00M-662 TestsExpert.com

Page 1

IBM CODE: 00M-662 Exam Name: IBM Security Systems Sales Mastery Test v2

http://www.testsexpert.com/00M-662.html

Type

Microsoft

1

IBM

Demo

HP Cisco Oracle Instant download after purchase

http://www.testsexpert.com/00M-662.html

Symantec


Question: 1 What lists of key words tell you a prospect is looking to buy a SIEM or Log Manager Product? A. Single Sign On (SSO ), Application Scanning, Mobile Device Management. B. RSA , ArcSight, Splunk, Nitro, Log Logic. C. Data encryption, Virus Protection, Private data protection. D. Stop hackers, Block Denial Of Service (DOS) attacks, Scan for Vulnerabilities.

Answer: D Question: 2 Why does the integration of network flow capture with behavioral analysis and anomaly detection provide greater security intelligence? A. Traffic profiling adds protection from zero-day threats. B. Correlation of threat data, flow data and system and application vulnerabilities enhances incident analysis. C. Network anomaly detection profiles user and system behavior and improves advanced threat protection. D. All of the above.

Answer: D Explanation:

Microsoft

2

IBM

HP Cisco Oracle Instant download after purchase

http://www.testsexpert.com/00M-662.html

Symantec


Reference: http://www. slideshare. net/IBMDK/2012-q3-advanced-threat-protection-and-security-intelligence-ibmsmarter-business-copenhagen (slide 15, see 3rd bullet and sub-bullets)

Question: 3 You’re involved in a highly competitive Enterprise Single Sign-On sale and the main competition is Oracle (with v-GO underpinning their solution). They have spread the word that TAM E-SSO requires a server and that they have a superior design because their solution is all client code. How would you respond? A. v-GO doesn’t work very well, with a lot of customer complaints about it. B. v-GO is an appliance and therefore is not very flexible, in terms of meeting customers’ specific needs. C. As a client-server solution, TAM E-SSO scales better than v-GO, v-GO requires an Active Directory (AD) Schema extension and they load down the AD infrastructure. D. V-GO hasn’t been certified by DARPA and TAM E-SSO has.

Answer: C Question: 4 Why does the X-Force research team analyze every vulnerability, providing valuable input into IBM’s services and technologies? A. To prove it has the best global R&D Security organization. B. To monitor the threat landscape, determining new attack vectors, and offering a higher level of protection. C. To understand the evolving threats and publishing the X-Force updates.

Microsoft

3

IBM

HP Cisco Oracle Instant download after purchase

http://www.testsexpert.com/00M-662.html

Symantec


D. To provide a subscription service to keep clients abreast of new threats.

Answer: B Explanation: Reference: ftp://public. dhe. ibm. com/software/uk/itsolutions/soa-connectivity/Securing_the_Enterprise. pdf (slide 8, second bulleted point)

Question: 5 What key feature can QRadar Log Manager do that the competition cannot? A. Detection and monitoring of Layer 7 (Application) traffic using a QFlow appliance. B. Upgrade to the full SIEM product through the use of a licence key update. C. Correlation of both Flow data and Event logs to alert on threats that others would miss. D. Search through event log data similar to “Google Search�.

Answer: A Question: 6 A client has IBM Security Desktop across their desktop clients, but not on the corporate endpoints. What is the best solution to propose if they are looking to consolidate vendors on the endpoint? A. IBM Security VSP, which will allow for virtualized protection, is the logical next technology.

Microsoft

4

IBM

HP Cisco Oracle Instant download after purchase

http://www.testsexpert.com/00M-662.html

Symantec


B. IBM Tivoli Endpoint Manager will be the natural evolution to extend the life of IBM Security Desktop. C. SELM service will enable the client to have appropriate logging without using on-site technology. D. Next Generation IPS is the best solution for long-term protection.

Answer: B Question: 7 What is the key to the significant time and money efficiencies that Tivoli Identity Manager (TIM) is able to afford customers? A. Quick install and time to operation. B. Support for a large number of target environments. C. Assignment of users to roles and provisioning policies based on roles rather than individual users. D. Graphical user interface that is far superior to the competition.

Answer: C Explanation: Reference: http://pic. dhe. ibm. com/infocenter/tivihelp/v2r1/index. jsp?topic=%2Fcom. ibm. itim. doc%2Fcpt%2Fcpt_ic_oview_featur_provisioning. html (Overview, see bulleted points)

Question: 8 Microsoft

5

IBM

HP Cisco Oracle Instant download after purchase

http://www.testsexpert.com/00M-662.html

Symantec


With Tivoli Federated Identity Manager, which of the following customer scenarios is to be addressed? A. The provisioning of identities to more than one domain or company. B. Strict management of privileged users’ identities to absolutely ensure there is no unauthorized sharing of their identities. C. Cross-domain single sign-on, whether the requester is an external user or an internal employee. D. Strong authentication requirements for any configuration.

Answer: C Explanation: Reference: http://www-01. ibm. com/common/ssi/cgibin/ssialias?infotype=an&subtype=ca&appname=gpateam&supplier=897&letternum=ENUS208-324 (key features, 3rd bullet)

Question: 9 Which of the following IBM Security solutions offers the quickest approaches in terms of demoing, estimating ROI and quick implementation? A. Tivoli Identity Manager. B. Tivoli zSecure suite. C. Tivoli Key Lifecycle Manager. D. Tivoli Access Manager for Single Sign-On.

Answer: B Microsoft

6

IBM

HP Cisco Oracle Instant download after purchase

http://www.testsexpert.com/00M-662.html

Symantec


Question: 10 Your clients have expressed an interest in identity and access management, including comprehensive single sign-on, and have also indicated an interest in ensuring that the solution includes a capability where they are able to measure how they will do when they face future PCI-DSS audits. What IBM security solution is the best match for these clients? A. Tivoli Identity and Access Assurance. B. Tivoli Identity and Access Manager. C. Tivoli Data and Application Security. D. Tivoli Security Information and Access Manager.

Answer: B Explanation: Reference: http://www. redbooks. ibm. com/redbooks/pdfs/sg247350. pdf (page 97, business requirements, 3rd bullet)

Microsoft

7

IBM

HP Cisco Oracle Instant download after purchase

http://www.testsexpert.com/00M-662.html

Symantec


IBM CODE: 00M-662 Exam Name: IBM Security Systems Sales Mastery Test v2

http://www.testsexpert.com/00M-662.html Microsoft

Cisco

IBM

MCTS 70-177

CCNA 640-802 640-822 640-816 640-460

MBS 98-361 98-366

CCNP 642-832 642-813 642-825 642-845

000-G01 000-M44

MCAS 77-602

CCSP 642-627 642-637 642-647 642-545

000-444 000-910

MCSE 70-282

CCIE 350-001 350-018 350-029 350-060

COG-105 COG-185

MCSA 2003 70-461 70-620

DATA CENTER 642-972 642-973 642-974 642-975

70-162 70-462

MB3-861

77-601 77-604 70-281 70-284 70-680

70-463

MB3-862

77-605 70-285

70-291

Microsoft

8

IBM

IBM Lotus

000-M42 000-M60

000-M41 000-M62

IBM Mastery

000-M43 000-M45

Solutions Expert

000-640 000-913

IBM Cognos

COG-180 COG-200

IBM Specialist

000-005 000-032

000-015 000-042

HP

Other

AIS

70-323 9L0-063 9L0-010 9L0-517 HP2-E53 70-321 650-179 1Y0-A20 00M-646 MB2-876 646-206 9L0-314 MB6-884 220-701 650-196 3305 MB6-871 HP2-Z22 9L0-407 9A0-146 HP2-H23 000-184 1Z0-527 HP2-B91 000-781 M70-201 M70-101 7004 HP3-X11 HP3-X08

HP0-311

HP0-M28

HP0-A25

HP0-M30

APC

HP0-D11 HP0-S29

HP0-J37 HP0-P14

MASE HP0-J33 HP0-M48 HP0-M49 HP0-M50 ASE

HP0-066 HP0-781

HP0-082 HP0-782

CSE

HP0-090 HP0-277

HP0-276 HP0-760

HP Cisco Oracle Instant download after purchase

http://www.testsexpert.com/00M-662.html

Symantec


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.