[Free] 2018(Jan) EnsurePass Passguide IBM P2150-739 Dumps with VCE and PDF 21-30

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan IBM Official New Released P2150-739
100% Free Download! 100% Pass Guaranteed!

IBM InfoSphere Guardium Technical Mastery Test v2

Question No: 21

Which of the following cannot be monitored using CAS?

  1. Environment variables.

  2. Database configurations.

  3. SQL activity.

  4. File permissions.

Answer: C

Question No: 22

A database known to contain the medical records of a foreign head of state is accessed at 1:30 AM. No security mechanism is installed and so this highly sensitive information is leaked to the media. Could this breach have been detected by running a Guardium vulnerability assessment without creating any custom assessment tests?

  1. No, this type of test is not included with Guardium.

  2. Yes, but only if the appliance includes Guardium#39;s Database Protection Subscription service.

  3. Yes, after hours login detection is one of the standard behavioral vulnerability tests included with Guardium.

  4. Yes, however this particular test is only available for IBM DB2 and Informix servers.

Answer: C

Question No: 23

What is Guardium#39;s primary storage mechanism for logs and audit information?

  1. Data can only be stored in flat files on the collector (one file per S-TAP).

  2. Data storage can only be managed individually by each S-TAP, with audit data stored locally on the data server in flat files.

  3. Data is stored on the collector in a normalized relational database.

  4. Data is stored locally on each server with an S-TAP but is managed centrally through the collector.

Answer: C

Question No: 24

Which of the following is true about applying CAS templates to CAS hosts?

  1. Each CAS Template can only be applied to one CAS host.

  2. Instance-level changes can be made to the template items so that the same template may be applied with different parameters (ie. run frequency) to many CAS hosts.

  3. Applying CAS Templates will require the database management system on the CAS host to be restarted.

  4. CAS Templates are applied to collectors, which act as CAS hosts.

Answer: B

Question No: 25

Which of the following native SQL commands is required to link external data to internal data?


  2. JOIN

  3. ALTER

  4. LINK

Answer: B

Question No: 26

How would a DBA or developer notify Guardium using the Application User API that an application user has taken or given up control of a data server connection?

  1. By importing the GuardUtils library and issuing calls through it from the application.

  2. By creating a wrapper solution that sends HTTP requests to Guardium#39;s service- oriented API whenever an event like this happens.

  3. By registering the application#39;s connection pool with Guardium.

  4. By using the GuardAppUser call in the form of a SQL SELECT statement to indicate that a new application user has taken control of the connection.

Answer: D

Question No: 27

Which of the following is a valid use case for scheduled database auto-discovery?

  1. Database auto-discovery cannot be scheduled because the user must specify a series of IP addresses and port ranges every time prior to running the process.

  2. Automating the cataloging of new database instances so the administrator does not have to perform this task manually.

  3. Ensuring that S-TAP instances have the latest database configuration for all the databases that are being monitored.

  4. Identifying new or rogue databases across environments, as well as new instances that may have been created within existing, already discovered database services.

Answer: D

Question No: 28

Which of the following steps must be taken before a custom table can be defined on the Guardium appliance?

  1. The Guardium API must be used to notify the engine that a custom table is going to be defined.

  2. All other users of the Guardium user interface must be logged off since there can only be one active session when the custom table is being defined.

  3. A test provided by Guardium must be run on the data server to make sure no malicious data is found in the table to be queried.

  4. Data in the existing database must be verified to make sure that the different data types are supported by Guardium#39;s custom tables.

Answer: D

Question No: 29

In a Guardium environment where data servers can talk to the collector, what is the relationship between the S-TAP and the collector appliance?

  1. There is no relationship since the S-TAP and the collector are incompatible Guardium entities.

  2. The S-TAP reports database activity to the collector for policy management and


  3. A collector can only interact with one S-TAP for policy management and auditing.

  4. The collector sends the S-TAP information about its policies so it knows what traffic to intercept.

Answer: B

Question No: 30

Which of the following actions is NOT a known benefit of using correlation alerts?

  1. Real time database traffic analysis and security policy inspection.

  2. Monitoring database usage and pinpointing suspicious activity.

  3. Automatically alerting users when established behavioral baselines are exceeded.

  4. Saving time in alerting and analyzing versus manually doing so.

Answer: A

100% Ensurepass Free Download!
Download Free Demo:P2150-739 Demo PDF
100% Ensurepass Free Guaranteed!
P2150-739 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.