IT인증,IT자격증,IT자격증시험,IT인증시험

http://www.pass4test.net/

IBM M2150-662 시험대비덤프공부

Pass4Test 에서 출시한 제품 IBM M2150-662 (IBM Security Systems Sales Mastery Test v2) 시험덤프는 고득점으로 시험을 통과한 많은 분들이 검증한 완벽한 시험공부자료입니다. IT업계에 몇십년간 종사한 전문가들의 경험과 노하우로 제작된  IBM M2150-662 (IBM Security Systems Sales Mastery Test v2) 덤프는 실제 시험문제에 대비하여 시험유형과 똑같은 유형의 문제가 포함되어있습니다.시험 불합격시 불합격성적표로 덤프비용환불신청을 약속드리기에 아무런 우려없이 덤프를 구매하여 공부하시면 됩니다.

 

NO.1 Which of the following best describes QRadar Network Anomaly Detection (QNAD)?
A. QNAD is a stand-alone appliance that allows the identification of anomalies on the network.
B. QNAD feeds information about the network traffic to Site Protector.
C. QNAD is an optimized version of QRadar which complements SiteProtector to optimize network
protection.
D. QNAD identifies anomalies out of the information it imports from SiteProtector.
Answer: C
Reference: PCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
URL:
http://www.slideshare.net/IBMDK/pcty-2012-threat-landscape-and-security-intelligence-vmichael-a
ndersson (slide 38)

NO.2 Which of the following is a key benefit & feature of data protection add-on?
A. Out-of-the-box compliance templates to detect credit card numbers, social security numbers,
among other sensitive data.
B. Continuous compliance to detect loss of credit card numbers, social security numbers, among
other sensitive data.
C. Patch Management to reduce the risk of data loss due to open vulnerabilities.
D. All of the above.
Answer: B
Explanation:
* IBM Endpoint Manager for Core Protection Data Protection Add-on The optional IBM Endpoint
Manager for Core Protection Data Protection Add-on can be deployed and managed through the
IBM Tivoli Endpoint Manager infrastructure. The module also helps improve data protection
capabilities while helping to control operational costs. IBM Endpoint Manager for Core Protection
Data Protection Add-on offers a robust data loss prevention and device control solution that
integrates into the anti-virus and anti-malware capabilities provided by the Core Protection solution
and can:
/ Secure data (sensitive or not) on devices that leave the business premises / Enforce security
policies such that users can access sensitive data for their jobs, but not misuse or lose that data /
Comply with the growing number of data privacy laws that affect the industry or company
Reference: IBM Endpoint Manager for Core Protection Data Protection Add-on
6. Once IBM Security Virtual Server Protection (VSP) for VMware is deployed, is there still need
for other security solutions in the virtualized servers?
A. Yes there is because VSP cannot monitor host-based events (e.g. file integrity).
B. Yes there is because VSP does not monitor all traffic in the hypervisor.
C. No there is not because VSP does monitor all traffic in the hypervisor.
D. No there is not because VSP offers several layers of security.
Answer: D

NO.3 Which of the following actions can be taken with Tivoli Endpoint Manager for Mobile Device
Manager?
A. Power Management.
B. Patch distribution.
C. Disable iCloud sync.
D. All of the above.
Answer: C
Explanation:
Endpoint Manager for Mobile Devices *Enable PW Policies *Enable Device Encryption *Force
encrypted backup *(C) Disable Sync *Corporate Access, email access, and App access contingent on
Policy Compliance! *Wipe if lost / stolen
* Wipe corporate data if employee leaves company (selective wipe)

NO.4 With Tivoli Federated Identity Manager, which of the following customer scenarios is to be
addressed?
A. The provisioning of identities to more than one domain or company.
B. Strict management of privileged users' identities to absolutely ensure there is no unauthorized
sharing of their identities.
C. Cross-domain single sign-on, whether the requester is an external user or an internal employee.
D. Strong authentication requirements for any configuration.
Answer: C
Explanation:
IBM Tivoli Access Manager for e-business Key features include: Provide a base for the federation of
user identities. For standardized cross-domain authentication (federation), Tivoli Access Manager
for e-business customers can upgrade to Tivoli Federated Identity Manager - a modular access
control solution for cross-domain single sign-on.
Reference: IBM Tivoli Identity and Access Manager V1.0 and IBM Tivoli Unified Single Sign-On V1.0

NO.5 You are in a competitive user management/identity management/ user provisioning sale, and
the decision seems to hinge on who has the superior role management capabilities. How do you
handle this?
A. Expand the discussion to include access management and pull TAMeb into the sale.
B. Expand the discussion to include enterprise audit management and compliance and pull TSIEM
into the sale.
C. Bring Tivoli Provisioning Role Manager into the picture.
D. Tout TIM's significant role management capabilities and emphasize the fact that TIM comes with
Role and Policy Modeling in the package, whereas competitors charge extra for it.
Answer: D
Explanation:
Note:
*IBM Tivoli Identity Manager V5.1 helps you simplify and reduce cost of
administration:
/ Role modeling and mining helps facilitate the quick building of an effective role
and access structure from a business centric approach.
*Tivoli Identity Manager also provides:
A dynamic policy management engine that automates user provisioning and aids
in compliance efforts.
*IBM Tivoli Identity Manager V5.1 is an automated and policy-based solution
that manages user access across IT environments.
*IBM Tivoli Identity Manager, also known as TIM, is an Identity Management System product from
IBM.
TIM provides centralized identity lifecycle management. It can automatically create, manage, and
delete user access to various system resources such as files, servers, applications, and more
based on job roles or requests.

 
Posted 2014/3/5 6:32:21  |  Category: 미분류  |  Tag: