Which of the following statements best distinguishes between why customers purchase Access Manager for e-business or Security Policy Manager?
A. Access Manager is for customers who don't need the overhead of security policy; Security Policy Manager is for customers who need to set policy and then measure against that policy for GRC purposes.
B. Access Manager is for small and medium customers and Security Policy Manager addresses large, high-scale implementations.
C. Access Manager is operational ("access") and Security Policy Manager is administrative ("policy").
D. Access Manager addresses coarse-grained access control and Security Policy Manager addresses fine-grained access control.
正解:D
解説: (Pass4Test メンバーにのみ表示されます)
質問 2:
A customer indicates a desire to cover their Web Single Sign-on requirement comprehensively. Your response to them is that with Tivoli Access Manager for e-business, we can address ___________
A. Web transactions involving access requests coming from the Internet and targeted to the internal network.
B. Web transactions, client-server transactions, email transactions and secure FTP transactions.
C. Web transactions within the internal network.
D. Web transactions involving Internet-to-internal-network flows and transactionswithin the internal network.
正解:A
解説: (Pass4Test メンバーにのみ表示されます)
質問 3:
What are the key security features of IBM Security Virtual Server Protection for VMware?
A. Rootkit Detection, Firewall, Intrusion Prevention, Virtual Network Access Control, Auditing.
B. Rootkit Detection, Firewall, Intrusion Detection Only, Virtual Network Admission Control, Auditing.
C. Rootkit Detection, Firewall, Intrusion Prevention, Virtual Network Admission Control, File Integrity Monitoring.
D. Rootkit Detection & Removal, Firewall, Intrusion Prevention, Virtual Network Admission Control, Auditing.
正解:A
解説: (Pass4Test メンバーにのみ表示されます)
質問 4:
What are three most significant challenges for mainframe security environments?
A. Threat prevention, identity management, access management.
B. Complexity, lack of encryption, access management.
C. Compliance, event correlation, endpoint management.
D. Compliance, complexity, cost.
正解:A
解説: (Pass4Test メンバーにのみ表示されます)
質問 5:
When trying to prevent data breaches, which of the following controls must be implemented?
A. Compare all transactions to policy and block violations in real-time.
B. Monitor transactions without requiring changes to databases or applications.
C. All of the above.
D. Automate and centralize controls to streamline compliance validation.
正解:C
質問 6:
Which of the following solutions is the core solution for addressing customer requirements for simplified administration for z/OS?
A. zSecure Command Verifier.
B. zSecure Alert
C. zSecure Audit.
D. zSecure Admin.
正解:D
解説: (Pass4Test メンバーにのみ表示されます)
结城** -
このM2150-662問題集は、独学にぴったりな参考書で、理解しやすく簡単に書いてあって、本当にこのPass4Testの問題集ひとつのみで大丈夫でした。無事に受かりました。Pass4Testさんありがトゥース