Alexandria University**We aren't endorsed by this school
Course
ACCOUNTING AAM99
Subject
Information Systems
Date
Dec 19, 2024
Pages
13
Uploaded by ConstableKnowledgeSnake80
Quiz [Guardium Suite L2]You must receive a score of 75% or higher on the quiz to completethe course.Started onFriday, December 20, 2024, 12:05 AMStateFinishedCompleted onFriday, December 20, 2024, 12:15 AMTime taken9 mins 45 secsFeedbackCongratulations, you passed the quiz!Question 1CorrectPoints out of 1.00Question 2CorrectPoints out of 1.00A client wants to monitor its cloud infrastructure and has 200CPU cores allocated to their cloud environment. How manyresource units would be required for Guardium Insights?2000 resource units10 resource units200 resource units7200 resource unitsWhich of the following is NOTincluded in Guardium Package?Guardium InsightsGuardium Data ProtectionDiscover and ClassifyGuardium Vulnerability AssessmentBackNext12/20/24, 7:16 AMQuiz [Guardium Suite L2]: Attempt reviewhttps://learn.ibm.com/mod/quiz/review.php?attempt=3619281&cmid=2924691/13
Question 3CorrectPoints out of 1.00Question 4CorrectPoints out of 1.00Which 2 of the following characteristics highlight an adaptivedata security program?Threat hunting, Accelerate responseComply, ProtectDeploy anywhere, Protect data at rest and in motionDiscover, AnalyzeDuring a meeting with a client security team, you decide toelaborate on how Guardium differentiates itself. Whichcharacteristic of Guardium do you mention to showcase thesolution?Developed and built by a team in Littleton, MassachusettsPowered by WatsonxCheapSimplified Compliance, Auditing, and ReportingBackNext12/20/24, 7:16 AMQuiz [Guardium Suite L2]: Attempt reviewhttps://learn.ibm.com/mod/quiz/review.php?attempt=3619281&cmid=2924692/13
Question 5CorrectPoints out of 1.00Question 6CorrectPoints out of 1.00Previously, QRadar SOAR and QRadar SOAR Breach Responsewas also included within the Guardium Package. After whatdate will customers not be able to apply purchased RU'stowards Soar and Breach Response?October 31st, 2024January 1st, 2023January 1st, 2024October 31st, 2023Guardium Package is a commercial bundle which includes 3powerful products. What are these products?Guardium Data Protection, Guardium Key LifecycleManager, Guardium Data EncryptionGuardium Data Protection, Guardium Key LifecycleManager, Vulnerability AssessmentGuardium Data Protection, Guardium Insights,Vulnerability AssessmentGuardium Data Protection, Discover and Classify,Guardium Data EncryptionBackNext12/20/24, 7:16 AMQuiz [Guardium Suite L2]: Attempt reviewhttps://learn.ibm.com/mod/quiz/review.php?attempt=3619281&cmid=2924693/13
Question 7CorrectPoints out of 1.00Question 8CorrectPoints out of 1.00Which of the following options is the best description ofGuardium Insights?Federated search allows you to search data in the cloudor on premises in a single, unified wayBy using a unique approach that monitors operatingsystems from the outside, organizations can now avoidmanipulation or interference by adversariesProvides access to health dashboards to easily viewthe health of Guardium Data Protection centralmanagers and agentsBy using an elastic security data lake, analysts can nowperform analytics on terabytes of data with greater speedand efficiencyThere are three elements describing how Guardium isuniquely positioned in its zero trust approach to data security.Which one of these is NOT one of them?ComplexConnectedIntelligentAdaptiveBackNext12/20/24, 7:16 AMQuiz [Guardium Suite L2]: Attempt reviewhttps://learn.ibm.com/mod/quiz/review.php?attempt=3619281&cmid=2924694/13
Question 9CorrectPoints out of 1.00Question 10CorrectPoints out of 1.00As companies modernize IT and move to hybrid cloudenvironments, their data footprint is expanding. What is therisk of an expanding data footprint?It creates a bigger attack surface for hackers to exploitOrphan keysIt creates too many silosA bigger data footprint means more budget requirementsfor offline storageBusiness priorities are driving digital transformation and thesuccess of forward thinking companies is dependent on oneuniversal non-negotiable requirement. What is thisrequirement?Digital transparencyThe ability to predict the needs of cloud-first clientsArtificial intelligenceCybersecurityBackNext12/20/24, 7:16 AMQuiz [Guardium Suite L2]: Attempt reviewhttps://learn.ibm.com/mod/quiz/review.php?attempt=3619281&cmid=2924695/13
Question 11CorrectPoints out of 1.00Question 12CorrectPoints out of 1.00Question 13CorrectPoints out of 1.00Which product is the flagship of the Guardium portfolio?Vulnerability AssessmentGuardium Data ProtectionGuardium Data EncryptionGuardium InsightsWhat key activity does Guardium Data Protection monitor?The number of vulnerability scans performed per hourUser ActivitySQL query execution timeZero day exploitsWhich one of the following is NOT a feature benefit ofGuardium Data Protection?Uncover and respond to threats in real-timeHarden your infrastructure with vulnerability scansUse pre-built templates to accelerate your compliancejourneyThe lockdown of endpoint devicesBackNext12/20/24, 7:16 AMQuiz [Guardium Suite L2]: Attempt reviewhttps://learn.ibm.com/mod/quiz/review.php?attempt=3619281&cmid=2924696/13
Question 14CorrectPoints out of 1.00Question 15CorrectPoints out of 1.00Cloud expansion, especially in the digitally transformativehybrid multi-cloud, is plagued by what?HackersEthicsPoor planningData and tool sprawlYou are presenting the benefits of Guardium and the client hasconcerns about whether a realtime data breach on theirdatabase can be effectively stopped, especially when a SQLQuery rule is triggered and data is in-flight. What product inthe Guardium package offers real-time data protection viablocking and redaction with agents to stop potential threats assoon as they are identified?Guardium InsightsGuardium Data EncryptionGuardium Key Lifecycle ManagerGuardium Data ProtectionBackNext12/20/24, 7:16 AMQuiz [Guardium Suite L2]: Attempt reviewhttps://learn.ibm.com/mod/quiz/review.php?attempt=3619281&cmid=2924697/13
Question 16IncorrectPoints out of 1.00Question 17CorrectPoints out of 1.00A client wants to monitor its cloud infrastructure and has 200CPU cores allocated to their cloud environment. How manyresource units would be required for Guardium DataProtection?20 000 resource units360 resource units7200 resource units2000 resource UnitsOne of the ways in which Guardium Data Protectiondifferentiates itself from the competition is through proactivesecurity controls. Which of the following is an example of thistype of security control?Enhance mobile growth with real-time accurate devicehygiene and session risk assessmentOutsmart account takeover attempts with AI, behavioralbiometrics and machine learningCentrally define and manage data access policies forusers and groupsPower digital transformations by seamlessly assessingthe risk of new and guest digital identitiesBackNext12/20/24, 7:16 AMQuiz [Guardium Suite L2]: Attempt reviewhttps://learn.ibm.com/mod/quiz/review.php?attempt=3619281&cmid=2924698/13
Question 18CorrectPoints out of 1.00Question 19CorrectPoints out of 1.00When pricing Guardium Package, what pricing metrics areavailable?Managed Virtual Servers (MVS) and Virtual PrivateCoud (VPC) pricingResource Value Unit (RVU)Seat basedNamed userDuring your presentation to a client, the CISO asks howGuardium is uniquely positioned to address key data securitychallenges with a modern approach to secure a complexhybrid multicloud world. What three elements do youmention?Analyze, Respond, ComplyGuardium Data Protection, Discover and Classify,Guardium Data EncryptionDiscover, Protect, AnalyzeIntelligent, Adaptive, ConnectedBackNext12/20/24, 7:16 AMQuiz [Guardium Suite L2]: Attempt reviewhttps://learn.ibm.com/mod/quiz/review.php?attempt=3619281&cmid=2924699/13
Question 20CorrectPoints out of 1.00Question 21CorrectPoints out of 1.00This product automatically scans for known weaknesses andidentifies exposures such as missing patches, weakpasswords, unauthorized changes, and misconfiguredprivileges. Which product below does this describe?Guardium SoarGuardium CentcomQRadar SuiteGuardium Vulnerability AssessmentWhich of the following is NOTa challenge to the traditionalapproach of identifying insider threats?Insider threat detection response is manualStatic protection policies become less effective over timeInsider threat detection is limited to known bad actorsTraditional perimeter security has proven effectiveagainst insider threatsBackNext12/20/24, 7:16 AMQuiz [Guardium Suite L2]: Attempt reviewhttps://learn.ibm.com/mod/quiz/review.php?attempt=3619281&cmid=29246910/13
Question 22IncorrectPoints out of 1.00Question 23CorrectPoints out of 1.00Understanding risk at a glance, automating threat hunting,using risk results to prioritize investigation, and stoppingthreats in real time are all benefits of Guardium. Which one ofthe three characteristics of modern data security principles dothese benefits highlight?AdaptiveAdaptive, Connected, IntelligentConnectedIntelligentWhen describing a modern data security approach, whatwould be an element of being "Connected"?Mesh networkingShare actionable insightsDiscover unknown dataEthernet connectivityBackNext12/20/24, 7:16 AMQuiz [Guardium Suite L2]: Attempt reviewhttps://learn.ibm.com/mod/quiz/review.php?attempt=3619281&cmid=29246911/13
Question 24CorrectPoints out of 1.00A client asks if IBM Guardium Data Protection has any out ofthe box content to help them automate compliance. How doyou respond?Pre-built templates are available at extra costGuardium Data protection does not focus on meetingregulatory compliance mandatesPre-built templates are not available but the Guardiumreport builder is intuitive and creating these reportsshould not take longYou can quickly meet regulatory compliance by usingGuardium Data Protection to uncover regulated data inyour data stores and generate reports using pre-builttemplates for industry mandated financial and healthregulationsBackNext12/20/24, 7:16 AMQuiz [Guardium Suite L2]: Attempt reviewhttps://learn.ibm.com/mod/quiz/review.php?attempt=3619281&cmid=29246912/13
Question 25CorrectPoints out of 1.00A client of yours has implemented Guardium Data protectionand you are highlighting how Guardium Insights cansupercharge this investment. What are the the benefits thatGuardium Insights will add?Use automated, turnkey solutions to discover, control andaudit privileged access across your enterprise. Enforceleast privilege security and centrally manage passwordsin hybrid multicloud or on-prem environmentsProvision, audit and report on user access and activitythrough lifecycle, compliance and identity analyticscapabilities. Find violators quickly by using a business-activity or separation-of-duties (SoD) risk model in an on-prem solutionFree up computing resources, decrease data eventstorage, reduce time spent on preparing audits,reduce the number of collectorsAccess AI-powered, risk-based authentication and moreadvanced features that can be deployed as multi-tenantSaaS in an IBM Cloud center or as single-tenant dedicatedfor certain residency requirementsBackNext12/20/24, 7:16 AMQuiz [Guardium Suite L2]: Attempt reviewhttps://learn.ibm.com/mod/quiz/review.php?attempt=3619281&cmid=29246913/13