New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

IBM C1000-156 Exam - Topic 8 Question 23 Discussion

Actual exam question for IBM's C1000-156 exam
Question #: 23
Topic #: 8
[All C1000-156 Questions]

What is the most restrictive permissions a user needs in order to see all of the events from a particular log source in the Log Activity tab?

Show Suggested Answer Hide Answer
Suggested Answer: D

If the option 'Include in my Dashboard' cannot be selected when creating a saved search in IBM QRadar SIEM V7.5, a possible reason is insufficient permissions. Here's why:

Permissions: The user needs appropriate permissions to add saved searches to the dashboard.

Role-Based Access Control: QRadar uses role-based access control to manage user permissions. The user's role must include the necessary privileges to modify dashboards.

Verification: Ensure that the user has the correct permissions assigned. This can be checked and adjusted in the user management settings.

Reference IBM QRadar SIEM administration guides explain the permissions required for various actions, including adding saved searches to dashboards, and how to configure user roles and permissions.


Contribute your Thoughts:

0/2000 characters
Latosha
3 months ago
I thought it was C at first, but B seems more accurate now.
upvoted 0 times
...
Jodi
4 months ago
A is definitely not it, you don’t need both Networks and Log Sources.
upvoted 0 times
...
Bethanie
4 months ago
Wait, are we sure about that? What if D is actually the right one?
upvoted 0 times
...
Diane
4 months ago
Totally agree, B makes the most sense here!
upvoted 0 times
...
Harrison
4 months ago
I think option B is correct. You need that log source in your profile.
upvoted 0 times
...
Billye
4 months ago
I’m leaning towards option B because it seems to cover both the log source and the necessary permissions, but I could be mixing it up with another question.
upvoted 0 times
...
Emilio
5 months ago
I feel like option D sounds familiar, but I can't recall if the precedence setting is really necessary for just viewing logs.
upvoted 0 times
...
Kirk
5 months ago
I remember a practice question that mentioned something about needing access to both Networks and Log Sources. That might be relevant here.
upvoted 0 times
...
Felice
5 months ago
I think the user needs to have their security profile include the specific log source, but I'm not sure if it also needs permissions for Networks.
upvoted 0 times
...
Lorean
5 months ago
I feel pretty confident about this one. The answer seems clear to me based on my understanding of the log activity permissions. I'll double-check, but I think I've got it.
upvoted 0 times
...
Launa
5 months ago
Alright, I've got a strategy here. I'll focus on the most restrictive permissions needed, and then match that to the options provided. Gotta be thorough on this one.
upvoted 0 times
...
Micaela
5 months ago
I'm a bit confused on this one. The wording is a bit tricky, and I want to make sure I understand the requirements fully before selecting an answer.
upvoted 0 times
...
Eric
5 months ago
Okay, let's see. I think the key here is understanding what permissions are required to view the log activity. I'll need to review the options closely.
upvoted 0 times
...
Stefania
5 months ago
Hmm, this seems like a tricky one. I'll need to think through the different permissions and access levels carefully.
upvoted 0 times
...
Estrella
11 months ago
Did someone say 'log source'? I thought this was a question about lumberjacking. Where's my axe?
upvoted 0 times
Judy
9 months ago
I'm pretty sure it's C) A user needs access to Flow Sources Only.
upvoted 0 times
...
Alyce
10 months ago
Actually, I think it's A) The user needs access to the Networks AND Log Sources to see a particular log in the activity tab.
upvoted 0 times
...
Ty
10 months ago
No, I believe it's D) The log source must be included in the user's security profile and the profile needs its precedence set to Log Sources Only.
upvoted 0 times
...
Sherita
10 months ago
I think the answer is B) The user's security profile must include that log source, and the profile needs permission to Networks AND Log Sources.
upvoted 0 times
...
...
Yvette
11 months ago
I'm going with B. It seems the most comprehensive and restrictive option, which is what the question is asking for.
upvoted 0 times
Celestine
10 months ago
Yeah, B covers all the bases for restricting access to the log source.
upvoted 0 times
...
Filiberto
10 months ago
I agree, B seems like the most secure option.
upvoted 0 times
...
...
France
11 months ago
Haha, C is definitely wrong. Flow Sources Only? That's like asking for a pizza with no cheese or toppings!
upvoted 0 times
...
Marshall
11 months ago
Hmm, I'm not sure about this one. I was thinking it might be D, since the log source has to be in the user's profile and the profile needs to be set to Log Sources Only.
upvoted 0 times
Cherry
10 months ago
I agree with you, it does sound like D is the correct answer.
upvoted 0 times
...
Martha
10 months ago
I'm not sure, but I think it might be A, the user needs access to the Networks AND Log Sources to see a particular log in the activity tab.
upvoted 0 times
...
Desmond
10 months ago
No, I believe it's actually D, the log source must be included in the user's security profile and the profile needs its precedence set to Log Sources Only.
upvoted 0 times
...
Bette
10 months ago
I think it's B, the user's security profile must include that log source and have permission to Networks AND Log Sources.
upvoted 0 times
...
...
Candra
11 months ago
I'm not sure about that. I think it might be D) The log source must be included in the user's security profile and the profile needs its precedence set to Log Sources Only.
upvoted 0 times
...
Cecilia
11 months ago
I agree with Christiane. The user needs access to both Networks and Log Sources to see all events from a particular log source in the Log Activity tab.
upvoted 0 times
...
Johnetta
11 months ago
I think the correct answer is B. The user's security profile needs to include that specific log source, and the profile also needs permission to Networks AND Log Sources.
upvoted 0 times
...
Christiane
11 months ago
I think the answer is B) The user's security profile must include that log source, and the profile needs permission to Networks AND Log Sources.
upvoted 0 times
...

Save Cancel