You are on page 1of 14

Started on Tuesday, March 19, 2024, 9:27 AM

State Finished
Completed on Tuesday, March 19, 2024, 9:58 AM
Time taken 30 mins 53 secs Back Next
Feedback Congratulations, you passed the quiz!

Question 1

Correct

Points out of 1.00

When pricing Guardium Package, what pricing metrics are


available?

Named user

Resource Value Unit (RVU)

Managed Virtual Servers (MVS) and Virtual Private 


Coud (VPC) pricing

Seat based
Question 2

Correct

Points out of 1.00

Back Next

Which of the following options is the best description of


Guardium Insights?

By using an elastic security data lake, analysts can now


perform analytics on terabytes of data with greater speed
and efficiency

By using a unique approach that monitors operating


systems from the outside, organizations can now avoid
manipulation or interference by adversaries
Federated search allows you to search data in the cloud
or on premises in a single, unified way

Provides access to health dashboards to easily view 


the health of Guardium Data Protection central
managers and agents

Question 3

Correct

Points out of 1.00

Business priorities are driving digital transformation and the


success of forward thinking companies is dependent on one
universal non-negotiable requirement. What is this
requirement?

The ability to predict the needs of cloud-first clients

Artificial intelligence

Digital transparency
Cybersecurity 
Question 4

Correct

Points out of 1.00

Back Next

During a meeting with a client security team, you decide to


elaborate on how Guardium differentiates itself. Which
characteristic of Guardium do you mention to showcase the
solution?

Powered by Watsonx

Simplified Compliance, Auditing, and Reporting 


Cheap

Developed and built by a team in Littleton, Massachusetts

Question 5

Correct

Points out of 1.00

Previously, QRadar SOAR and QRadar SOAR Breach Response


was also included within the Guardium Package. After what
date will customers not be able to apply purchased RU's
towards Soar and Breach Response?

October 31st, 2024


January 1st, 2023

January 1st, 2024

October 31st, 2023 


Question 6

Correct

Points out of 1.00

Back Next

During your presentation to a client, the CISO asks how


Guardium is uniquely positioned to address key data security
challenges with a modern approach to secure a complex
hybrid multicloud world. What three elements do you
mention?

Guardium Data Protection, Discover and Classify,


Guardium Data Encryption

Analyze, Respond, Comply

Discover, Protect, Analyze

Intelligent, Adaptive, Connected 

Question 7

Correct

Points out of 1.00

A client wants to monitor its cloud infrastructure and has 200


CPU cores allocated to their cloud environment. How many
resource units would be required for Guardium Insights?

200 resource units


2000 resource units 

10 resource units

7200 resource units


Question 8

Incorrect

Points out of 1.00

Back Next

A client wants to monitor its cloud infrastructure and has 200


CPU cores allocated to their cloud environment. How many
resource units would be required for Guardium Data
Protection?

20 000 resource units 

2000 resource Units


360 resource units

7200 resource units

Question 9

Correct

Points out of 1.00

There are three elements describing how Guardium is


uniquely positioned in its zero trust approach to data security.
Which one of these is NOT one of them?

Intelligent

Complex 

Connected

Adaptive
Question 10

Correct

Points out of 1.00

Back Next

Which one of the following is NOT a feature benefit of


Guardium Data Protection?

The lockdown of endpoint devices 

Uncover and respond to threats in real-time

Use pre-built templates to accelerate your compliance


journey
Harden your infrastructure with vulnerability scans

Question 11

Correct

Points out of 1.00

When describing a modern data security approach, what


would be an element of being "Connected"?

Mesh networking

Discover unknown data

Ethernet connectivity

Share actionable insights 


Question 12

Correct

Points out of 1.00

Back Next

Which of the following is NOT a challenge to the traditional


approach of identifying insider threats?

Insider threat detection is limited to known bad actors

Static protection policies become less effective over time

Insider threat detection response is manual

Traditional perimeter security has proven effective 


against insider threats

Question 13

Correct

Points out of 1.00

What key activity does Guardium Data Protection monitor?

Zero day exploits

User Activity 

The number of vulnerability scans performed per hour

SQL query execution time


Question 14

Correct

Points out of 1.00

Back Next

Cloud expansion, especially in the digitally transformative


hybrid multi-cloud, is plagued by what?

Ethics

Poor planning

Data and tool sprawl 

Hackers

Question 15

Correct

Points out of 1.00

A client asks if IBM Guardium Data Protection has any out of


the box content to help them automate compliance. How do
you respond?

Pre-built templates are not available but the Guardium


report builder is intuitive and creating these reports
should not take long

Guardium Data protection does not focus on meeting


regulatory compliance mandates

You can quickly meet regulatory compliance by using 


Guardium Data Protection to uncover regulated data in
your data stores and generate reports using pre-built
templates for industry mandated financial and health
regulations

Pre-built templates are available at extra cost


Question 16

Correct

Points out of 1.00

Back Next

You are presenting the benefits of Guardium and the client has
concerns about whether a realtime data breach on their
database can be effectively stopped, especially when a SQL
Query rule is triggered and data is in-flight. What product in
the Guardium package offers real-time data protection via
blocking and redaction with agents to stop potential threats as
soon as they are identified?

Guardium Data Encryption

Guardium Key Lifecycle Manager

Guardium Data Protection 

Guardium Insights
Question 17

Correct

Points out of 1.00

Back Next

A client of yours has implemented Guardium Data protection


and you are highlighting how Guardium Insights can
supercharge this investment. What are the the benefits that
Guardium Insights will add?

Free up computing resources, decrease data event 


storage, reduce time spent on preparing audits,
reduce the number of collectors

Access AI-powered, risk-based authentication and more


advanced features that can be deployed as multi-tenant
SaaS in an IBM Cloud center or as single-tenant dedicated
for certain residency requirements

Use automated, turnkey solutions to discover, control and


audit privileged access across your enterprise. Enforce
least privilege security and centrally manage passwords
in hybrid multicloud or on-prem environments

Provision, audit and report on user access and activity


through lifecycle, compliance and identity analytics
capabilities. Find violators quickly by using a business-
activity or separation-of-duties (SoD) risk model in an on-
prem solution

Question 18

Correct

Points out of 1.00

Which product is the flagship of the Guardium portfolio?

Vulnerability Assessment

Guardium Insights
Guardium Data Protection 

Guardium Data Encryption


Question 19

Correct

Points out of 1.00

Back Next

This product automatically scans for known weaknesses and


identifies exposures such as missing patches, weak
passwords, unauthorized changes, and misconfigured
privileges. Which product below does this describe?

QRadar Suite
Guardium Centcom

Guardium Vulnerability Assessment 

Guardium Soar

Question 20

Correct

Points out of 1.00

As companies modernize IT and move to hybrid cloud


environments, their data footprint is expanding. What is the
risk of an expanding data footprint?

Orphan keys

A bigger data footprint means more budget requirements


for offline storage

It creates a bigger attack surface for hackers to exploit 


It creates too many silos
Question 21

Correct

Points out of 1.00

Back Next

Guardium Package is a commercial bundle which includes 3


powerful products. What are these products?

Guardium Data Protection, Guardium Key Lifecycle


Manager, Vulnerability Assessment

Guardium Data Protection, Guardium Key Lifecycle


Manager, Guardium Data Encryption
Guardium Data Protection, Guardium Insights, 
Vulnerability Assessment
Guardium Data Protection, Discover and Classify,
Guardium Data Encryption

Question 22

Correct

Points out of 1.00

One of the ways in which Guardium Data Protection


differentiates itself from the competition is through proactive
security controls. Which of the following is an example of this
type of security control?

Enhance mobile growth with real-time accurate device


hygiene and session risk assessment
Power digital transformations by seamlessly assessing
the risk of new and guest digital identities

Centrally define and manage data access policies for 


users and groups

Outsmart account takeover attempts with AI, behavioral


biometrics and machine learning
Question 23

Correct

Points out of 1.00

Back Next

Which 2 of the following characteristics highlight an adaptive


data security program?

Deploy anywhere, Protect data at rest and in motion 


Comply, Protect
Discover, Analyze

Threat hunting, Accelerate response

Question 24

Correct

Points out of 1.00

Understanding risk at a glance, automating threat hunting,


using risk results to prioritize investigation, and stopping
threats in real time are all benefits of Guardium. Which one of
the three characteristics of modern data security principles do
these benefits highlight?

Connected
Adaptive, Connected, Intelligent

Intelligent 
Adaptive
Question 25

Correct

Points out of 1.00

Back Next

Which of the following is NOT included in Guardium Package?

Guardium Vulnerability Assessment

Discover and Classify 


Guardium Data Protection

Guardium Insights

You might also like