최신 Sales Mastery 00M-225 무료샘플문제:
1. An IBM Business Partner has supplied information with regard to a client opportunity that is scheduled to close next quarter. The end user has expressed an interest in buying but has no capital expenditure budget available
Which of the following actions should the IBM seller perform?
A) Supply the client with contact details for an IBM Strategic Outsourcing representative.
B) Suggest that the client schedule a meeting with the Business Partner to evaluate the client's network and configuration needs in order to downsize the project and better fit the budget.
C) Speak with another Business Partner that is more likely to close the item this quarter
D) Work with the Business Partner and IBM Global Finance to deliver a proposal for funding at a favorable rate.
2. A Chief Financial Officer mentions an initiative to protect the data residing on the core network with Intrusion Prevention System technology. He admits reluctance to move forward with the initiative because of a lack of understanding about the technology.
What is the next step?
A) Recommend the 20-Hour Jumpstart training course to the Chief Information Officer.
B) Request a Systems Engineer provide a technical presentation on Intrusion Prevention System/Intrusion Prevention System
C) Deliver a proposal including IBM Security Professional Security Services network analysis and architecture services.
D) Recommend the purchase of IBM Security Intrusion Prevention System/Intrusion Prevention System with Managed Security Services
3. A client has recently experienced downtime due to a worm outbreak on their network. What IBM Security appliance would best protect against this outbreak?
A) IBM Security Network Intrusion Prevention System appliance.
B) Network Data Loss appliance.
C) Enterprise Scanner appliance.
D) IBM Security Multi-Function Security appliance
4. The IBM Security product line provides partners and clients with a complete platform of preemptive Security protection for the organization's entire IT infrastructure. What best describes the range of protection provided by these solutions?
A) From the application to the core of the infrastructure.
B) From the inside to the outside of the network.
C) From the network gateway to the desktop.
D) From the authentication to the termination of the session.
5. A Chief Information Officer mentions an initiative to protect the data residing on the core network with Intrusion Prevention System technology. He confides that his network team already evaluated a competitor's product but had difficulty configuring and understanding the solution. His team also received little information from the evaluation.
What scenario provides the best chance for a successful IBM Security evaluation?
A) Ship a GX4004 and IBM Security SiteProtector appliance to the client's data center for evaluation.
B) Schedule a meeting with the network team to discuss IBM Security Professional Security Services offerings.
C) Deliver product data sheets and technical manuals about IBM Security Intrusion Prevention devices to the client
D) Schedule on-site meetings with an Systems Engineer to manage the deployment and configuration of IBM Security evaluation equipment
질문과 대답:
질문 # 1 정답: D | 질문 # 2 정답: B | 질문 # 3 정답: A | 질문 # 4 정답: C | 질문 # 5 정답: D |