Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

IBM Exam C1000-156 Topic 8 Question 23 Discussion

Actual exam question for IBM's C1000-156 exam
Question #: 23
Topic #: 8
[All C1000-156 Questions]

What is the most restrictive permissions a user needs in order to see all of the events from a particular log source in the Log Activity tab?

Show Suggested Answer Hide Answer
Suggested Answer: D

If the option 'Include in my Dashboard' cannot be selected when creating a saved search in IBM QRadar SIEM V7.5, a possible reason is insufficient permissions. Here's why:

Permissions: The user needs appropriate permissions to add saved searches to the dashboard.

Role-Based Access Control: QRadar uses role-based access control to manage user permissions. The user's role must include the necessary privileges to modify dashboards.

Verification: Ensure that the user has the correct permissions assigned. This can be checked and adjusted in the user management settings.

Reference IBM QRadar SIEM administration guides explain the permissions required for various actions, including adding saved searches to dashboards, and how to configure user roles and permissions.


Contribute your Thoughts:

Estrella
1 months ago
Did someone say 'log source'? I thought this was a question about lumberjacking. Where's my axe?
upvoted 0 times
Judy
7 days ago
I'm pretty sure it's C) A user needs access to Flow Sources Only.
upvoted 0 times
...
Alyce
18 days ago
Actually, I think it's A) The user needs access to the Networks AND Log Sources to see a particular log in the activity tab.
upvoted 0 times
...
Ty
22 days ago
No, I believe it's D) The log source must be included in the user's security profile and the profile needs its precedence set to Log Sources Only.
upvoted 0 times
...
Sherita
1 months ago
I think the answer is B) The user's security profile must include that log source, and the profile needs permission to Networks AND Log Sources.
upvoted 0 times
...
...
Yvette
2 months ago
I'm going with B. It seems the most comprehensive and restrictive option, which is what the question is asking for.
upvoted 0 times
Celestine
23 days ago
Yeah, B covers all the bases for restricting access to the log source.
upvoted 0 times
...
Filiberto
1 months ago
I agree, B seems like the most secure option.
upvoted 0 times
...
...
France
2 months ago
Haha, C is definitely wrong. Flow Sources Only? That's like asking for a pizza with no cheese or toppings!
upvoted 0 times
...
Marshall
2 months ago
Hmm, I'm not sure about this one. I was thinking it might be D, since the log source has to be in the user's profile and the profile needs to be set to Log Sources Only.
upvoted 0 times
Cherry
9 days ago
I agree with you, it does sound like D is the correct answer.
upvoted 0 times
...
Martha
13 days ago
I'm not sure, but I think it might be A, the user needs access to the Networks AND Log Sources to see a particular log in the activity tab.
upvoted 0 times
...
Desmond
1 months ago
No, I believe it's actually D, the log source must be included in the user's security profile and the profile needs its precedence set to Log Sources Only.
upvoted 0 times
...
Bette
1 months ago
I think it's B, the user's security profile must include that log source and have permission to Networks AND Log Sources.
upvoted 0 times
...
...
Candra
2 months ago
I'm not sure about that. I think it might be D) The log source must be included in the user's security profile and the profile needs its precedence set to Log Sources Only.
upvoted 0 times
...
Cecilia
2 months ago
I agree with Christiane. The user needs access to both Networks and Log Sources to see all events from a particular log source in the Log Activity tab.
upvoted 0 times
...
Johnetta
2 months ago
I think the correct answer is B. The user's security profile needs to include that specific log source, and the profile also needs permission to Networks AND Log Sources.
upvoted 0 times
...
Christiane
2 months ago
I think the answer is B) The user's security profile must include that log source, and the profile needs permission to Networks AND Log Sources.
upvoted 0 times
...

Save Cancel