a new saved search and wants
it to be the first search displayed upon opening the Log Activity tab, the correct option to enable is
"Set as Default." Here's the detailed process:
Saved Search Creation: The administrator specifies the search parameters and criteria to create a
new saved search.
Enabling Default Setting: By selecting the "Set as Default" checkbox, the administrator ensures that
this search will automatically run and display when the Log Activity tab is accessed.
Utility: This option is particularly useful for quickly accessing the most relevant data without needing
to manually select and run the saved search each time.
Setting a default search helps maintain focus on critical security events by providing immediate
access to predefined search results.
Reference
IBM Security QRadar SIEM and IBM Security QRadar EDR integration.pdf​

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 15

A QRadar administrator creates a new saved search in QRadar.
Which option does the administrator enable to allow this search to be opened as the Log Activity tab
is opened?

  • A. Set as Default
  • B. Include in my Quick Searches
  • C. Include in my Dashboard
  • D. Share with Everyone
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
When a QRadar administrator creates a new saved search and wants it to open by default whenever
the Log Activity tab is opened, they need to enable the "Set as Default" option. Here is a detailed
explanation:
Creating a Saved Search: When saving a search in QRadar, the administrator can define specific
criteria and filters to create a custom search that meets their requirements.
Set as Default Option: By enabling the "Set as Default" option, the administrator ensures that this
particular search will be automatically executed and displayed whenever the Log Activity tab is
accessed. This saves time and provides immediate access to the most relevant data.
Benefits: Setting a default search streamlines the workflow for security analysts by presenting the
most important or frequently used search results right away.
This feature enhances efficiency by ensuring that users are presented with the most pertinent data as
soon as they access the Log Activity tab.
Reference
IBM Security QRadar SIEM and IBM Security QRadar EDR integration.pdf​

Discussions
vote your answer:
A
B
C
D
0 / 1000
To page 2