Which of the following is a Tivoli Endpoint Management (TEM) package for IT Security?
A. Both A and C.
B. Endpoint Manager for Lifecycle Management.
C. Endpoint Manager for Patch Management.
D. Endpoint Manager for Core Protection.
正解:A
解説: (Pass4Test メンバーにのみ表示されます)
質問 2:
Which environments does IBM's full set of single sign-on solutions?
A. Web, federated and enterprise.
B. Key management, XACML access control rules and patch management.
C. Identity and Access Assurance, Security Management for z/OS and Data and Application Security
D. Identities, access control, z/OS security administration and data security.
正解:A
解説: (Pass4Test メンバーにのみ表示されます)
質問 3:
A client has IBM Security Desktop across their desktop clients, but not on the corporate endpoints. What is the best solution to propose if they are looking to consolidate vendors on the endpoint?
A. SELM service will enable the client to have appropriate logging without using on-site technology.
B. IBM Tivoli Endpoint Manager will be the natural evolution to extend the life of IBM Security Desktop.
C. IBM Security VSP, which will allow for virtualized protection, is the logical next technology.
D. Next Generation IPS is the best solution for long-term protection.
正解:B
解説: (Pass4Test メンバーにのみ表示されます)
質問 4:
What is the other main capability offered by Tivoli Federated Identity Manager, besides federated (cross-domain) single sign-on?
A. The ability to bring users from multiple domains into a single domain, with a "one push button" approach.
B. Identity propagation and consistent auditing in portal, Service-Oriented Architecture or Web Services scenarios.
C. Provisioning of user identities for more than the single domain use case.
D. Federated single sign-off.
正解:D
解説: (Pass4Test メンバーにのみ表示されます)
質問 5:
Why does the integration of network flow capture with behavioral analysis and anomaly detection provide greater security intelligence?
A. Network anomaly detection profiles user and system behavior and improves advanced threat protection.
B. Correlation of threat data, flow data and system and application vulnerabilities enhances incident analysis.
C. All of the above.
D. Traffic profiling adds protection from zero-day threats.
正解:C
解説: (Pass4Test メンバーにのみ表示されます)
質問 6:
Which one of the following describes the benefit of the "Monitor Database Activity" phase of the IBM's Holistic Approach to Data Security and Compliance?
A. Provide essential safeguards to protect high value databases across heterogeneous environments.
B. Automate detection of sensitive data and enterprise data relationships.
C. Manage and enforce privileges enterprise-wide.
D. All of the above.
正解:A
Shimizu -
短時間で答え終わって、今日結果がてて本当に合格になった。地味にすごいね。Pass4Testさんまたお世話になりたいとおもいます。