s@lm@n IBM Exam M2150-768 IBM Security Sales Mastery Test v4 Version: 7.0 [ Total Questions: 62 ]



Similar documents
QRadar SIEM 6.3 Datasheet

Tivoli Endpoint Manager. Increasing the Business Value of IT, One Endpoint at a Time

FREQUENTLY ASKED QUESTIONS

IBM Endpoint Manager Product Introduction and Overview

Under the Hood of the IBM Threat Protection System

Ecom Infotech. Page 1 of 6

IBM Security QRadar Vulnerability Manager Version User Guide

Staying Ahead of the Cyber Security Game. Nigel Tan ASEAN Technical Leader IBM Security

Mobile, Cloud, Advanced Threats: A Unified Approach to Security

QRadar Security Intelligence Platform Appliances

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Safeguarding the cloud with IBM Dynamic Cloud Security

Reducing the cost and complexity of endpoint management

IBM Security QRadar Vulnerability Manager Version User Guide IBM

Do not forget the basics!!!!!

Security Intelligence

10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM)

Ragy Magdy Regional Channel Manager MEA IBM Security Systems

End-user Security Analytics Strengthens Protection with ArcSight

What is Security Intelligence?

IBM Security IBM Corporation IBM Corporation

Enterprise Security Solutions

Q1 Labs Corporate Overview

Endpoint protection for physical and virtual desktops

Modular Network Security. Tyler Carter, McAfee Network Security

Symantec Client Management Suite 8.0

Securing the mobile enterprise with IBM Security solutions

Replacing Microsoft Forefront Threat Management Gateway with F5 BIG-IP. Dennis de Leest Sr. Systems Engineer Netherlands

IBM Security QRadar Vulnerability Manager

MOBILITY & INTERCONNECTIVITY. Features SECURITY OF INFORMATION TECHNOLOGIES

Navigate Your Way to NERC Compliance

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

How to Choose the Right Security Information and Event Management (SIEM) Solution

Symantec Endpoint Protection

The Current State of Cyber Security

DMZ Gateways: Secret Weapons for Data Security

INFORMATION PROTECTED

IBM Security re-defines enterprise endpoint protection against advanced malware

IBM & Security Gov. Point Of Views

IT Security & Compliance. On Time. On Budget. On Demand.

Introduction to IBM Worklight Mobile Platform

Malware and Other Malicious Threats

場 次 :C-3 公 司 名 稱 :RSA, The Security Division of EMC 主 題 : 如 何 應 用 網 路 封 包 分 析 對 付 資 安 威 脅 主 講 人 :Jerry.Huang@rsa.com Sr. Technology Consultant GCR

Security Intelligence Services.

LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE

Leverage security intelligence for retail organizations

Trend Micro Cloud Security for Citrix CloudPlatform

IBM Security Briefing: Differentiators & Maturity Model

IBM Endpoint Manager for Mobile Devices

QRadar Security Management Appliances

LOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE

McAfee Network Security Platform

McAfee Endpoint Protection for SMB. You grow your business. We keep it secure.

Clavister InSight TM. Protecting Values

How To Achieve Pca Compliance With Redhat Enterprise Linux

Are You in Control? MaaS360 Control Service. Services > Overview MaaS360 Control Overview

Did you know your security solution can help with PCI compliance too?

RFI Template for Enterprise MDM Solutions

Log management & SIEM: QRadar Security Intelligence Platform

Endpoint protection for physical and virtual desktops

IBM InfoSphere Guardium Data Activity Monitor for Hadoop-based systems

Five Ways to Use Security Intelligence to Pass Your HIPAA Audit

Ubiquitous Computing, Pervasive Risk: Securely Deploy and Manage Enterprise Mobile Devices

Network Security and Vulnerability Assessment Solutions

Securing Privileges in the Cloud. A Clear View of Challenges, Solutions and Business Benefits

Trend Micro. Advanced Security Built for the Cloud

IBM Security QRadar QFlow Collector appliances for security intelligence

Jonas Vercruysse Technical Pre-sales February Endpoint Management IBM Corporation

Securing the endpoint and your data

isheriff CLOUD SECURITY

Safeguarding the cloud with IBM Security solutions

CA Host-Based Intrusion Prevention System r8.1

Secure Cloud Computing

IBM Security X-Force Threat Intelligence

The webinar will begin shortly

SECURE YOUR BUSINESS WHEREVER IT TAKES YOU. Protection Service for Business

COMPANY PRESENTATION SOLUTIONS

Symantec Mobile Management 7.2

Symantec IT Management Suite 7.5 powered by Altiris

Endpoint Security for DeltaV Systems

Addressing BYOD Challenges with ForeScout and Motorola Solutions

The ForeScout Difference

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

IBM Internet Security Systems

Privileged. Account Management. Accounts Discovery, Password Protection & Management. Overview. Privileged. Accounts Discovery

Cloud and Data Center Security

Threat Center. Real-time multi-level threat detection, analysis, and automated remediation

IBM Advanced Threat Protection Solution

WebSphere Integration Solutions. IBM Day Minsk Anton Litvinov WebSphere Connectivity Professional Central Eastern Europe

Secure Your Mobile Workplace

Top 10 Reasons Enterprises are Moving Security to the Cloud

Raytheon Oakley Systems

IBM s Mobile Enterprise Strategy IBM Corporation

IBM QRadar as a Service

Securing the Cloud infrastructure with IBM Dynamic Cloud Security

CrashPlan PRO Enterprise Backup

Cloud Based Secure Web Gateway

Transcription:

s@lm@n IBM Exam M2150-768 IBM Security Sales Mastery Test v4 Version: 7.0 [ Total Questions: 62 ]

Question No : 1 A single appliance to collect events and flow data, perform data correlation and rule matching, report alerts and provide admin capability is called: A. Flow processor. B. QFlow Collector. C. A Combined Flow/Event Appliance. D. An All-in-One. Answer: D Reference: ftp://public.dhe.ibm.com/software/ch/pdf/qradar/vormittag_slides.pdf (slide 23) Question No : 2 Which statement best explains the business value of IBM Endpoint manger (BigFix) to your customer? (The elevator pitch). A. IBM Endpoint Manager (BigFix) provides real-time visibility and control to help IT find and fix problems in minutes, across all endpoints. on and off the corporate network, compressing patch/inventory cycles to minutes/hours and ensuring continuous compliance. B. IBM Endpoint Manager (BigFix) provides real-time visibility and control to help IT find and fix problems fast using a single agent, console and server to manage over 150k endpoints. BigFix helps clients streamline processes, reduce infrastructure costs and ensure continuous compliance. C. IBM Endpoint Manager (BigFix) secures mobile devices and endpoints. Answer: B Question No : 3 IBM SAM for Mobile provides strong protection. When talking to clients about it, what might you want to work into the discussion? A. SAM for Mobile can save money for clients with DataPower appliances. B. SAM for Mobile appliances provide superior performance, TTV and TCO. C. SAM for Mobile integrates other key IBM security controls (e. g., Trusteer. WorkLight 2

and MaaS360) to enforce more informed policy-driven access. D. SAM for Mobile provides risk-/context-based access support that's critical for mobile endpoints outside the client's intranet. Answer: D IBM M2150-768 : Practice Test Question No : 4 Your client uses IBM DataPower (DP) appliances in their DMZ for detecting and mitigating XML-based threats. They're currently unhappy with their (non-ibm) web and mobile security solution(s). What should you do? A. Talk to them about Tivoli Security Policy Manager as a policy authoring tool and decision engine in support of the DP policy enforcement points. B. Talk to them about IBM SAM for DataPower. They can leverage their DataPower investment, adding web and enhanced mobile security to their DP appliances. C. Talk to them about IBM SAM for Mobile's ability to integrate with DataPower. D. Propose a replacement of their current Web and Mobile controls in their DMZ with IBM SAM for Web and Mobile appliances, with a SAM for Mobile policy server supporting the SAM and DP appliances in the DMZ. Question No : 5 What is a common z/os security vulnerability? A. Storage is not properly encrypted B. Network access points are not properly protected C. Too many users with the ability to circumvent controls D. System z does not have certifications for Common Critera or FIPS 140 Reference: https://www- 950.ibm.com/events/wwe/grp/grp004.nsf/vLookupPDFs/The%20Changing%20System%20 z%20threat%20landscape%20clement%2009-17- 2014%20AJN%20v2/$file/The%20Changing%20System%20z%20Threat%20Landscape% 20Clement%2009-17-2014%20AJN%20v2.pdf (page 7, see common security vulnerabilities) 3

Question No : 6 Trusteer Apex can block malicious communications from an endpoint infected with datastealing malware. When doing so, which function does it perform? A. Prevent the exploitation of known and zero-day vulnerabilities and stop drive-by downloads B. Detect and remove known advanced malware from mobile devices C. Prevent malware from compromising other processes and opening external communication channels D. Prevent leakage of sensitive information via email and USB drives Reference: http://www.ibm.com/developerworks/library/se-trusteer/ Question No : 7 The XGS Product Family consists of a number of different models. The XGS 7100 can protect up to which "inspected throughput" value? A. 800 Mbps B. 1.5Gbps C. 7Gbps D. 20Gbps Reference: http://www.draware.dk/fileadmin/ibm/netxgen_xgs/ibminfrastructuresec_oct2014 Netx Gen_.pdf (slide 21) Question No : 8 4

The organizations that receive the highest value from our endpoint management (BigFix) solution display which characteristic? A. Organizations with multiple locations, large quantity of remote or mobile computers or distributed servers. B. Multi-platform environments -desktops, laptops, servers, point-of-sale/embedded: Windows, UNIX, Linux, Mac, ios. Android. C. Compliance requirements -need to prove compliance with specific government regulations (e. D. HIPAA. PCI) and IT standards and policies: security compliance: license compliance, audits. D. All of the above Question No : 9 What key advantages does the QRadar Security Intelligence Platform offer over the competition? A. Provides a single UI, workflow, reporting and correlation platform for all QRadar products, now and into the future. B. Virtually every component of the QRadar platform is exposed via a robust set of APIs, allowing customers and partners to easily develop their own Security Intelligence applications. C. The QRadar platform runs on most major operating systems, easing deployment and reducing overall costs. D. QRadar itself is highly secure, and because its architecture is open, it has been certified by NIST and OASIS. Question No : 10 Which Guardium solution provides dynamic data masking capabilities? A. Guardium Data Encryption B. Guardium Database Activity Monitoring C. Guardium Vulnerability Assessment D. Guardium for Applications 5