You are on page 1of 12

8/14/23, 3:37 PM IBM Security Discover and Classify Level 2 Quiz: Attempt review

Started on Monday, August 14, 2023, 10:21 AM


State Finished
Completed on Monday, August 14, 2023, 11:37 AM Back Next

Time taken 1 hour 15 mins


Feedback Congratulations, you passed the IBM
Security Discover and Classify Level 2
Quiz!

Question 1

Correct

Points out of 1.00

A health insurer has a variety of products within its IT security


software portfolio. In order to maintain business context and
accuracy across all of these integration points, timely and
accurate data needs to be fed into the various systems. What
component of IBM Security Discover and Classify (ISDC) is
being continuously updated to allow an accurate depiction of
sensitive data across the environment?

ISDC data catalog 

QRadar

ISDC network adapter

ISDC processing engine

https://learn.ibm.com/mod/quiz/review.php?attempt=2543390&cmid=237708 1/12
8/14/23, 3:37 PM IBM Security Discover and Classify Level 2 Quiz: Attempt review

Question 2

Correct

Points out of 1.00


Back Next

You're in a client briefing and one of the attendees shares with


you the need to monitor sensitive data in their environment. As
you detail some success stories IBM clients have had with
ISDC, another attendee says, "The dba team does a good job
securing its DB's and performing vulnerability assessments"
What is the best way to respond to this comment?

Seeing as the DBA's are securing the databases everything


looks good

This is an opportunity to sell DB2

Ask about the discovery of unknown sensitive data. 

Unknown or dark data is difficult to protect and manage

There are cheaper solutions in the market which address


security

Question 3

Correct

Points out of 1.00

IBM Security Discover and Classify (ISDC) helps customers


discover and ultimately protect their data more efficiently as
they move their business to the cloud. Which task below is NOT
addressed by ISDC?

Reduces the overall compliance risk to the enterprise by


eliminating dark data

Masking sensitive data 

Centralize protection and visibility across siloed data to


manage data sprawl

Streamlining compliance and audit reporting

https://learn.ibm.com/mod/quiz/review.php?attempt=2543390&cmid=237708 2/12
8/14/23, 3:37 PM IBM Security Discover and Classify Level 2 Quiz: Attempt review

Question 4

Incorrect

Points out of 1.00


Back Next

Forward-looking companies are embracing change at an


accelerated pace. Part of that change includes digital
transformation and the move to cloud. This inevitably leads to
data chaos and sprawl. Data sprawl has introduced challenges
which include all but one of the following. Which of the
following is NOT a result of data sprawl?

A lack of visibility and control over sensitive data 

Partial redaction of sensitive data

Data silos

Dark Data

Question 5

Incorrect

Points out of 1.00

A client is concerned about unknown data on it's network. As


much as they are trying to reduce this risk with a competitive
discovery solution it is difficult to know where to point the tool
to begin the discovery and classification process. You eagerly
highlight that ISDC is able to intelligently discover data across
its network and not knowing exactly where to search is a
common issue with competing products. What is this limitation
with the competition called?

Full context

Full Coverage

Partial coverage

Point-in-time 

https://learn.ibm.com/mod/quiz/review.php?attempt=2543390&cmid=237708 3/12
8/14/23, 3:37 PM IBM Security Discover and Classify Level 2 Quiz: Attempt review

Question 6

Correct

Points out of 1.00


Back Next

Data security specialists in charge of compliance need to see


the risk-based data security posture across on-prem and cloud
environments. This will tell them how well the business
compliance initiatives are being supported and allow them to
communicate risk, security trends, and insights to the
leadership team. What type of solution could ISDC send alerts
to, assuming rogue credit cart data was found on the network?

Guardium Encryption

Guardium Vulnerability Assessment

Guardium Data Protection

A SIEM (Security Information Event Management) 

system

Question 7

Correct

Points out of 1.00

A global hospitality chain is facing new challenges as they


expand their operations worldwide. There is an increase in
guest information that is shared across systems. Since the
organization is subject to international data and privacy
regulations, it must know where all guest and employee data is
located at all times. Which security offering can discover and
track data transfer of it's guest information?

IBM Security Guardium Insights

IBM Security Discover and Classify 

IBM Security Guardium Data Protection

IBM Security Guardium Vulnerability Assessment

https://learn.ibm.com/mod/quiz/review.php?attempt=2543390&cmid=237708 4/12
8/14/23, 3:37 PM IBM Security Discover and Classify Level 2 Quiz: Attempt review

Question 8

Correct

Points out of 1.00


Back Next

A client tells you that they want to run periodic scans on the
company's network to find instances of unsecured sensitive
information. What IBM Security offering do you recommend to
address this need?

IBM Security Discover and Classify 

IBM Security Guardium Insights

IBM Security Guardium Encryption

IBM Security Guardium Data Protection

Question 9

Incorrect

Points out of 1.00

What is the sequence of steps during the ISDC discovery and


classification process?

Monitor network, Scan locations, Update catalog, Protect

Protect , Discover, Modify , Remediate

Monitor Network, Identify Data, Scan Locations,


Consolidate PII, Update Catalog

Discover, Protect, Classify, Protect 

Question 10

Correct

Points out of 1.00

What is the sequence of steps in the traditional fundamental


process of data security?

Extract , Transform , Analyze and Protect

Align, Cleanse, Manage, and Execute

Discover , Protect, Analyze , Respond , Comply 

Discover, Envision, Manage, and Deliver

https://learn.ibm.com/mod/quiz/review.php?attempt=2543390&cmid=237708 5/12
8/14/23, 3:37 PM IBM Security Discover and Classify Level 2 Quiz: Attempt review

Question 11

Incorrect

Points out of 1.00


Back Next

A CISO (Chief Information Security Officer) wants to implement


better discovery of data controls. The client currently uses
Guardium data protection and uses classification but believes
that ISDC (IBM Security Discover and Classify) is a good way
forward. Which of the following is the most compelling reason
to implement ISDC?

To discover sensitive data 

To leverage more advanced discovery capabilities

As a trusted advisor this is your recommendation

To see fewer people working on the discovery process

Question 12

Correct

Points out of 1.00

Which of the following questions should you ask to uncover IBM


Security Discover and Classify (ISDC) opportunities?

How are you meeting challenges around long-term data


storage requirements for compliance mandates?

What access controls do you have in place to prevent


unauthorized access, theft, or changes?

Do you know when new sensitive data enters your 

network?

How are your database administrators keeping up with


regulatory demands?

https://learn.ibm.com/mod/quiz/review.php?attempt=2543390&cmid=237708 6/12
8/14/23, 3:37 PM IBM Security Discover and Classify Level 2 Quiz: Attempt review

Question 13

Correct

Points out of 1.00


Back Next

Low quality PII (Personally Identifiable Information) data


contributes to the following challenge:

Accurate results

Continuous discovery

Full context

Partial coverage 

Question 14

Incorrect

Points out of 1.00

Competitors have followed traditional approaches for data


discovery. ISDC (IBM Security Discover and Classify) is more
advanced because it:

improves detection accuracy of data source 

vulnerabilities

reduces time spent on preparing for an audit

performs scans on known locations for sensitive data

performs automated continuous discovery

Question 15

Correct

Points out of 1.00

The main use cases of IBM Security Discover and Classify


(ISDC) are based on 3 areas. What are these 3 areas?

Identifying structured, unstructured and unknown data

Discovery, Classsification, Remediation

Privacy, Governance , Security 

CCPA, GDPR, PII

https://learn.ibm.com/mod/quiz/review.php?attempt=2543390&cmid=237708 7/12
8/14/23, 3:37 PM IBM Security Discover and Classify Level 2 Quiz: Attempt review

Question 16

Correct

Points out of 1.00


Back Next

Which one of the following is NOT a benefit of IBM discovery


and classification?

Address regulations with data catalog and alignment to


data subjects

Discover and classify all your sensitive data in all locations

Rules based policies for accessing sensitive data 

Understand data lineage and business context within your


data

Question 17

Correct

Points out of 1.00

Digital transformation and the shift to what has created a


perfect storm of data complexity?

IBM Discover and Classify

Data silos

Hybrid cloud 

AWS (Amazon Web Services)

https://learn.ibm.com/mod/quiz/review.php?attempt=2543390&cmid=237708 8/12
8/14/23, 3:37 PM IBM Security Discover and Classify Level 2 Quiz: Attempt review

Question 18

Correct

Points out of 1.00


Back Next

Many products that compete with IBM Discover and Classify


offer point in time data discovery. What is the problem with a
point in time approach?

There is no problem, it offers better control

The data results will be stale and not a true reflection of 


the risks in the environment

Point-in-time has a high error rate

It does not work in the cloud

Question 19

Correct

Points out of 1.00

A client mentions that IBM Security Discover and Classify


(ISDC) seems overly complex and they have been managing
security challenges using a custom approach of regex scripts.
They don’t want to hire more people and are wary of new
solutions that require large teams to manage. How would you
respond to this objection?

ISDC requires less headcount and less manual 

processing to achieve more accurate results than


competitors

Suggest that the client continues with it's current solution

ISDC has only been in the market for a short time and IBM
is improving it with each new release

The architecture is only complex if you do not have any


information security and data protection skills

https://learn.ibm.com/mod/quiz/review.php?attempt=2543390&cmid=237708 9/12
8/14/23, 3:37 PM IBM Security Discover and Classify Level 2 Quiz: Attempt review

Question 20

Correct

Points out of 1.00


Back Next

What kind of framework does IBM recommend when it comes


to understanding and securing complex data environments?

GDPR

COBIT

NIST

Zero Trust 

Question 21

Correct

Points out of 1.00

One of your retail clients implements Guardium Data Protection


(GDP) and uses GDP Classification. Which of the following use
cases does NOT warrant implementing BM Discover and
Classify?

To avoid the challenges of manually addressing false


positives

To classify structured and unstructured data on-prem and


in cloud

To benefit from next gen discovery and classification


techniques

Would like to exploit the power and flexibility of regular 


expressions

https://learn.ibm.com/mod/quiz/review.php?attempt=2543390&cmid=237708 10/12
8/14/23, 3:37 PM IBM Security Discover and Classify Level 2 Quiz: Attempt review

Question 22

Correct

Points out of 1.00


Back Next

Which of the following is NOT a key differentiator of IBM


Security Discover and Classify (ISDC)?

Based on Artificial intelligence and machine learning

Automated continuous discovery

Closed ecosystem of APIs and technology partnerships 


to restrict collaboration

Continually updated inventory

Question 23

Correct

Points out of 1.00

You are having an initial discovery conversation with a CISO


(Chief Information Security Officer) and want to position the
benefits of IBM Security Discover and Classify (ISDC). Which of
the following questions would you ask to uncover an ISDC
opportunity?

How often do the DBA's change the passwords for the


Employee database?

How are you meeting challenges around long-term data


storage requirements for compliance mandates?

How confident are you in the accuracy of your insights 

into data location and risk?

Is there a rules based access control policy on your


Personally Identifiable data?

https://learn.ibm.com/mod/quiz/review.php?attempt=2543390&cmid=237708 11/12
8/14/23, 3:37 PM IBM Security Discover and Classify Level 2 Quiz: Attempt review

Question 24

Correct

Points out of 1.00


Back Next

Which of the following is a characteristic of IBM Security


Discover and Classify (ISDC)?

Solutions which result in high rates of error when


discovering personally identifiable data

High false positives

Point in time solutions with data that is likely already stale

One solution to discover data in all locations including 

unknown locations

Question 25

Correct

Points out of 1.00

A client is looking to improve the discovery and classification


process they currently implement. A complaint that comes up is
one of poor data quality and results that are laden with errors.
This places a burden on the data cleansing team who need to
actually focus on their business intelligence and analytics
projects. You highlight the benefits of ISDC, especially in
producing highly accurate results and low error rates. What are
the risks of low accuracy and high error rates?

Frequent updates of the data catalog

Poor data cleansing

Better data cleansing

Inaccurate and poor decision making for the business 

https://learn.ibm.com/mod/quiz/review.php?attempt=2543390&cmid=237708 12/12

You might also like