IBM Cloud Pak For Security Fundamentals Level 1 Quiz - Attempt Review

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 13

Started on Tuesday, March 19, 2024, 8:23 AM

State Finished
Completed on Tuesday, March 19, 2024, 8:31 AM
Time taken 7 mins 34 secs Back Next
Feedback Congratulations, you passed the IBM
Cloud Pak for Security Fundamentals
Level 1 Quiz!

Question 1

Correct

Points out of 1.00

A large Managed Security Services Provider (MSSP) complains


that they have to perform searches against multiple tools in
multiple customer environments because they cannot extract
their customer's data to their Security Information and Event
Management (SIEM) solution for analysis. Because of that,
investigations take too long and are ineffective. How can you
position Cloud Pak for Security to address their challenges?

Demonstrate Risk Manager to show all the vulnerabilities in


their systems

Demonstrate how Federated Searches can search 


against multiple data sources without having to move
the data

Demonstrate how Cloud Pak for Security can extract data


from over 600 out-of-the-box data sources

Show how you can place a Cloud Pak for Security instance
on each environment to resolve the problem
Question 2

Correct

Points out of 1.00

Back Next

What Cloud Pak for Security technology allows clients to collect


security data such as cases generated by security monitoring
and analytics platforms, streamlining processes, reducing
mean-time-to-repair, and helping meet compliance
regulations?

Zero trust

Security Information and Event Management

Federated search

Security Orchestration, Automation and Response 

Question 3

Correct

Points out of 1.00

You are creating a Cloud Pak for Security (CP4S) proposal for a
client who is interested in unlimited usage pricing with no data
ingestion charges. Which CP4S packaging options should you
choose?

Usage

Enterprise 

Event

Volume
Question 4

Correct

Points out of 1.00

Back Next

What open-source query language does Data Explorer use to


perform federated searches across hundreds of data sources
while keeping data at rest?

Structured Query Language (SQL)

Ariel Query Language (AQL)

Search Processing Language (SPL)

Structured Threat Information eXpression (STIX) 

Question 5

Correct

Points out of 1.00

You are helping a client plan out a set of security approaches to


keep their client's confidence in the wake of a number of
security incidents in their industry. What security approach
provides organizations with adaptive and continuous protection
for users, data, and assets, as well as the ability to proactively
manage threats?

Zero trust 

Protect the hybrid cloud

Reduce the risk of insider threats

Global trust
Question 6

Correct

Points out of 1.00

Back Next

Which security discipline makes it possible for the proper


entities to use the right resources when they need to, without
interference, using the devices they want to use, while
maintaining a high level of security and utilizing zero trust
principles?

Open Security Ecosystem

Identity and Access Management 

Data Security

Threat Management

Question 7

Correct

Points out of 1.00

Cloud Pak for Security Data Explorer runs queries against


multiple data sources simultaneously while keeping the data at
rest, in its original system of record. This is a best practice
analytics scaling mechanism because it means data doesn't
need to move around the organization to derive insights from it;
instead, analytic processing is pushed to the data. What is the
name of the search technology that makes this possible?

Hierarchical

Distributed

Federated 

Manual
Question 8

Incorrect

Points out of 1.00

Back Next

What Threat Intelligence Insights (TII) functionality can


perform continuous, automated searches across data sources
and provides an adaptive, calculated risk score for possibly
compromised items?

Risk Manager 

Am I Infected

Data Explorer

Am I Affected

Question 9

Correct

Points out of 1.00

You are working on a Cloud Pak for Security proposal for a


medium-sized client who wants to license QRadar and who
additionally wants usage-based pricing. What would the list
price be for this client, who wants to license 25,000 Events per
Second (EPS) and 350,000 Flows per Minute (FPM)?

$1,773,900 

$854,000

$1,209,723

$323,849
Question 10

Incorrect

Points out of 1.00

Back Next

What is a key Cloud Pak for Security benefit that you, as a seller,
should present to an Incident Responder?

Reduces integration costs and effort 

Automates repetitive, time-consuming tasks

Connects to over 600 data sources

Preserves investments by working with current security


tools

Question 11

Incorrect

Points out of 1.00

According to the latest Forrester Wave for Security Analytics


Platforms report, which of these vendors has the strongest
strategy as of Q4 2020?

Exabeam

Microsoft

IBM Security

Splunk 
Question 12

Correct

Points out of 1.00

Back Next

One of your prospective clients is reluctant to move to the


cloud. Which of these could be a major reason preventing their
move?

No trust in cloud service providers 

Ease of hiring skilled cyber security workers

Desire to be locked in with a single vendor

Decreasing number of remote workers

Question 13

Correct

Points out of 1.00

You are talking to a telco client and using the IBM Security
Shield to articulate the four key security outcomes that IBM is
focusing on to help clients deliver a security strategy that will
speed them up, not slow them down? What are the four key
outcomes you describe?

Align, Detect, Modernize, and Manage

Prioritize, Protect, Modernize, and Manage

Prioritize, Detect, Modernize, and Manage

Align, Protect, Modernize, and Manage 


Question 14

Correct

Points out of 1.00

Back Next

One of your Cloud Pak for Security clients just received an IBM
X-Force warning about the latest Microsoft Squatting Campaign.
How can they verify that this threat is not threatening the
company's infrastructure?

Run the Threat Intelligence Insights Am I Affected 


report to determine whether this threat is present in
the company's network

Verify that Cloud Pak for Security Risk Manager is not


reporting any systems vulnerable to this threat

Correlate the threat's Indicators of Compromise (IOCs)


against the MITRE ATT&CK framework to validate if any of
the company's infrastructure is vulnerable to the attack

Validate the threat using Security Orchestration and


Response (SOAR)

Question 15

Correct

Points out of 1.00

Which Cloud Pak for Security solution enables Security


Operations Centers (SOCs) to reduce time to remediate
incidents while ensuring consistent responses?

Threat Investigator

Security Orchestration, Automation and Response 

Data Explorer

Threat Intelligence Insights


Question 16

Correct

Points out of 1.00

Back Next

The global cloud security market is growing rapidly due to


technological developments and the rising adoption of cloud
computing services, coupled with an increasing quantity of
cyberattacks and expanding compliance requirements. What is
the projected cloud security market (in US dollars) in 2025?

$68 billion 

$44 billion

$39 billion

$72 billion

Question 17

Correct

Points out of 1.00

You are working with the procurement team at a client who has
selected Cloud Pak for Security and now they need to finalize
licensing to approve the bid. They ask you what the primary
Cloud Pak for Security metric is, and you say:

Resource Unit (RU) 

Events Per Second (EPS)

Authorized User (AU)

Managed Virtual Server (MVS)


Question 18

Correct

Points out of 1.00

Back Next

You have been asked to speak at a regional user group about


security practices. As you write the various descriptions on a
whiteboard, what label do you put over the quadrant where you
wrote "Protects digital information from unauthorized access,
corruption, or theft throughout its entire lifecycle?"

Data Security 

Open Security Ecosystem

Threat Management

Identity and Access Management

Question 19

Correct

Points out of 1.00

Which zero trust approach is designed to provide users with


secure access to all applications using software defined
policies?

Preserve customer privacy

Protect the hybrid cloud

Reduce the risk of insider threat

Secure the remote workforce 


Question 20

Correct

Points out of 1.00

Back Next

A prospective client has standardized most of their operations


on Microsoft Azure, but they still have a significant on-premises
need as well. They need to deploy a security analytics platform
that can run on Azure while supporting their on-premises
environment, with built-in orchestration and case remediation.
Which of the following solution meets the client's
requirements?

Microsoft Azure Sentinel

Cloud Pak for Security 

Palo Alto Cortex

Google Chronicle

Question 21

Correct

Points out of 1.00

A client needs help bridging the operational silos between the


Security Operations Center (SOC) and compliance teams that
have grown over time. They feel an investment in this area of
their business would facilitate better compliance. What Cloud
Pak for Security use case will help IBM deliver on this client
need?

Security Orchestration and Response (SOAR) 

Threat Intelligence Insights (TII)

Data Explorer (DE)

Security Information and Event Management (SIEM)


Question 22

Correct

Points out of 1.00

Back Next

What are the primary Cloud Pak for Security competitors as of


the third quarter of 2021?

Palo Alto and Google

Microsoft and Google

Google and Splunk

Microsoft and Palo Alto 

Question 23

Correct

Points out of 1.00

What foundational security analytics platform helps clients


retrieve, store, correlate, and alert on a variety of security data
including logs and events, network flow and packet data, asset
information, applications, and servers?

Security Information and Event Management (SIEM) 

Network Detection and Response (NDR)

Endpoint Detection and Response (EDR)

Security Orchestration, Automation and Response (SOAR)


Question 24

Correct

Points out of 1.00

Back Next

What percentage of companies use more than twenty five (25)


unique security products, with 44% of them engaging more
than ten (10) vendors?

80%

75%

35%

60% 

Question 25

Correct

Points out of 1.00

A security analyst is concerned that their company does not


have complete visibility over their data because it is stored in
multiple silos, making investigations difficult and time-
consuming. Which key Cloud Pak for Security capabilities will
help them resolve their concern?

Reduces staff overload and burnout, turning junior analysts


into senior analysts

Reduces custom integration costs and effort and reduces


compliance risk

Supports 600+ data sources out-of-the-box and 


provides federated threat searching

Integrated dashboards and threat intelligence risk


analytics detect incidents faster

You might also like