[Free] 2018(Jan) Dumps4cert Passguide IBM C2150-606 Dumps with VCE and PDF Download 31-40

Dumps4cert.com : Latest Dumps with PDF and VCE Files 2018 Jan IBM Official New Released C2150-606
100% Free Download! 100% Pass Guaranteed!

IBM Security Guardium V10.0 Administration

Question No: 31

A Guardium administrator manages portal user synchronization by using a Central Manager.

When a change is made on the Central Manager such as, for example, adding a Guardium user to a Guardium group, how long should be allowed for the update to be synced with the managed units in a fully working environment?

  1. 0minutes

  2. 15 minutes

  3. 30 minutes

  4. 60 minutes

Answer: D

Question No: 32

Guardium reports are showing multiple records with client ip as Users are unable to identify which client the connections came from. The Guardium administrator has identified that the databases are using encryption.

Which column can the administrator add that would help users to better identify the client?

  1. Client OS

  2. Client MAC

  3. Access ID

  4. Analyzed Client IP

Answer: B

Question No: 33

A Guardium administrator is preparing a command to install Configuration Auditing System (CAS) on a Linux server using the command line method. Which parameter is required?

  1. dir

  2. tapip

  3. java-home

  4. sqlguardip

Answer: D

Question No: 34

During the initial phase of the Guardium deployment, the Guardium administrator wants to figure out an ideal time period to purge data from the appliance based on the data load.

Which predefined Guardium report(s) allows the administrator to determine the current database disk usage of the Guardium Appliance?

  1. Disk UtiI report

  2. Aggregation/Archive log

  3. DB Server throughput report

  4. Buff Usage Monitor and System Monitor reports

Answer: D

Question No: 35

AGuardium administrator has rebuilt an appliance, and wants nowto restore a backup image of the entire database, audit data, and all definitions from Data backup.Which CLI command should the administrator use to accomplish this?

  1. restore config

  2. restore system

  3. restore pre-patch-backup

  4. restore certificate sniffer backup

Answer: B

Question No: 36

Auditors request a report of all unsuccessful login attempts to a database monitored by Guardium. How should a Guardium administrator create such a report?

  1. Add a failed login rule to the policy.

  2. Create a failed login query and report using access domain in Guardium.

  3. Create a failed login query and report using exceptions domain in Guardium.

  4. Create a failed login query and report using application data domain in Guardium.

Answer: C

Question No: 37

In a centrally managed environment, while executing the report #39;Enterprise Buffer Usage Monitor#39;, a Guardium administrator gets an empty report. Why is the report empty?

  1. Sniffers are not running on the Collectors.

  2. The report is not executed with a remote source on the Collector.

  3. The report is not executed with a remote source on the Aggregator.

  4. Correct custom table upload is not scheduled on the Central Manager.

Answer: C

Question No: 38

A Guardium administrator observes certain changes to the configuration and policies. How would the administrator identify the changes that were made and who made them?

  1. Review the Audit Process Log report.

  2. Review the sniffer buffer usage report.

  3. Review the /var/log/messages log file.

  4. Review the results of #39;Detailed Guardium User Activity#39; report.

Answer: D

Question No: 39

AGuardium administrator is using the Classification, Entitlement and Vulnerability assessment features of the product. Which of the following are correct with regards to these features? (Select two.)

  1. Vulnerability Assessment reports are populated to the Guardium appliance via S-TAP.

  2. Classification for databases and files use the same mechanisms and patterns to search for sensitive data.

  3. Entitlement reports are predefined database privilege reports and are populated to the Guardium appliance via S-TAP.

  4. Vulnerability Assessment identifies and helps correct security vulnerabilities and threats in the database infrastructures.

  5. The classification feature discovers sensitive assets including credit card numbers or national card numbers from various data sources.

Answer: D,E

Question No: 40

A Guardium administrator must configure real time policy alerts to be sent to a remote SIEM for every SQL statement run on a sensitive object. There is no requirement for the data to be viewed or reported on in the Guardium appliance.

Which policy action would achieve that task and store the least amount of data in the Guardium internal database?

  1. Log Only

  2. Alert Only

  3. Alert Daily

  4. Alert Per Match

Answer: C

100% Dumps4cert Free Download!
Download Free Demo:C2150-606 Demo PDF
100% Dumps4cert Free Guaranteed!
C2150-606 Dumps

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.