Which two customer pain points should be addressed first when selling BigFix? (Select 2)
- A . Failed audits
- B . High network traffic
- C . Compliance concerns
- D . Organizational re-structuring
- E . Increasing costs of data protection
- F . Increasing number of mobile devices
What is an effective response if a customer says that they use native database logging and do not need Guardium Data Activity Monitor For Guardium Data Protection for Databases)?
- A . Native logs cannot be evaluated by a SIEM solution.
- B . Native logging can impact performance by 10-45% and thus often gets turned off.
- C . Guardium Data Activity Monitor (or Guardium Data Protection for Databases) provides an executive risk dashboard.
- D . Change the focus of the discussion from Guardium Data Activity Monitor (or Guardium Data Protection for Databases) to Guardium Database Log Manager.
What is the recommended action when a customer asserts that all of IBM’s Cloud Identity Service (CIS) customers are large businesses?
- A . Indicate that CIS includes 4 subscription packages to cover clients of all sizes.
- B . Indicate that IBM also has Cloud Identity Connect for small and medium businesses.
- C . Move the focus of the discussion to how an IBM Security Access Manager (ISAM) appliance can save significant costs.
- D . Move the focus of the discussion to IBM Security Identity and Access Assurance, which addresses all identity and access management (1AM) requirements and includes QRadar Log Manager.
What should a seller say to a customer who says deploying MaaS360 takes too long and is too expensive?
- A . IBM has a full suite of mobile software that spans the complete mobile landscape.
- B . A proof of concept can be created to demonstrate that MaaS360 can meet your security needs.
- C . MaaS360 can be deployed in less than 6 hours and has an return on investment of 12 months or less.
- D . Although deploying MaaS360 takes considerable time, the protection of your entire mobile environment is worth it.
Which IBM Security Services channel programs offer an annual revenue stream, typically on a 3-year basis?
- A . Security Operations Center (SOC) design, build, and test
- B . Consulting services such as assessment and testing services
- C . Managed security services such as firewall or SIEM management
- D . Product professional services such as product installation and integration
How should a seller respond to a prospect who says that many companies sell security solutions, and who asks "Why should I buy from IBM?".
- A . IBM has the best security products on the market.
- B . Do not underestimate the ability of hackers to find and exploit vulnerabilities.
- C . IBM offers better discounts than its competitors, enabling companies to save more money.
- D . IBM has an integrated portfolio of security products, while most other companies offer only point solutions.
Which customer use case does IBM i2 Enterprise Insight Analysis (EIA) address?
- A . Perform real-time analysis of network, endpoint, vulnerability and threat data to detect advanced threats in realtime.
- B . Conduct real-time enforcement of endpoint policies, including configuration and patching to prevent and detect threats.
- C . Combine data from security solutions, external threat feeds, configuration management systems and other databases to support rapid incident response.
- D . Combine machine-led analytics and human-led analysis to quickly find hidden connections and critical patterns in internal, external and open-source data.
What two are among the top three security concerns in the Financial Services Sector? (Select 2)
- A . Cost cutting
- B . Secure vaults
- C . Insider threats
- D . Fraudulent transactions
- E . Organizational structure
- F . Monitoring infrastructure
What two are among the top three security concerns in the Financial Services Sector? (Select 2)
- A . Cost cutting
- B . Secure vaults
- C . Insider threats
- D . Fraudulent transactions
- E . Organizational structure
- F . Monitoring infrastructure
What two are among the top three security concerns in the Financial Services Sector? (Select 2)
- A . Cost cutting
- B . Secure vaults
- C . Insider threats
- D . Fraudulent transactions
- E . Organizational structure
- F . Monitoring infrastructure
What two are among the top three security concerns in the Financial Services Sector? (Select 2)
- A . Cost cutting
- B . Secure vaults
- C . Insider threats
- D . Fraudulent transactions
- E . Organizational structure
- F . Monitoring infrastructure
What two are among the top three security concerns in the Financial Services Sector? (Select 2)
- A . Cost cutting
- B . Secure vaults
- C . Insider threats
- D . Fraudulent transactions
- E . Organizational structure
- F . Monitoring infrastructure
Security Analytics D. Watson for Cyber Security
- A . 1 -> A
- B . 2->C
- C . 3 -> B
- D . 4 -> D
Which IBM Security solution detects advanced persistent threats?
- A . QRadar
- B . Guardium Data Encryption
- C . Privileged Identity Manager
- D . Application Security on Cloud