IBM C2150-606 Exam Practice Questions (P. 3)
- Full Access (55 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #11
Guardium reports are showing multiple records with client ip as 0.0.0.0. Users are unable to identify which client the connections came from. The Guardium administrator has identified that the databases are using encryption.
Which column can the administrator add that would help users to better identify the client?
Which column can the administrator add that would help users to better identify the client?
- AClient OS
- BClient MAC
- CAccess ID
- DAnalyzed Client IP
Correct Answer:
B
The column named smac is a Guardian Client/Server server which represents the Client MAC.
Reference:
https://www-01.ibm.com/support/knowledgecenter/SSMPHH_9.5.0/com.ibm.guardium95.doc/appendices/topics/cef_mapping.html
B
The column named smac is a Guardian Client/Server server which represents the Client MAC.
Reference:
https://www-01.ibm.com/support/knowledgecenter/SSMPHH_9.5.0/com.ibm.guardium95.doc/appendices/topics/cef_mapping.html
send
light_mode
delete
Question #12
A company wants to deploy S-TAPs for 2 groups of database servers located in 2 different data centers. The current set of Collectors are fully utilized. The
Aggregators and Central Manager can handle more load.
What should a Guardium administrator recommend?
Aggregators and Central Manager can handle more load.
What should a Guardium administrator recommend?
- ADeploy 2 new Collectors, 1 in each data center.
- BConnect S-TAPs directly to Aggregators to avoid network latency.
- CConnect S-TAPs directly to the Central Manager to avoid network latency.
- DDeploy 2 new Collectors in the third data center located in between the 2 data centers.
Correct Answer:
A
IBM recommends to use 1 aggregator for every 8 collectors.
Reference:
http://www-01.ibm.com/support/docview.wss?uid=swg27039720
A
IBM recommends to use 1 aggregator for every 8 collectors.
Reference:
http://www-01.ibm.com/support/docview.wss?uid=swg27039720
send
light_mode
delete
Question #13
Which use cases are covered with the File Activity Monitoring feature? (Select two.)
- AClassify sensitive files on mainframe systems.
- BEncrypts database data files on file systems based on policies.
- CSelectively redacts sensitive data patterns in files based on policies.
- DProvides audit trail of access to files, alert and/or block when unauthorized users or processes attempt access.
- EIdentifies files containing Personally Identifiable Information (PII) or proprietary confidential information on Linux Unix Windows (LUW) systems.
Correct Answer:
AE
A: Use case example:
Critical application files can be accessed, modified, or even destroyed through back-end access to the application or database server
Solution: File Activity Monitoring can discover and monitor your configuration files, log files, source code, and many other critical application files and alert or block when unauthorized users or processes attempt access.
E: Use case example:
Need to protect files containing Personally Identifiable Information (PII) or proprietary information while not impacting day-to-day business.
Solution: File Activity Monitoring can discover and monitor access to your sensitive documents stored on many file systems. It will aggregate the data, give you a view into the activity, alert you in case of suspicious access, and allow you to block access to select files and folders and from select users.
Note: File activity monitoring consists of the following capabilities:
* Discovery to inventory files and metadata.
* Classification to crawl through the files to look for potentially sensitive data, such as credit card information or personally identifiable information.
* Monitoring, which can be used without discovery and classification, to monitor access to files and, based on policy rules, audit and alert on inappropriate access, or even block access to the files to prevent data leakage.
Reference:
https://www-01.ibm.com/support/knowledgecenter/SSMPHH_10.0.0/com.ibm.guardium.doc/protect/fam_intro.html
AE
A: Use case example:
Critical application files can be accessed, modified, or even destroyed through back-end access to the application or database server
Solution: File Activity Monitoring can discover and monitor your configuration files, log files, source code, and many other critical application files and alert or block when unauthorized users or processes attempt access.
E: Use case example:
Need to protect files containing Personally Identifiable Information (PII) or proprietary information while not impacting day-to-day business.
Solution: File Activity Monitoring can discover and monitor access to your sensitive documents stored on many file systems. It will aggregate the data, give you a view into the activity, alert you in case of suspicious access, and allow you to block access to select files and folders and from select users.
Note: File activity monitoring consists of the following capabilities:
* Discovery to inventory files and metadata.
* Classification to crawl through the files to look for potentially sensitive data, such as credit card information or personally identifiable information.
* Monitoring, which can be used without discovery and classification, to monitor access to files and, based on policy rules, audit and alert on inappropriate access, or even block access to the files to prevent data leakage.
Reference:
https://www-01.ibm.com/support/knowledgecenter/SSMPHH_10.0.0/com.ibm.guardium.doc/protect/fam_intro.html
send
light_mode
delete
Question #14
A Guardium administrator is registering a new Collector to a Central Manager (CM). The registration failed. As part of the investigation, the administrator wants to identify if the firewall ports are open.
How can the administrator do this?
How can the administrator do this?
- AAsk the company’s network administrators.
- BAsk IBM technical support to login as root and verify.
- CLogin as CLI and execute telnet <ip address> <port number>
- DLogin as CLI and execute support show port open <ip address> <port number>
Correct Answer:
D
The support show port open command is similar to using telnet to detect an open TCP port locally or on a remote host.
If we are able to connect successfully you will see a message like: Connection to 127.0.0.1 8443 port [tcp/*] succeeded!
If you are unable to connect you will see a message like: connect to 127.0.0.1 port 1 (tcp) failed: Connection refused
Syntax: support show port open -
IP port - IP must be a valid IPv4 address like 127.0.0.1.
Port must be an integer with a value in 1-65535.
Reference:
https://www-01.ibm.com/support/knowledgecenter/SSMPHH_10.0.0/com.ibm.guardium.doc.reference/cli_api/support_cli_commands.html
D
The support show port open command is similar to using telnet to detect an open TCP port locally or on a remote host.
If we are able to connect successfully you will see a message like: Connection to 127.0.0.1 8443 port [tcp/*] succeeded!
If you are unable to connect you will see a message like: connect to 127.0.0.1 port 1 (tcp) failed: Connection refused
Syntax: support show port open -
IP port - IP must be a valid IPv4 address like 127.0.0.1.
Port must be an integer with a value in 1-65535.
Reference:
https://www-01.ibm.com/support/knowledgecenter/SSMPHH_10.0.0/com.ibm.guardium.doc.reference/cli_api/support_cli_commands.html
send
light_mode
delete
Question #15
A Guardium administrator needs to configure EMC Centera for Archive and/or Backup.
In addition to the server IP address, what else is required to establish connection with an EMC Centera on the network?
In addition to the server IP address, what else is required to establish connection with an EMC Centera on the network?
- AClipID
- BPEA file
- CShared secret
- DCertificate signed request (CSR)
Correct Answer:
B
The required steps that are needed to be taken, in Guardium in order to reconfigure EMC Centera by changing the IP address, are the IP address of the Centera
Server and the PEA file from Centera.
Reference:
http://www-01.ibm.com/support/docview.wss?uid=swg21687345
B
The required steps that are needed to be taken, in Guardium in order to reconfigure EMC Centera by changing the IP address, are the IP address of the Centera
Server and the PEA file from Centera.
Reference:
http://www-01.ibm.com/support/docview.wss?uid=swg21687345
send
light_mode
delete
All Pages