0% found this document useful (0 votes)
28 views

Data Resilience With Flash Level 1 Quiz PDF

Uploaded by

fgisberth
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
28 views

Data Resilience With Flash Level 1 Quiz PDF

Uploaded by

fgisberth
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

24/09/2022, 07:35 Your Learning

Encuesta

Data Resilience with Flash Level 1 - Quiz

¡Enhorabuena, lo logró!

Su puntaje Puntaje para Fecha


aprobar
100% (25 de 25) respondió 24 Sep
correctamente 75% 2022

Revisar resultados de la encuesta

25 respuestas correctas

Pregunta 1
IBM Safeguarded Copy for Spectrum Virtualize delivers fast, safe, recovery of a client’s data by
creating immutable copies that are not visible to hackers and bad actors. What capability of
the infrastructure makes this possible?

WORM (Write Once Read Many)

Tape

Air gap

Encryption

Pregunta 2
Hybrid cloud momentum is accelerating. What percentage of new applications are expected by
analysts to be cloud-native by 2025?

Inicio Recomendaciones Aprendizaje Buscar Más


This study source was downloaded by 100000853572443 from CourseHero.com on 05-15-2024 11:10:18 GMT -05:00

https://yourlearning.ibm.com/quiz-scores/QUIZ-6E9CD4D6CA8F/2022-09-24T12:13:42.904Z?planId=PLAN-21262CCE9E29&sectionId=SECTION-A 1/9
https://www.coursehero.com/file/170401675/Data-Resilience-with-Flash-Level-1-Quizpdf/
24/09/2022, 07:35 Your Learning
90%

60%

75%

80%

Pregunta 3
Why can’t Safeguarded Copies of data be changed once they are created?

They can’t be accessed from any server to make changes

They are encrypted, but the encryption key is destroyed

They are password protected

They are removed from the system and put in a vault

Pregunta 4
What is the average timeframe needed to identify and contain a data breach?

1 - 3 months

9 - 12 months

1 - 3 weeks

9 -12 weeks

Pregunta 5
Which the following is NOT a key attribute of IBM Safeguarded Copy?

Safeguarded Copy creates immutable copies (unchangeable)

Safeguarded Copy schedules automated copies

Inicio Recomendaciones Aprendizaje Buscar Más


This study source was downloaded by 100000853572443 from CourseHero.com on 05-15-2024 11:10:18 GMT -05:00

https://yourlearning.ibm.com/quiz-scores/QUIZ-6E9CD4D6CA8F/2022-09-24T12:13:42.904Z?planId=PLAN-21262CCE9E29&sectionId=SECTION-A 2/9
https://www.coursehero.com/file/170401675/Data-Resilience-with-Flash-Level-1-Quizpdf/
24/09/2022, 07:35 Your Learning
Safeguarded Copy stores the copies on a second array

Safeguarded Copy creates isolated copies (Air Gap)

Pregunta 6
What is the name of IBM’s no-charge cyber assessment program that identifies gaps,
strengths, and weaknesses against best practices?

Cyber Incident Response Storage Assessment

Storage Cyber Resiliency Assessment Tool

Cyber Vault Data Recovery System Validation

Cyberdyne 2000 Resiliency Assessment Tool

Pregunta 7
What does IBM recommend when it comes to creating a Cyber Vault environment?

Having a dedicated and shared Cyber Vault environment

Having a dedicated and isolated Cyber Vault environment

Having a shared bare metal plus VMware Cyber Vault environment

Having a shared but isolated Cyber Vault environment

Pregunta 8
Which of the following is NOT a reason that Safeguarded Copy (immutable copies) prevents
modifications or deletion of copies?

Ransomware attack

Expiring software licenses

Malicious destruction

Inicio User error


Recomendaciones Aprendizaje
This study source was downloaded by 100000853572443 from CourseHero.com on 05-15-2024 11:10:18 GMT -05:00
Buscar Más

https://yourlearning.ibm.com/quiz-scores/QUIZ-6E9CD4D6CA8F/2022-09-24T12:13:42.904Z?planId=PLAN-21262CCE9E29&sectionId=SECTION-A 3/9
https://www.coursehero.com/file/170401675/Data-Resilience-with-Flash-Level-1-Quizpdf/
24/09/2022, 07:35 Your Learning

Pregunta 9
In today’s world of cyber threats, it is increasingly important that storage arrays start with a
resilient foundation. What feature or ability helps provide data theft protection?

Remote replication

Encryption

HyperSwap

High availability

Pregunta 10
In a Cyber Vault workflow, which copy of data should be restored to production after an attack?

The first copy that was taken after an attack was detected

None, just pay the ransom

The first copy that is proven to be clean after being tested and validated

The most recent copy

Pregunta 11
In 2021, what was the average cost of ransomware (in USD)?

$4.4 million

$5.2 million

$11 million

$53 billion

Pregunta 12
Inicio Recomendaciones Aprendizaje Buscar Más
This study source was downloaded by 100000853572443 from CourseHero.com on 05-15-2024 11:10:18 GMT -05:00

https://yourlearning.ibm.com/quiz-scores/QUIZ-6E9CD4D6CA8F/2022-09-24T12:13:42.904Z?planId=PLAN-21262CCE9E29&sectionId=SECTION-A 4/9
https://www.coursehero.com/file/170401675/Data-Resilience-with-Flash-Level-1-Quizpdf/
24/09/2022, 07:35 Your Learning

IBM Chairman and Chief Executive Officer, Arvind Krishna, has presented five key
commitments and initiatives around digital defenses (Cyber Security/Cyber Resilience). How
many of the five commitments involve storage?

Pregunta 13
You're talking to a client about cyber resiliency. They ask "Do traditional replication strategies
protect us from cyber attacks?" What is your answer?

Yes, they prevent them

Yes, if you have three-site replication, at least one will remain uninfected

Yes, if data is replicated to a remote secondary site

No, they can replicate logical errors and malware

Pregunta 14
You're talking to a client about how IBM Security and IBM Software can minimize the impact of
a cyber attack. What unique capability do you want to ensure a client realizes they get when
they use IBM Storage with QRadar as part of their cyber resiliency strategy?

QRadar can alert the user to an attack

They both use the same login credentials

Safeguarded Copies can be deleted by QRadar

QRadar can initiate a Safeguarded Copy of any application data that is not believed
to be impacted yet

Inicio Recomendaciones Aprendizaje Buscar Más


This study source Pregunta 15 by 100000853572443 from CourseHero.com on 05-15-2024 11:10:18 GMT -05:00
was downloaded

https://yourlearning.ibm.com/quiz-scores/QUIZ-6E9CD4D6CA8F/2022-09-24T12:13:42.904Z?planId=PLAN-21262CCE9E29&sectionId=SECTION-A 5/9
https://www.coursehero.com/file/170401675/Data-Resilience-with-Flash-Level-1-Quizpdf/
24/09/2022, 07:35 Your Learning

You're putting together a whiteboard about cyber resiliency, and want to capture a client's
attention with respect to continuity of business. What statistic should you quote as the average
time needed to recover once a cyber attack has been discovered?

9 months

3 months

23 days

1.5 hours

Pregunta 16
What is the name of the function, found in many FlashSystem arrays, that reduces the impact
of cyber threats like ransomware, and provides very fast recovery?

Spectrum Protect

Safeguarded Copy

Data Encryption

Backup Enabled Snapshots

Pregunta 17
When it comes to using Safeguarded Copy to obtain good reliable data, after a cyber incident,
what does IBM recommend a client do?

Asynchronously replicate the hidden immutable copies to a second clean site

Recover data to production as soon as an attack is detected

Recover to a Cyber Vault environment to test/validate data before restore to


production

None of these are IBM recommendations

Pregunta 18
Inicio Recomendaciones Aprendizaje Buscar Más
This study source What is the by
was downloaded key value of IBM's
100000853572443 Cyber Vaultonsolution?
from CourseHero.com 05-15-2024 11:10:18 GMT -05:00

https://yourlearning.ibm.com/quiz-scores/QUIZ-6E9CD4D6CA8F/2022-09-24T12:13:42.904Z?planId=PLAN-21262CCE9E29&sectionId=SECTION-A 6/9
https://www.coursehero.com/file/170401675/Data-Resilience-with-Flash-Level-1-Quizpdf/
24/09/2022, 07:35 Your Learning

It's low cost

It is based on industry-leading hardware

Safeguarded copy

Rapid recovery of critical workloads after an attack

Pregunta 19
Which item below is NOT a step to implementing a Cyber Vault environment?

Make immutable copies of data

Automate processess

Test copies of data

Take "FlashCopy"s

Pregunta 20
Which of the following is NOT a capability of Cyber Vault?

Forensic analysis

Online backup

Surgical recovery

Data validation

Pregunta 21
Which of the following data resilience or data recovery approaches likely offers the fastest
recovery (lowest Recovery Point Objective and Recovery Time Objective) after a cyber
incident?

Worm tape
Inicio Recomendaciones Aprendizaje Buscar Más
This study source was downloaded by 100000853572443 from CourseHero.com on 05-15-2024 11:10:18 GMT -05:00

https://yourlearning.ibm.com/quiz-scores/QUIZ-6E9CD4D6CA8F/2022-09-24T12:13:42.904Z?planId=PLAN-21262CCE9E29&sectionId=SECTION-A 7/9
https://www.coursehero.com/file/170401675/Data-Resilience-with-Flash-Level-1-Quizpdf/
24/09/2022, 07:35 Your Learning
Standard tape

Spectrum Protect snapshots

Safeguarded Copy

Pregunta 22
Which of the following is NOT a step in implementing a Cyber Vault solution?

Cyber Vault Data Recovery System Validation

CVSA Discovery and Architecture Workshop

Cyber Vault code update to IBM FlashSystem

Cyber Vault Installation and Configuration

Pregunta 23
What is the first step a client should take to build a Cyber Resiliency plan?

Take an IBM Cyber Assessment

Get a demo of FlashSystem performance

Read a spec sheet

Get a FlashSystem briefing

Pregunta 24
What is the average total cost of a data breach?

Between 1 and 2 million US dollars

Between 8 and 9 million US dollars

Between 4 and 5 million US dollars

Inicio Recomendaciones Aprendizaje Buscar Más


This study source was downloaded by 100000853572443 from CourseHero.com on 05-15-2024 11:10:18 GMT -05:00

https://yourlearning.ibm.com/quiz-scores/QUIZ-6E9CD4D6CA8F/2022-09-24T12:13:42.904Z?planId=PLAN-21262CCE9E29&sectionId=SECTION-A 8/9
https://www.coursehero.com/file/170401675/Data-Resilience-with-Flash-Level-1-Quizpdf/
24/09/2022, 07:35 Your Learning
Between 500,000 and 1 million US dollars

Pregunta 25
Which IBM software can be used to deliver real-time monitoring of data activity for immediate
response to breaches or suspicious behavior?

QRadar

Cybersecure

Guardium

AppScan

Done (Finalizada)

Inicio Recomendaciones Aprendizaje Buscar Más


This study source was downloaded by 100000853572443 from CourseHero.com on 05-15-2024 11:10:18 GMT -05:00

https://yourlearning.ibm.com/quiz-scores/QUIZ-6E9CD4D6CA8F/2022-09-24T12:13:42.904Z?planId=PLAN-21262CCE9E29&sectionId=SECTION-A 9/9
https://www.coursehero.com/file/170401675/Data-Resilience-with-Flash-Level-1-Quizpdf/
Powered by TCPDF (www.tcpdf.org)

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy