Answer A NO17 Which IBM Security solution is part of IBMs integrated approach

Answer a no17 which ibm security solution is part of

This preview shows page 5 - 7 out of 10 pages.

Answer: A NO.17 Which IBM Security solution is part of IBM's integrated approach against insider threats for the Financial Services Sector (FSS)? A. IBM Watson Analytics B. IBM Security AppScan Enterprise C. IBM Security Key Lifecycle Manager D. IBM Security Guardium Data Protection for Databases Answer: A NO.18 One of the most important use cases in the IBM Information, Risk and Protection (IRP) domain is protecting your clients "crown jewels" or "most critical assets". What does this refer to? A. Data B. Endpoints C. Employees D. Applications Answer: B NO.19 What three characteristics differentiate the IBM Security Immune System? A. It is open, integrated and orchestrated. B. It focuses on cloud, cognitive, and network security. C. It is built around perimeter controls, cloud security, and fraud prevention. D. It has unique detection, incident response and attack blocking capabilities. Answer: C NO.20 Which IBM Security Services channel programs offer an annual revenue stream, typically on a IT Certification Guaranteed, The Easy Way! 5
Image of page 5
3-year basis? A. Security Operations Center (SOC) design, build, and test B. Consulting services such as assessment and testing services C. Managed security services such as firewall or SIEM management D. Product professional services such as product installation and integration Answer: C NO.21 What is the recommended action when a customer asserts that all of IBM's Cloud Identity Service (CIS) customers are large businesses? A. Indicate that CIS includes 4 subscription packages to cover clients of all sizes. B. Indicate that IBM also has Cloud Identity Connect for small and medium businesses. C. Move the focus of the discussion to how an IBM Security Access Manager (ISAM) appliance can save significant costs. D. Move the focus of the discussion to IBM Security Identity and Access Assurance, which addresses all identity and access management (1AM) requirements and includes QRadar Log Manager. Answer: C NO.22 What are the security tasks that the IBM Information. Risk and Protection (IRP) solutions focus on? A. Identify risks, gain control, and safeguard interactions B. Identify data loss, provide threat intelligence, and prevent SQL injection C. Mitigate threats, identify viruses, and perform predictive analytics D. Perform predictive analytics, detect mobile threats, and provide threat intelligence Answer: A NO.23 What unique IBM Security Services capabilities can Business Partners bring to their clients through the partner program? A. 1st, 2nd, and 3rd level support B. Threat research and penetration testing C. Co-branded marketing and customer billing D. Globally integrated Security Operation Centers (SOCs) and Threat Protection Platform Answer: D NO.24 Which IBM differentiator in the left column aligns to a supporting example in the right column?
Image of page 6
Image of page 7

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture