000-M75 - Pass 2 You Leading IT Exam Materials Provider

http://www.TwPass.com
000-M75
IBM
IBM InfoSphere Guardium Technical Mastery Test v1
http://www.twpass.com/twpass.com/exam.aspx?eCode= 000-M75
The 000-M75 practice exam is written and formatted by Certified Senior IT Professionals working in
today's prospering companies and data centers all over the world! The 000-M75 Practice Test covers
all the exam topics and objectives and will prepare you for success quickly and efficiently.
The 000-M75 exam is very challenging, but with our 000-M75 questions and answers practice exam,
you can feel confident in obtaining your success on the 000-M75 exam on your FIRST TRY!
IBM 000-M75 Exam Features
- Detailed questions and answers for 000-M75 exam
- Try a demo before buying any IBM exam
- 000-M75 questions and answers, updated regularly
- Verified 000-M75 answers by Experts and bear almost 100% accuracy
- 000-M75 tested and verified before publishing
- 000-M75 exam questions with exhibits
- 000-M75 same questions as real exam with multiple choice options
Acquiring IBM certifications are becoming a huge task in the field of I.T. More over these
exams like 000-M75 exam are now continuously updating and accepting this challenge is itself a task.
This 000-M75 test is an important part of IBM certifications. We have the resources to
prepare you for this. The 000-M75 exam is essential and core part of IBM certifications and
once you clear the exam you will be able to solve the real life problems yourself.Want to take
advantage of the Real 000-M75 Test and save time and money while developing your skills to pass
your IBM 000-M75 Exam? Let us help you climb that ladder of success and pass your 000-M75 now!
000-M75
QUESTION: 1
Which of the following logging actions will not log the full SQL and parameter values?
A. Log Full Details.
B. Log Full Details with Values.
C. Audit Only.
D. Log Full Details per Session.
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-M75&qno=1
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 2
How is authentication and encryption implemented between collectors, aggregators and the
Central Policy Manager in a multi-tier Guardium environment?
A. Using an encrypted file containing the system password that must be copied to the
Central Policy Manager and collectors.
B. A System Shared Secret is specified through the GUI for each collector and the
Central Policy Manager.
C. The Central Policy Manager scans the network for Guardium collectors and performs
a security handshake with each appliance.
D. The communication between collectors and the Central Policy Manager is based on
unsecured network packets.
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-M75&qno=2
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 3
When the S-TAP is in open mode, what would you need to configure to enforce a termination
without any data leaking?
A. Using a rule with an S-GATE Attach action to terminate the activity.
B. Using a rule with an S-GATE Terminate action to terminate the activity.
C. Using an S-GATE Attach action to put the session in closed mode when the session
is initiated, and using a rule with an S-GATE Terminate action to terminate the activity.
D. Using an S-GATE Terminate action to put the session in closed mode when the
session is initiated, and using a rule with an S-TAP Terminate action to terminate the
activity.
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-M75&qno=3
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 4
How would a DBA or developer notify Guardium using the Application User API that an
application user has taken or given up control of a data server connection?
A. By importing theGuardUtils library and issuing calls through it from the application.
B. By creating a wrapper solution that sends HTTP requests toGuardium s serviceoriented API whenever an event like this happens.
C. By registering the application s connection pool withGuardium.
D. By using theGuardAppUser call in the form of a SQL SELECT statement to indicate
that a new application user has taken control of the connection.
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-M75&qno=4
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 5
An audit administrator wants to track database changes performed by database administrators
and reconcile these changes with an existing change tracking database. Which Guardium
features can be used to implement this scenario?
A. External Data Connector and Entitlement Reports.
B. Application Events API and External Data Correlation.
C. Application Events API and Entitlement Reports.
D. Sensitive Object Discovery and User Application Translation.
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-M75&qno=5
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 6
What are the different types of rules available to be used with Guardium policies?
A. Access, Data Throughput and Privileged Transactions.
B. Extrusion, Exception and Analysis.
C. Data Morphing, SOX-compliant, Extrusion and Data Throughput.
D. Access, Extrusion and Exception.
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-M75&qno=6
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 7
Which of the following statements is true about queries and reports in Guardium?
A. A query can only be used to create one report.
B. A query can be used to create many reports.
C. A report can be based on the combination of multiple queries.
D. A query can only be used to create either a tabular or a chart style report, but not
both.
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-M75&qno=7
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 8
What is a Guardium vulnerability assessment (VA)?
A. A test that employs state-of-the-art algorithms to determine the potential risks of
your network.
B. A series of predefined and custom tests that allow customers to automatically
identify and address database vulnerabilities.
C. An optional service fromGuardium where a security specialist visits a customer s site
before a proof-of-concept engagement to determine the customer s specific
requirements.
D. A piece of software distributed as a multi-platform plug-in that allows a supported
database management system to constantly monitor potential threats and report on these
periodically.
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-M75&qno=8
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 9
What is Guardium s primary storage mechanism for logs and audit information?
A. Data can only be stored in flat files on the collector (one file per S-TAP).
B. Data storage can only be managed individually by each S-TAP, with audit data
stored locally on the data server in flat files.
C. Data is stored on the collector in a normalized relational database.
D. Data is stored locally on each server with an S-TAP but is managed centrally through
the collector.
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-M75&qno=9
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 10
Which of the following is TRUE about Guardium s entitlement reports?
A. Guardium includes a set of built-in entitlement report definitions for all supported
databases.
B. Guardium does not offer standard built-in entitlement reports and the user must
create these reports based on their database specifications.
C. Guardium includes Oracle entitlement reports as a standard feature, however reports
for all other database engines (ie. IBM DB2) must be manually created.
D. Guardium s entitlement reporting requires a monthly subscription service.
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-M75&qno=10
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 11
Which of the following components collects and parses the live database traffic used to trigger
a real-time alert when a security policy rule is broken?
A. The Real Time Communications Framework
B. The Change Audit System
C. The Inspection Engine
D. The Live Report Builder
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-M75&qno=11
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 12
Which of the following items cannot be identified using database auto-discovery?
A. IP address of servers with a database instance.
B. Port(s) on which a database is communicating on each server.
C. List of databases for each database instance.
D. Type of database running on each server.
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-M75&qno=12
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 13
Which of the following actions is NOT a known benefit of using correlation alerts?
A. Monitoring database usage and pinpointing suspicious activity.
B. Real time database traffic analysis and security policy inspection.
C. Automatically alerting users when established behavioral baselines are exceeded.
D. Saving time in alerting and analyzing versus manually doing so.
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-M75&qno=13
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 14
How does Guardium handle correlation alerts?
A. The appliance sends signals to all registered probes and is able to correlate their
responses.
B. The returned values of a large number of queries are joined and the appliance
correlates these data to generate alerts.
C. The Anomaly Detection Engine runs queries that correlate exceptions or policy rule
violations on a scheduled basis.
D. Different alerts are correlated with one another and a higher priority alert is
generated.
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-M75&qno=14
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 15
What is the name of the software-based Guardium probe that can be configured on a supported
application server to capture web credentials?
A. P-TAP
B. Y-TAP
C. S-TAP
D. L-TAP
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-M75&qno=15
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 16
What is a security policy?
A. A series of transactions where the data server communicates with the collector and
shares its current security status.
B. An XML file that must be manually created and configured so the S-TAP can
understand the nature of the traffic that it reports on.
C. AGuardium object containing an ordered set of rules that are applied to the observed
traffic between clients and data servers.
D. A specially-formatted document from a government or third-party institution that can
be imported intoGuardium for easy audit configuration.
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-M75&qno=16
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 17
Which termination mechanism is most suitable for monitoring privileged users where
preventing data leaks is much more important than latency?
A. S-GATE Terminate.
B. S-TAP Terminate.
C. Both S-TAP and S-GATE Terminate.
D. RESET.
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-M75&qno=17
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 18
Which of the following steps must be taken before a custom table can be defined on the
Guardium appliance?
A. The Guardium API must be used to notify the engine that a custom table is going to
be defined.
B. All other users of theGuardium user interface must be logged off since there can only
be one active session when the custom table is being defined.
C. A test provided byGuardium must be run on the data server to make sure no
malicious data is found in the table to be queried.
D. Data in the existing database must be verified to make sure that the different data
types are supported byGuardium s custom tables.
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-M75&qno=18
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 19
Which of the following cannot be monitored using CAS?
A. Environment variables.
B. Database configurations.
C. SQL activity.
D. File permissions.
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-M75&qno=19
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 20
Which of the following best describes the role of the aggregator in a Guardium environment?
A. The aggregator is aGuardium appliance that collects and consolidates information
from multiple collectors to a single Aggregation Server, allowing for reporting across
the enterprise.
B. The aggregator is theGuardium appliance that communicates with mainframes.
C. The aggregator is aGuardium appliance that allows a collector and a Central Policy
Manager to communicate and is required in multi-collector environments.
D. The aggregator is another name for the Central Policy Manager.
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-M75&qno=20
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 21
What is one of the advantages of S-TAP over traditional SPAN implementation?
A. Monitoring network activities.
B. None, as S-TAP is an identical software implementation of SPAN.
C. Monitoring local traffic.
D. Faster communication with the collector.
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-M75&qno=21
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 22
What is Guardium s Database Protection Subscription Service?
A. A service that may be purchased separately in order to enableGuardium to safeguard
database management systems other than Sybase AES.
B. A subscription to the latest updates for the variousGuardium product components.
C. An additional package required for the vulnerability and threat management
solutions to integrate with CAS.
D. A service that provides theGuardium instance with quarterly updates to its built- in
assessment tests, so the assessment is up-to-date with industry best practices and new
vulnerabilities.
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-M75&qno=22
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 23
Which of the following is often required to ensure that Guardium can identify a user s
credentials through the Stored Procedure Monitoring feature?
A. A database system-specific plug-in that attaches on to the collector s engine.
B. A credential replication routine available for free fromGuardium.
C. A well-configured custom identification procedure mapping.
D. Reconfiguring the security policy so the appliance knows all the application servers
that contact the data server.
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-M75&qno=23
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 24
What is CAS?
A. An agent installed on the database server that reports to the collector whenever a
monitored entity, such as a file, environment variable or script output has changed.
B. An agent installed on the database server that reports to the collector whenever a
monitored database s version has changed through upgrades or patch installs.
C. An optional agent installed on the collector that monitors the database server for
entity changes.
D. An agent that acts as the main component of the Central Audit System.
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-M75&qno=24
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 25
Data are collected through a security policy using non-selective audit trail that only consists of
rules with alert action. Which of the following cannot be viewed when reporting on these data?
A. SQL construct
B. SQL timestamp
C. Client IP
D. SQL values
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-M75&qno=25
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 26
A database known to contain the medical records of a foreign head of state is accessed at
1:30AM. No security mechanism is installed and so this highly sensitive information is leaked
to the media. Could this breach have been detected by running a Guardium vulnerability
assessment without creating any custom assessment tests?
A. No, this type of test is not included withGuardium.
B. Yes, but only if the appliance includesGuardium s Database Protection Subscription
service.
C. Yes, after hours login detection is one of the standard behavioral vulnerability tests
included withGuardium.
D. Yes, however this particular test is only available for IBM DB2 and Informix
servers.
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-M75&qno=26
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 27
The query builder contains all of the following panes except for:
A. The Entity List.
B. The Query Fields.
C. The Query ID Selector.
D. The Query Conditions.
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-M75&qno=27
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 28
Which of the following is not a valid termination action for an extrusion rule?
A. Termination actions are not available for extrusion rules.
B. S-TAP Terminate.
C. Termination actions are available for extrusionrules, however these are executed by
the database management system and not Guardium.
D. S-GATE Terminate.
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-M75&qno=28
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 29
Which of the following Guardium facilities is used to import external data?
A. External Data Correlation
B. Multi-format Importing Utility
C. Special Data Collector
D. System Integration Facility
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-M75&qno=29
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 30
In a Guardium environment where data servers can talk to the collector, what is the relationship
between the S-TAP and the collector appliance?
A. Thereexists no relationship since the S-TAP and the collector are incompatible
Guardium entities.
B. The S-TAP reports database activity to the collector for policy management and
auditing.
C. A collector can only interact with one S-TAP for policy management and auditing.
D. The collector sends the S-TAP information about its policies so it knows what traffic
to intercept.
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-M75&qno=30
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 31
What are the four types of tests that can be used in a Guardium vulnerability assessment?
A. User defined, observed behavioral, database configuration and server configuration.
B. Predefined, subscription-based, observed behavioral and configuration vulnerability.
C. OS-level, native, special and external.
D. OS-level, kernel, special and external.
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-M75&qno=31
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 32
What is the effect of enabling the Log Policy Violation option when creating a new correlation
alert?
A. The Guardium administrator is automatically notified whenever this alerts occurs.
B. A policy violation is logged when this alert is triggered, so it may be viewed
alongside real-time alerts in the Policy Violations domain.
C. This is not an option available in the alert definition tab of the user interface.
D. All following occurrences of this specific alert are ignored.
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-M75&qno=32
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 33
Which of the following problems is the Application User Translation feature designed to help
with?
A. The use of non-English parameter values in SQL statements issued by some
applications.
B. The fact that there exists no easy way for the application server to communicate with
bothGuardium and the data server concurrently.
C. The inability to relate a database action to a specific application user when a pool of
database connections is used by an application.
D. Translating an application s requests made to a data server so these are compatible
with all the database management systems thatGuardium supports.
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-M75&qno=33
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 34
Which of the following native SQL commands is required to link external data to internal data?
A. IMPORT
B. JOIN
C. ALTER
D. LINK
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-M75&qno=34
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 35
Which of the following is a valid use case for scheduled database auto-discovery?
A. Identifying new or rogue databases across environments, as well as new instances
that may have been created withinexisting, already discovered database services.
B. Automating the cataloging of new database instances so the administrator does not
have to perform this task manually.
C. Ensuring that S-TAP instances have the latest database configuration for all the
databases that are being monitored.
D. Database auto-discovery cannot be scheduled because the user must specify a series
of IP addresses and port rangeseverytime prior to running the process.
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-M75&qno=35
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 36
Which of the following is true about applying CAS templates to CAS hosts?
A. Each CAS Template can only be applied to one CAS host.
B. Instance-level changes can be made to the template items so that the same template
may be applied to many CAS hosts.
C. Applying CAS Templates will require the database management system on the CAS
host to be restarted.
D. CAS Templates are applied to collectors, which act as CAS hosts.
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-M75&qno=36
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 37
What is the simplest definition of a Guardium domain?
A. AGuardium entity containing a series of attributes.
B. Grouping of a set of tables and relationships between those tables providing a view
of the data thatGuardium stores.
C. A simple identification label to indicate ownership or control of aGuardium resource.
D. A model of aGuardium system describing the different entities involved in the
environment and their relationships.
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-M75&qno=37
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 38
What is the purpose of Guardium s Application Events API?
A. Adding application event data, such as user ID, event type and number, to the SQL
statements executed between an API no-op call and its release signal.
B. Being part of the pattern matching engine that evaluates statements for membership
in a specific security policy.
C. Enabling non-supported database engines to be used withGuardium.
D. The Application Events API is used to increase the speed at which Guardium
processes statements.
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-M75&qno=38
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 39
A developer has recently created a temporary database to test her new human resources
management application. To test it in a production-like environment, she copies the
MANAGERS table from the production server into her test database. This table includes
sensitive personal information. Which of the following will help the database auditor identify
this new database?
A. The database auditor can be notified by e-mail usingGuardium s scheduled database
auto- discovery feature.
B. The developer must create the new database usingGuardium s Application Events
API, which would show up on the Guardium interface as a change report.
C. The database auditor can be notified of new sensitive data by a previously scheduled
sensitive object discovery job.
D. The auditor cannot incorporate the new environment intoGuardium unless she is
given the exact details of the database and host system.
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-M75&qno=39
-------------------------------------------------------------------------------------------------------------------------------------
TwPass Certification Exam Features;
-
TwPass offers over 2500 Certification exams for professionals.
More than 98,800 Satisfied Customers Worldwide.
Average 99.8% Success Rate.
Over 120 Global Certification Vendors Covered.
Services of Professional & Certified Experts available via support.
Free 90 days updates to match real exam scenarios.
Instant Download Access! No Setup required.
Price as low as $19, which is 80% more cost effective than others.
Verified answers researched by industry experts.
Study Material updated on regular basis.
Questions / Answers are downloadable in PDF format.
Mobile Device Supported (Android, iPhone, iPod, iPad)
No authorization code required to open exam.
Portable anywhere.
Guaranteed Success.
Fast, helpful support 24x7.
View list of All Exams (AE);
http://www.twpass.com/twpass.com/vendors.aspx
Download Any Certication Exam DEMO.
http://www.twpass.com/twpass.com/vendors.aspx
To purchase Full version of exam click below;
http://www.TwPass.com/