You analyzed network flows and decided that you want to track any network bandwidth violations by any application that comes from your network source. You want to report on all applications that create traffic and the amount of data (total bytes) from each IP. You want to store the IP address, the application, and the amount of data in the reference data collection.
What type of reference data collection must you create to support this use case?
To detect outliers, which Anomaly Detection Engine rule tests events or flows for volume changes that occur in regular patterns?
You want to use a quick filter search to look for certain elements:
. 10.100.100.*
• BlueCoat
• TCP_REFRESH_MIS
Which string provides the correct results?
When do you consider reconfiguring your QRadar environment to a distributed deployment?
What is the Advanced Search field used for?
An administrator receives a file with all the vital assets in the company and wants to import this file into QRadar. How must this import file be formatted?
Which field is mandatory when you use the DSM Editor to map an event to a OID?
In a single domain QRadar deployment, which IP addresses are considered local?
A QRadar administrator creates a new saved search in QRadar.
Which option does the administrator enable to allow this search to be opened as the Log Activity tab is opened?
Which two (2) open standards does the QRadar Threat Intelligence app use for feeds?