A client is implementing the project of virtualization of their server farms and feels quite confident that thanks to this technology, the company's Security stance will be improved What is the best argument to bring to the table to show the customer that this is not the case?
A. Explain how the ESX management platform is the 'key to the castle".
B. Explain how rootkits can install on the hardware and virtual network cards of the virtualization server.
C. Explain that the hypervisor is not the single point of failure of the virtualized infrastructure.
D. Explain that the threats to the virtualized servers remain and that new ones are added by having additional components.
正解:C
質問 2:
The IBM Security product line provides partners and clients with a complete platform of preemptive Security protection for the organization's entire IT infrastructure. What best describes the range of protection provided by these solutions?
A. From the network gateway to the desktop.
B. From the inside to the outside of the network.
C. From the application to the core of the infrastructure.
D. From the authentication to the termination of the session.
正解:A
質問 3:
Which of the following statements about IBM Security Management SiteProtector is true?
A. Offers a scalable solution designed to help you control, monitor, analyze, and report on your enterprise security posture through multiple consoles.
B. Reduces the costs and complexity of security management through central control of diverse network and host security devices.
C. Excellent at managing IBM Security appliances and technology but cannot manage third party devices.
D. Includes a policy deployment option to help you quickly extend and apply policies to one device at a time.
正解:B
質問 4:
A client needs consulting services for a current installation of IBM Security products. What action should the seller take?
A. Offer the client a free 30-day trial period for Enterprise Scanner in order to scan the hosts and identify vulnerabilities
B. Have the IBM Security Sales Representative request a three-way meeting involving the customer, a System Engineer, and a technical team member to gather information about the scope and provide accurate information.
C. Download relevant case studies and reference material from PartnerWorld and forward the information to the customer.
D. Send the customer a proposal from another account that shows similar requirements and explain the similarities to the customer.
正解:B
質問 5:
Which three areas of the IBM Security Framework are mainly covered by the legacy Tivoli products?
A. Application and Process, Network Server and End Point, Physical Infrastructure.
B. Data and Information, Application and Process, Network Server and End Point.
C. People and Identity, Data and Information. Network Server and End Point
D. People and Identity, Data and Information, Application and Process.
正解:D