최신 Sales Mastery M2150-662 무료샘플문제:
1. A customer indicates a desire to cover their Web Single Sign-on requirement comprehensively. Your response to them is that with Tivoli Access Manager for e-business, we can address ___________
A) Web transactions, client-server transactions, email transactions and secure FTP transactions.
B) Web transactions within the internal network.
C) Web transactions involving Internet-to-internal-network flows and transactionswithin the internal network.
D) Web transactions involving access requests coming from the Internet and targeted to the internal network.
2. For which of the following platforms is advanced management supported for Tivoli Endpoint Manager for Mobile Device Manager?
A) Both A and B.
B) iOS via Apple's MDM APIs.
C) Symbian via native BigFix agent.
D) Android via native BigFix agent.
3. A client has IBM Security Desktop across their desktop clients, but not on the corporate endpoints. What is the best solution to propose if they are looking to consolidate vendors on the endpoint?
A) Next Generation IPS is the best solution for long-term protection.
B) IBM Security VSP, which will allow for virtualized protection, is the logical next technology.
C) IBM Tivoli Endpoint Manager will be the natural evolution to extend the life of IBM Security Desktop.
D) SELM service will enable the client to have appropriate logging without using on-site technology.
4. Which of the following is a good opportunity for selling TFIM to an existing TAMeb customer?
A) The TAMeb customer is growing more interested in enterprise audit log management.
B) The TAMeb customer wants to extend access to SaaS and Cloud applications, or they are planning on extending their Web SSO/access infrastructure to include partner accesses.
C) The TAMeb customer is going to include access to mainframe applications in the coming year.
D) The TAMeb customer is going to include Oracle applications in their operational environment in the coming year.
5. What are the functional components of QRadar?
A) Application Scanning, Vulnerability Scanning. VirusScanning.
B) Log Management, SIEM, Risk Management, Network Activity Monitoring, Network and Application visibility.
C) Identity Management, Asset Management, Application Management.
D) Signature based Detection, Bypass switching. Denial of Service blocking.
질문과 대답:
질문 # 1 정답: D | 질문 # 2 정답: A | 질문 # 3 정답: C | 질문 # 4 정답: B | 질문 # 5 정답: B |