M2065-741IBMIBM i2 Intelligence Sales Mastery Test v2
lite' capabilities. D. None of the above Answer: C Explanation: Rich desktop and Thin Clients. QUESTION: 36 Which of the following are two (2) Cyber intelligence sweet spots? A. Impact analysis; Detection B. Attack tree development; Prevention C. Impact: Actor/team analysis D. Detection: Attack tree development Answer: Explanation: * Organizations must evolve, replacing traditional defensive security strategies with a proactive, intelligence-driven offense to prevent and disrupt these threats. * Documenting attacks in a form of attack trees. One of the most important problems in security analysis is the malefactors’ classification and model construction. Note: With the IBM i2 Enterprise Insight Analysis solution, organizations can proactively develop a comprehensive understanding of their attack surfaces and vulnerabilities and develop referenceable attack scenarios to help speed investigations and remediation. To prevent future attacks, organizations can identify and investigate B