Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

IBM Exam C1000-156 Topic 8 Question 23 Discussion

Actual exam question for IBM's C1000-156 exam
Question #: 23
Topic #: 8
[All C1000-156 Questions]

What is the most restrictive permissions a user needs in order to see all of the events from a particular log source in the Log Activity tab?

Show Suggested Answer Hide Answer
Suggested Answer: D

If the option 'Include in my Dashboard' cannot be selected when creating a saved search in IBM QRadar SIEM V7.5, a possible reason is insufficient permissions. Here's why:

Permissions: The user needs appropriate permissions to add saved searches to the dashboard.

Role-Based Access Control: QRadar uses role-based access control to manage user permissions. The user's role must include the necessary privileges to modify dashboards.

Verification: Ensure that the user has the correct permissions assigned. This can be checked and adjusted in the user management settings.

Reference IBM QRadar SIEM administration guides explain the permissions required for various actions, including adding saved searches to dashboards, and how to configure user roles and permissions.


Contribute your Thoughts:

Yvette
10 hours ago
I'm going with B. It seems the most comprehensive and restrictive option, which is what the question is asking for.
upvoted 0 times
...
France
3 days ago
Haha, C is definitely wrong. Flow Sources Only? That's like asking for a pizza with no cheese or toppings!
upvoted 0 times
...
Marshall
4 days ago
Hmm, I'm not sure about this one. I was thinking it might be D, since the log source has to be in the user's profile and the profile needs to be set to Log Sources Only.
upvoted 0 times
...
Candra
6 days ago
I'm not sure about that. I think it might be D) The log source must be included in the user's security profile and the profile needs its precedence set to Log Sources Only.
upvoted 0 times
...
Cecilia
7 days ago
I agree with Christiane. The user needs access to both Networks and Log Sources to see all events from a particular log source in the Log Activity tab.
upvoted 0 times
...
Johnetta
7 days ago
I think the correct answer is B. The user's security profile needs to include that specific log source, and the profile also needs permission to Networks AND Log Sources.
upvoted 0 times
...
Christiane
14 days ago
I think the answer is B) The user's security profile must include that log source, and the profile needs permission to Networks AND Log Sources.
upvoted 0 times
...

Save Cancel