Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

IBM Exam C1000-156 Topic 8 Question 23 Discussion

Actual exam question for IBM's C1000-156 exam
Question #: 23
Topic #: 8
[All C1000-156 Questions]

What is the most restrictive permissions a user needs in order to see all of the events from a particular log source in the Log Activity tab?

Show Suggested Answer Hide Answer
Suggested Answer: D

If the option 'Include in my Dashboard' cannot be selected when creating a saved search in IBM QRadar SIEM V7.5, a possible reason is insufficient permissions. Here's why:

Permissions: The user needs appropriate permissions to add saved searches to the dashboard.

Role-Based Access Control: QRadar uses role-based access control to manage user permissions. The user's role must include the necessary privileges to modify dashboards.

Verification: Ensure that the user has the correct permissions assigned. This can be checked and adjusted in the user management settings.

Reference IBM QRadar SIEM administration guides explain the permissions required for various actions, including adding saved searches to dashboards, and how to configure user roles and permissions.


Contribute your Thoughts:

Estrella
2 days ago
Did someone say 'log source'? I thought this was a question about lumberjacking. Where's my axe?
upvoted 0 times
...
Yvette
11 days ago
I'm going with B. It seems the most comprehensive and restrictive option, which is what the question is asking for.
upvoted 0 times
...
France
14 days ago
Haha, C is definitely wrong. Flow Sources Only? That's like asking for a pizza with no cheese or toppings!
upvoted 0 times
...
Marshall
15 days ago
Hmm, I'm not sure about this one. I was thinking it might be D, since the log source has to be in the user's profile and the profile needs to be set to Log Sources Only.
upvoted 0 times
...
Candra
16 days ago
I'm not sure about that. I think it might be D) The log source must be included in the user's security profile and the profile needs its precedence set to Log Sources Only.
upvoted 0 times
...
Cecilia
17 days ago
I agree with Christiane. The user needs access to both Networks and Log Sources to see all events from a particular log source in the Log Activity tab.
upvoted 0 times
...
Johnetta
18 days ago
I think the correct answer is B. The user's security profile needs to include that specific log source, and the profile also needs permission to Networks AND Log Sources.
upvoted 0 times
...
Christiane
24 days ago
I think the answer is B) The user's security profile must include that log source, and the profile needs permission to Networks AND Log Sources.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77