Exam4Training

IBM M2150-860 Sales Foundations for IBM Security V1 Online Training

Question #1

Which two customer pain points should be addressed first when selling BigFix? (Select 2)

  • A . Failed audits
  • B . High network traffic
  • C . Compliance concerns
  • D . Organizational re-structuring
  • E . Increasing costs of data protection
  • F . Increasing number of mobile devices

Reveal Solution Hide Solution

Correct Answer: A,C
Question #2

What is an effective response if a customer says that they use native database logging and do not need Guardium Data Activity Monitor For Guardium Data Protection for Databases)?

  • A . Native logs cannot be evaluated by a SIEM solution.
  • B . Native logging can impact performance by 10-45% and thus often gets turned off.
  • C . Guardium Data Activity Monitor (or Guardium Data Protection for Databases) provides an executive risk dashboard.
  • D . Change the focus of the discussion from Guardium Data Activity Monitor (or Guardium Data Protection for Databases) to Guardium Database Log Manager.

Reveal Solution Hide Solution

Correct Answer: A
Question #3

What is the recommended action when a customer asserts that all of IBM’s Cloud Identity Service (CIS) customers are large businesses?

  • A . Indicate that CIS includes 4 subscription packages to cover clients of all sizes.
  • B . Indicate that IBM also has Cloud Identity Connect for small and medium businesses.
  • C . Move the focus of the discussion to how an IBM Security Access Manager (ISAM) appliance can save significant costs.
  • D . Move the focus of the discussion to IBM Security Identity and Access Assurance, which addresses all identity and access management (1AM) requirements and includes QRadar Log Manager.

Reveal Solution Hide Solution

Correct Answer: C
Question #4

What should a seller say to a customer who says deploying MaaS360 takes too long and is too expensive?

  • A . IBM has a full suite of mobile software that spans the complete mobile landscape.
  • B . A proof of concept can be created to demonstrate that MaaS360 can meet your security needs.
  • C . MaaS360 can be deployed in less than 6 hours and has an return on investment of 12 months or less.
  • D . Although deploying MaaS360 takes considerable time, the protection of your entire mobile environment is worth it.

Reveal Solution Hide Solution

Correct Answer: D
Question #5

Which IBM Security Services channel programs offer an annual revenue stream, typically on a 3-year basis?

  • A . Security Operations Center (SOC) design, build, and test
  • B . Consulting services such as assessment and testing services
  • C . Managed security services such as firewall or SIEM management
  • D . Product professional services such as product installation and integration

Reveal Solution Hide Solution

Correct Answer: C
Question #6

How should a seller respond to a prospect who says that many companies sell security solutions, and who asks "Why should I buy from IBM?".

  • A . IBM has the best security products on the market.
  • B . Do not underestimate the ability of hackers to find and exploit vulnerabilities.
  • C . IBM offers better discounts than its competitors, enabling companies to save more money.
  • D . IBM has an integrated portfolio of security products, while most other companies offer only point solutions.

Reveal Solution Hide Solution

Correct Answer: D
Question #7

Which customer use case does IBM i2 Enterprise Insight Analysis (EIA) address?

  • A . Perform real-time analysis of network, endpoint, vulnerability and threat data to detect advanced threats in realtime.
  • B . Conduct real-time enforcement of endpoint policies, including configuration and patching to prevent and detect threats.
  • C . Combine data from security solutions, external threat feeds, configuration management systems and other databases to support rapid incident response.
  • D . Combine machine-led analytics and human-led analysis to quickly find hidden connections and critical patterns in internal, external and open-source data.

Reveal Solution Hide Solution

Correct Answer: B
Question #8

What two are among the top three security concerns in the Financial Services Sector? (Select 2)

  • A . Cost cutting
  • B . Secure vaults
  • C . Insider threats
  • D . Fraudulent transactions
  • E . Organizational structure
  • F . Monitoring infrastructure

Reveal Solution Hide Solution

Correct Answer: B,D
Question #8

What two are among the top three security concerns in the Financial Services Sector? (Select 2)

  • A . Cost cutting
  • B . Secure vaults
  • C . Insider threats
  • D . Fraudulent transactions
  • E . Organizational structure
  • F . Monitoring infrastructure

Reveal Solution Hide Solution

Correct Answer: B,D
Question #8

What two are among the top three security concerns in the Financial Services Sector? (Select 2)

  • A . Cost cutting
  • B . Secure vaults
  • C . Insider threats
  • D . Fraudulent transactions
  • E . Organizational structure
  • F . Monitoring infrastructure

Reveal Solution Hide Solution

Correct Answer: B,D

Question #8

What two are among the top three security concerns in the Financial Services Sector? (Select 2)

  • A . Cost cutting
  • B . Secure vaults
  • C . Insider threats
  • D . Fraudulent transactions
  • E . Organizational structure
  • F . Monitoring infrastructure

Reveal Solution Hide Solution

Correct Answer: B,D
Question #8

What two are among the top three security concerns in the Financial Services Sector? (Select 2)

  • A . Cost cutting
  • B . Secure vaults
  • C . Insider threats
  • D . Fraudulent transactions
  • E . Organizational structure
  • F . Monitoring infrastructure

Reveal Solution Hide Solution

Correct Answer: B,D
Question #13

Security Analytics D. Watson for Cyber Security

  • A . 1 -> A
  • B . 2->C
  • C . 3 -> B
  • D . 4 -> D

Reveal Solution Hide Solution

Correct Answer: A
Question #14

Which IBM Security solution detects advanced persistent threats?

  • A . QRadar
  • B . Guardium Data Encryption
  • C . Privileged Identity Manager
  • D . Application Security on Cloud

Reveal Solution Hide Solution

Correct Answer: A
Exit mobile version