Download as pdf or txt
Download as pdf or txt
You are on page 1of 14

Started on Monday, June 5, 2023, 5:30 AM

Back Next
State Finished
Completed on Monday, June 5, 2023, 5:59 AM
Time taken 28 mins 55 secs
Feedback Sorry, you did not pass the quiz for the
Storage for Data Resilience Level 1 V2
Quiz.

Question 1

Correct

Points out of 1.00

A client asks what they can do if they are victims of a cyber


warfare attack. What is the most reassuring advice you can
offer them?

Cyber warfare attacks do not affect an organization’s data;


they merely cause disruption.

There is really nothing an organization can do to 

completely prevent an attack; the best bet is to have


data protection and detection in place to allow for rapid
recovery and minimal impact.

Organizations can always recover from a cyber warfare


attack because they are always given the opportunity to
pay the ransom.

By budgeting in advance for an attack, the organization will


always be able to pay the ransom.
Question 2

Correct Back Next


Points out of 1.00

A client wants to be sure that their primary workloads have in-


depth data resilience capabilities. Which of the following is not
an IBM capability for primary workloads?

Data copies on array

Rapid recovery in minutes to hours

Full company workload recovery 

Short-term data retention

Question 3

Incorrect

Points out of 1.00

A client in a regulated industry must meet several compliance


and regulatory conditions. They are not sure what data they
own and what data they need to back up long-term, so they
back up everything, resulting in a very large backup
environment. A better solution to propose is a resilient set of
IBM Storage offerings that includes:

IBM Storage Virtualize, IBM Safeguarded Copy , and IBM


Copy Data Management

IBM Storage Protect Plus, Kubernetes, RedHat OpenShift,


and IBM Cloud Pak

IBM Storage Protect Plus, IBM Storage Protect for Cloud


Microsoft 365, IBM Storage Discover, and Predatar Cyber
Recovery Orchestration platform

IBM Storage Protect, IBM Storage Protect Plus, Red Hat 


Openshift on Azure, and IBM Safeguarded Copy with
IBM FlashSystem Cyber Vault
Question 4

Incorrect Back Next


Points out of 1.00

Your client does not know what IBM has to offer around cyber
resilience and asks you to discuss some cyber security
offerings. Which ones are good to lead with?

IBM QRadar SEIM, Splunk

IBM Transparent Cloud Tiering

IBM FlashSystem Cyber Vault

IBM FlashSystem with SafeGuarded Copy 

Question 5

Correct

Points out of 1.00

A client has heard that synchronous / asynchronous


replication is a safe way to replicate their data to a disaster
recovery site, and thus keep it from being corrupted. Which of
the following statements about replication is FALSE.

Replication is one of the primary attack points for


ransomware attackers.

If a replica is infected, now there are at least two, if not


more, corrupt copies of the data.

Replicated data is safe, secure, and capable of being 

recovered with no impact to the business.

If all data is replicated, any infections will likely also have


been replicated to the remote site.
Question 6

Incorrect Back Next


Points out of 1.00

A prospect is pretty confident that they have what they need to


be protected, so they don’t need another cyber resiliency
solution. What is a major IBM differentiator that sellers can use
to change their prospect’s mind?

Put the prospect in touch with a company that recently 


experienced a cyber attack, and let that organization
explain all of the trouble it caused them in data loss,
down time, cost, and customer satisfaction.

Send them our latest white paper, and then wait for them
to email back.

Offer the organization a free cyber resiliency assessment to


find out where their blind spots are.

Invite the client to visit an IBM Data Center to experience


first-hand the breadth of IBM’s offerings and capabilities.

Question 7

Incorrect

Points out of 1.00

A seller wants to emphasize to a client that IBM solutions are


capable of delivering all of the requirements for building a data
resilient environment? What are the top 3 capabilities that IBM
offers in this area?

Orchestration, Governance, Analytics

Asset Management, Governance, Risk Management 

Strategy

Automation, Recovery, Discovery

Self-tuning agility, air-gap, incremental forever backup


Question 8

Incorrect Back Next


Points out of 1.00

A client is reluctant to learn more about the importance of data


resiliency because they are confident that their existing
infrastructure is robust enough to protect their primary and
secondary workloads. What is one way you can help them
uncover blind spots before it is too late for them to recover?

Offer a free Cyber Resiliency Assessment

Invite the client to a personal briefing in an IBM data center

Present details about a forthcoming combined data 

resilience offer from IBM.

Offer a product Try-and-Buy

Question 9

Incorrect

Points out of 1.00

A seller has been talking about the importance of Discovery


capabilities in a data resilient environment. The client asks for
additional clarification. The seller explains that:

Discovery is about simplifying procedures that can 

accelerate recovery times.

Discovery is about checking data copies in an isolated


environment before restoring to production.

Discovery is about identifying recovery points after an


attack.

Discovery is about identifying copies of data that have been


infected.
Question 10

Incorrect Back Next


Points out of 1.00

What additional layer of protection does two-person integrity


add to IBM Safeguarded Copy’s already robust data resilience
capabilities?

One administrator to manage access control, the other 


to manage security

One administrator to grant approval, the other to perform


certain tasks

One administrator to manage systems, the other to manage


software

One administrator to manage recovery, the other to


perform backup tasks
Question 11

Incorrect Back Next


Points out of 1.00

A client asks, “How do I really know if I am being attacked?” A


seller might walk them through the best practices of data
resilience, focusing specifically on which of the following
capabilities within the overall IBM solution?

Immutability – creating secure, unchangeable copies of 


data that cannot be changed or deleted, to provide a
recovery point following an attack.

Recovery - Procedures and best practices for recovering


workloads in as little as hours vs. weeks, while also having
an isolated environment to check data copies before
restoring to the production environment

Automation - simplifying procedures that help in


accelerating recovery times, from simple to use GUsI with
orchestration, to full integration with existing cyber
security software.

Discovery - scanning copies of data to see if they are


infected, and reviewing performance statistics that  provide
indicators that something is not right.

Question 12

Correct

Points out of 1.00

A client wants to be sure that their secondary workloads have


in-depth data resilience capabilities. Which of the following is
not an IBM capability for secondary workloads?

Data copies off array

Minimal viable company recovery 

Recovery in hours to days

Long-term data retention


Question 13

Incorrect Back Next


Points out of 1.00

A client is leaning toward selecting IBM as their vendor of


choice for their data resilience needs. Which of the following
IBM Storage Data and Cyber Resiliency portfolio capabilities
probably helped them reach their decision?

IBM’s data and cyber resiliency offerings enable long-term


data retention for primary workloads.

IBM’s data and cyber resiliency offerings are capable 

preventing cyber and ransomware attacks and


safeguarding production data from infection.

IBM’s data and cyber resiliency offerings deliver


accelerated discovery, secure copies, and automation.

IBM’s data and cyber resiliency offerings ensure recovery


of primary workloads in a matter of hours.

Question 14

Incorrect

Points out of 1.00

A resilient, scalable hybrid cloud solution provides data


protection for which of the following?

File systems, databases, and applications, but not


containers
Applications and virtual environments, but not physical 
file servers

Physical file servers and on-premises environments

Physical file servers, applications, and virtual environments


Question 15

Incorrect Back Next


Points out of 1.00

A seller is presenting to a client who is just starting on the


journey to becoming data resilient. The client asks the seller to
explain what “immutable copies of data” are.  The best answer
is:

Immutable copies of data are always stored on tape 

systems with true air-gap capability.

Immutable copies of data can only be edited by individuals


with 2 or more levels of security clearance.

Immutable copies of data cannot be changed or deleted –


ever.

While an immutable copy of data can still be hacked, it


doesn’t matter because it is not in production.

Question 16

Incorrect

Points out of 1.00

A client wants to understand the difference between Cyber


Security and Cyber Resilience. How would you explain the
difference in simple terms?

Cyber Resilience enables organizations to predict, prevent,


and recover from attacks.

Cyber Security provides business recovery, secure


immutability, and accelerated discovery capabilities.

Cyber Security is about minimizing business impacts; 

Cyber Resilience is about preventing business impacts.

Cyber Security is about preventing business impacts; Cyber


Resilience is about minimizing business impacts.
Question 17

Incorrect Back Next


Points out of 1.00

A client does not understand the difference between a


ransomware attack and cyber warfare. How do you explain the
difference to them?

A ransomware attack is about the money; cyber warfare is


about a complete data wipe (production and backups).

There is no difference; in both cases, it is simply a matter of


paying a ransom and then having the system restored.

Organizations can prevent both kinds of attacks by building


up their defences to try and stop attackers from getting to
their data.

A ransomware attack can lie dormant and undetected 

for months; a cyber warfare attack is immediate and


undetectable.
Question 18

Correct Back Next


Points out of 1.00

After a long conversation with your client about the importance


of data resiliency, they are still convinced that they are safe
from attack, and even if they are attacked, they feel that
recovery will be easy. What can you say to hammer home the
fact that doing nothing about this the results can be extremely
costly, painful and time-consuming.

A recent IBM security study has shown that the time from
point of infection to ransom demand can now be a matter
of months.

Even though ransomware attacks are not that expensive in


the long term, the time to recover is still significant.

Ransomware attacks are about causing as much disruption


to the business as possible for as long as possible.

Cyber attacks are showing no signs of abating; recovery 


time after an attack averages 23 days.

Question 19

Incorrect

Points out of 1.00

A mid-size manufacturing company with branch offices


worldwide wants to implement a reliable cyber resiliency
strategy. What is the first step that sellers should follow to
progress an opportunity from general client interest to winning
the business?

Identify problems and barriers to success. 

Assess client blind spots.

Understand the client environment.

Craft the right deal structure.


Question 20

Correct Back Next


Points out of 1.00

To comprise a total solution, an IBM data resiliency deal


should be structured to include which of the following
elements?

IBM Storage Systems and IBM Storage Software

IBM Storage Software and IBM Security offerings

IBM Storage Systems, IBM Storage Software, IBM 

Security offerings, and IBM Lab Services

IBM Storage Software and IBM Lab Services

Question 21

Incorrect

Points out of 1.00

A client asks what a ransomware attacker is trying to


accomplish. Which of the following is the best response?

Get in and make their attack so dramatic that organizations


will be very afraid and do anything to protect themselves.

Get in and remain undetected for months, all the while 


causing long-term disruption.

Get in and disable, disrupt, destroy, or control an


organization’s computer systems.

Get in, lock up the data, put in the demand, get paid, and
get out as fast as possible.
Question 22

Correct Back Next


Points out of 1.00

A client wants to know what their chances are for experiencing


a cyber-attack. How would you respond?

If their business has not been attacked already, they are 


in the minority.

If their business has already been attacked, chances of a


repeat attack within a year are slim.

If their business has not been attacked by now, chances


are they will continue be safe from cyber-attack.

Before their business is attacked attacked, they should


 budget now for paying the ransom so that they have
funds available to pay when the attack comes.

Question 23

Incorrect

Points out of 1.00

In the win with the farm food provider,  what was the benefit
of leveraging key IBM Business Partners, Solutions II with Lab
Services to ensure the organization's continuing success?

They can keep organizations abreast of the latest IBM data


and cyber resilient offerings to ensure that the data center
remains on the cutting edge.

They can conduct ongoing Cyber Resiliency Assessments


to identify possible new problem areas.

They can help build a fully automated Cyber Vault solution


to make rapid recovery of critical workloads easy.

They can provide 24/7 support to address any and all 

client issues as they arise.


Question 24

Incorrect Back Next


Points out of 1.00

Which of the following statements is TRUE?

Cyber Security capabilities will prevent bad actors from


getting into an organization’s data systems.

Cyber security cannot predict when a cyber attack will


occur.

Cyber Security plus Data Protection do not equal cyber


resilience.

Cyber Security plus Data Protection equal cyber 

resilience.

Question 25

Incorrect

Points out of 1.00

An IBM Seller has just closed a deal with a long-standing


aerospace manufacturer who required lots of storage, but they
needed storage-level cyber resilience capabilities. What was
the first step the seller  took in identifying the opportunity?

Engaging the organization’s decision-makers

Assessing the client’s blind spots by performing a Cyber 


Resiliency Assessment (CRAT)

Understanding the environment

Positioning the problem statement

You might also like