IBM
Exam P2150-739
IBM InfoSphere Guardium Technical Mastery Test v2
Version: Demo
[ Total Questions: 10 ]
Question No : 1
Which of the following items cannot be identified using database auto-discovery?
A. IP address of servers with a database instance.
B. Port(s) on which a database is communicating on each server.
C. List of databases for each database instance.
D. Type of database running on each server.
Answer: C
Question No : 2
The query builder contains all of the following panes except for:
A. The Entity List.
B. The Query Fields.
C. The Query ID Selector.
D. The Query Conditions.
Answer: C
Question No : 3
Data is collected through a security policy using non-selective audit trail that only consists of rules with alert action. Which of the following cannot be viewed when reporting on these data?
A. SQL construct
B. SOL timestamp
C. Client IP
D. SQL values
Answer: D
Question No : 4
What is a Guardium vulnerability assessment (VA)?
A. A test that employs state-of-the-art algorithms to determine the potential risks of your network.
B. A series of predefined and custom tests that allow customers to automatically identify and address database vulnerabilities.
C. An optional service from Guardium where a security specialist visits a customer's site before a proof-of-concept engagement to determine the customer's specific requirements.
D. A piece of software distributed as a multi-platform plug-in that allows a supported database management system to constantly monitor potential threats and report on these periodically.
Answer: B
Question No : 5
What is a security policy?
A. A series of transactions where the data server communicates with the collector and shares its current security status.
B. An XML file that must be manually created and configured so the S-TAP can understand the nature of the traffic that it reports on.
C. A Guardium object containing an ordered set of rules that are applied to the observed traffic between clients and data servers.
D. A specially-formatted document from a government or third-party institution that can be imported into Guardium for easy audit configuration.
Answer: C
Question No : 6
Which of the following components collects and parses the live database traffic used to trigger a real-time alert when a security policy rule is broken?
A. The Real Time Communications Framework
B. The Inspection Engine
C. The Change Audit System
D. The Live Report Builder
Answer: B
Question No : 7
Which of the following problems is the Application User Translation feature designed to help with?
A. The use of non-English parameter values in SQL statements issued by some applications.
B. The fact that there is no easy way for the application server to communicate with both Guardium and the data server concurrently.
C. The inability to relate a database action to a specific application user when a pool of database connections is used by an application.
D. Translating an application's requests made to a data server so these are compatible with all the database management systems that Guardium supports.
Answer: C
Question No : 8
Guardium can work on heterogeneous environments, therefore, which architectures are supported by an S-TAP agent?
A. Windows, Linux, Android, zOS
B. Windows, Unix, Linux,Mac
C. Linux, zOS, jSeries, Windows
D. iSeries, Linux, zOS, Windows
Answer: D
Question No : 9
Which of the following cannot be monitored using CAS?
A. Environment variables.
B. Database configurations.
C. SQL activity.
D. File permissions.
Answer: C
Question No : 10
Which of the following is often required to ensure that Guardium can identify a user's credentials through the Stored Procedure Monitoring feature?
A. A database system-specific plug-in that attaches on to the collector's engine.
B. A well-configured custom identification procedure mapping.
C. A credential replication routine available for free from Guardium.
D. Reconfiguring the security policy so the appliance knows all the application servers that
contact the data server.
Answer: B