Skip survey header

2015 IBM Security Sales Mastery Exam

Please select the 1 best answer for each question. There is only 1 correct answer for each question. You will be given 50 questions to answer.

1. The following items are all capabilities of IBM Security Privileged Identity Manager.  If a customer of yours asked which of them are new for the most recent (Version 2) update, which one is the right answer? *This question is required.
2. When promoting IBM Endpoint Management, what steps should a seller take to ensure we differentiate IBM as the leader? *This question is required.
3. An existing IBM Security Identity Manager Version 6 client needs better identity governance for meeting compliance needs.   They've been told that there is no migration available from SIM V6 to SIM V7.  What do you sell them? *This question is required.
4. Which of the following is NOT one of the things IBM MobileFirst Protect (MaaS360) can secure in a trusted workplace? *This question is required.
5. What has been a focus of enhancements in IBM Security Identity Manager's latest versions? *This question is required.
In December 2014, IBM moved ahead of which company in the Gartner IPS Magic Quadrant? *This question is required.
6. QRadar Incident Forensics delivers which key capabilities? *This question is required.
7. Apex can protect which of the following devices? *This question is required.
Which of the following Guardium solutions provides dynamic data masking capabilities? *This question is required.
8. You are in a competitive user management/identity management/user provisioning sale, and the decision seems to hinge on who has the superior role management capabilities. The client is unhappy with their current user management solution. You handle this by: *This question is required.
9. What is a common z/OS security vulnerability? *This question is required.
What are the three main solutions within the AppScan porfolio? *This question is required.
10. A single appliance to collect events and flow data, perform data correlation and rule matching, report alerts and provide admin capability is called what? *This question is required.
IBM Security Directory Integrator has two editions: Identity and General Purpose. What is the only difference between the two editions? *This question is required.
11. Which of the following best describes the Trusteer Apex solution? *This question is required.
12. Which of the Trusteer Advanced Web Fraud Protection solutions prevents infection and removes live and inactive Man-in-Browser (MitB) from infected computers? *This question is required.
Which are examples of On-line Financial Web Fraud Threat Vectors? *This question is required.
13. Which of the following is NOT a capability of Guardium Data Activity Monitor? *This question is required.
14. How many devices does MaaS360 wipe a day on average? *This question is required.
15. What are the 2 main defining advantages of MaaS360’s SaaS deployment? *This question is required.
Who are the primary competitors to AppScan? *This question is required.
16. Name a competitor to IBM zSecure: *This question is required.
17. Which IBM Security solutions can feed System z security events to QRadar? *This question is required.
18. There are several key integrations of AppScan and other IBM Security solutions. Name two of those integrations and their value. *This question is required.
19. Which of the following features can be purchased as "add-ons" to the base XGS appliance and enabled using licenses? *This question is required.
20. When selling Trusteer Web Fraud Solutions the clients Trusteer has been most successful with to date have been in what industry: *This question is required.
21. What is NOT a capability provided by IBM Security Governance (based on IBM's acquisition of CrossIdeas)? *This question is required.
22. In considering the overall SIEM competitive landscape, what are the 2 top points that favor QRadar over all of its competitors? *This question is required.
23. The following list of capabilities are all part of IBM Security Directory Integrator, except one.  Which one is NOT part of IBM Security Directory Integrator? *This question is required.
IBM is recognized as a Leader in which 2014 Gartner Magic Quadrants?
24. What are the 3 main capabilities of Arxan Application Protection for mobile applications? *This question is required.
25. The XGS Product Family integrates with which other product as a key part of the IBM Security Threat Protection System? *This question is required.
In what way is Trusteer Apex different from traditional Anti-Virus (AV) solutions? *This question is required.
26. What is the new component of zSecure that is focused on QRadar SIEM Integration? *This question is required.
Which one of these is NOT a current customer of MaaS360 as referenced on the recording? *This question is required.
27. Trusteer Apex can block malicious communications from an endpoint infected with data-stealing malware. When doing so, which of the following functions does it perform? *This question is required.
28. Which one of these is NOT a key buying initiative when it comes to IBM Endpoint Manager (BigFix)? *This question is required.
29. How many models are there in the XGS Product Family? *This question is required.
30. What is the term we are now using with clients to indicate our end-to-end approach to best in class endpoint management & security? *This question is required.
Which of the following is a common objection to clients purchasing the Guardium Data Activity Monitor? *This question is required.
31. Which one of these is NOT a key buying initiative when it comes to Endpoint & Mobility Management? *This question is required.
One of the main ways that organizations are attacked is when hackers initially obtain a user's corporate credentials using Phishing techniques. Trusteer Apex can help to prevent this by performing which of the following? *This question is required.
32. In the Enterprise Security Core Education training course, what were identified as the key Enterprise Security Sales Situation? *This question is required.
33. Which scenario is NOT addressed by IBM Federated Identity Manager? (At the end) *This question is required.
34. Trusteer Apex is an Enterprise Endpoint Protection solution. Which platforms can be protected by Trusteer Apex? *This question is required.
35. What are the three main characteristics of AppScan? *This question is required.
36. The XGS Product Family consists of a number of different models. The XGS 7100 can protect up to which of the following "inspected throughput" values? *This question is required.
Which products are part of Advanced Web Fraud Protection: *This question is required.
37. Your client uses IBM DataPower (DP) appliances in their DMZ for detecting and mitigating XML-based threats. They're currently unhappy with their (non-IBM) web and mobile security solution(s). What should you do? *This question is required.
38. When looking across the financial fraud vectors the first target is: *This question is required.
39. IBM SAM for Mobile provides strong protection. When talking to clients about it, what might you want to work into the discussion? *This question is required.
40. What is the primary customer requirement that IBM Security Access Manager addresses? *This question is required.
41. Why would a client use the Guardium Vulnerability Assessment? *This question is required.
42. The XGS Product Family was designed to have a high level of modularity in mind, to cope with changing customer needs. Which add-on module/feature below is NOT available in the XGS? *This question is required.
43. Sellers can sell software to System z customers in what three licensing scenarios: *This question is required.
44. Which one of the following best describes IBM Endpoint Manager (BigFix)? *This question is required.
45. What are the key sales situations for AppScan? *This question is required.
46. The best way to stop web fraud is to: *This question is required.
47. In a potential IBM Security Access Manager (SAM) sale, the client is a large customer and has large numbers of applications and servers involved in their SSO/Web authorization plans. Oracle Access Manager (OAM) is the main competitor. What might you emphasize as you try to move the customer in your direction? *This question is required.
48. What key advantages does the QRadar Security Intelligence Platform offer over the competition? *This question is required.
The organizations that receive the highest value from our endpoint management (BigFix) solution display which of the following characteristics? *This question is required.
49. The customer needs to provide PCI compliance controls to encrypt the PCI PAN data inside of DB2, Oracle and SQL Server. Which product do you recommend to the customer? *This question is required.
There were 3 themes used to describe QRadar's value. Which of those 3 themes is one that best relates to the unified view that the QRadar Console offers its customers? *This question is required.
50. What advantages does QRadar Vulnerability Manager (QVM) bring to the customer? *This question is required.