0% found this document useful (0 votes)
6 views

---Storage for Data Resilience Level 1 V2 Quiz

The document details a quiz on IBM Storage for Data Resilience Level 1, completed on March 31, 2023, taking 18 hours and 31 minutes. It includes questions and correct answers regarding IBM's data resilience capabilities, cyber security, and strategies for client engagement. The quiz emphasizes the importance of understanding cyber resilience and the differences between various types of attacks and recovery strategies.

Uploaded by

elismgr3
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views

---Storage for Data Resilience Level 1 V2 Quiz

The document details a quiz on IBM Storage for Data Resilience Level 1, completed on March 31, 2023, taking 18 hours and 31 minutes. It includes questions and correct answers regarding IBM's data resilience capabilities, cyber security, and strategies for client engagement. The quiz emphasizes the importance of understanding cyber resilience and the differences between various types of attacks and recovery strategies.

Uploaded by

elismgr3
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

Started on Friday, March 31, 2023, 5:11 AM

Back Next
State Finished
Completed on Friday, March 31, 2023, 11:43 PM
Time taken 18 hours 31 mins
Feedback Congratulations, you passed the quiz for IBM Storage
for Data Resilience Level 1 V2 Quiz!

Question 1 A client is leaning toward selecting IBM as their vendor of


Correct
choice for their data resilience needs. Which of the
following IBM Storage Data and Cyber Resiliency portfolio
Points out of
capabilities probably helped them reach their decision?
1.00

IBM’s data and cyber resiliency offerings are capable


preventing cyber and ransomware attacks and
safeguarding production data from infection.

IBM’s data and cyber resiliency offerings deliver 

accelerated discovery, secure copies, and


automation.

IBM’s data and cyber resiliency offerings ensure


recovery of primary workloads in a matter of hours.

IBM’s data and cyber resiliency offerings enable


long-term data retention for primary workloads.

Question 2 What additional layer of protection does two-person


Correct integrity add to IBM Safeguarded Copy’s already robust
data resilience capabilities?
Points out of
1.00
One administrator to grant approval, the other to 
perform certain tasks

One administrator to manage access control, the


other to manage security

One administrator to manage systems, the other to


manage software

One administrator to manage recovery, the other to


perform backup tasks
Question 3 A client wants to be sure that their primary workloads
Correct have in-depth data resilience capabilities. Which of the
following is not an IBM capability for primary workloads? Back Next
Points out of
1.00
Data copies on array

Rapid recovery in minutes to hours

Short-term data retention

Full company workload recovery 

Question 4 A client is reluctant to learn more about the importance


Correct of data resiliency because they are confident that their
existing infrastructure is robust enough to protect their
Points out of
primary and secondary workloads. What is one way you
1.00
can help them uncover blind spots before it is too late for
them to recover?

Present details about a forthcoming combined data


resilience offer from IBM.

Offer a product Try-and-Buy

Offer a free Cyber Resiliency Assessment 

Invite the client to a personal briefing in an IBM data


center

Question 5 A client wants to understand the difference between


Correct Cyber Security and Cyber Resilience. How would you
explain the difference in simple terms?
Points out of
1.00
Cyber Security provides business recovery, secure
immutability, and accelerated discovery capabilities.

Cyber Resilience enables organizations to predict,


prevent, and recover from attacks.

Cyber Security is about minimizing business impacts;


Cyber Resilience is about preventing business
impacts.

Cyber Security is about preventing business 

impacts; Cyber Resilience is about minimizing


business impacts.
Question 6 Your client does not know what IBM has to offer around
Correct cyber resilience and asks you to discuss some cyber
security offerings. Which ones are good to lead with? Back Next
Points out of
1.00
IBM FlashSystem Cyber Vault

IBM QRadar SEIM, Splunk 

IBM Transparent Cloud Tiering

IBM FlashSystem with SafeGuarded Copy

Question 7 A client wants to know what their chances are for


Correct experiencing a cyber-attack. How would you respond?

Points out of 
If their business has not been attacked already,
1.00
they are in the minority.

If their business has already been attacked, chances


of a repeat attack within a year are slim.

Before their business is attacked attacked, they


should budget now for paying the ransom so that
they have funds available to pay when the attack
comes.
If their business has not been attacked by now,
chances are they will continue be safe from cyber-
attack.

Question 8 A prospect is pretty confident that they have what they


Correct need to be protected, so they don’t need another cyber
resiliency solution. What is a major IBM differentiator
Points out of
that sellers can use to change their prospect’s mind?
1.00

Offer the organization a free cyber resiliency 

assessment to find out where their blind spots


are.

Put the prospect in touch with a company that


recently experienced a cyber attack, and let that
organization explain all of the trouble it caused them
in data loss, down time, cost, and customer
satisfaction.

Invite the client to visit an IBM Data Center to


experience first-hand the breadth of IBM’s offerings
and capabilities.

Send them our latest white paper, and then wait for
them to email back.
Question 9 A client asks what they can do if they are victims of a
Correct cyber warfare attack. What is the most reassuring advice
you can offer them? Back Next
Points out of
1.00
Organizations can always recover from a cyber
warfare attack because they are always given the
opportunity to pay the ransom.

By budgeting in advance for an attack, the


organization will always be able to pay the ransom.

There is really nothing an organization can do to 

completely prevent an attack; the best bet is to


have data protection and detection in place to
allow for rapid recovery and minimal impact.

Cyber warfare attacks do not affect an organization’s


data; they merely cause disruption.

Question 10 Which of the following statements is TRUE?


Correct
Cyber Security plus Data Protection equal cyber
Points out of
resilience.
1.00
Cyber security cannot predict when a cyber attack
will occur.

Cyber Security capabilities will prevent bad actors


from getting into an organization’s data systems.

Cyber Security plus Data Protection do not equal 


cyber resilience.

Question 11 A client wants to be sure that their secondary workloads


Correct have in-depth data resilience capabilities. Which of the
following is not an IBM capability for secondary
Points out of
workloads?
1.00

Long-term data retention

Recovery in hours to days

Minimal viable company recovery 

Data copies off array


Question 12 A seller wants to emphasize to a client that IBM solutions
Correct are capable of delivering all of the requirements for
building a data resilient environment? What are the top 3 Back Next
Points out of
capabilities that IBM offers in this area?
1.00

Self-tuning agility, air-gap, incremental forever


backup

Automation, Recovery, Discovery 

Orchestration, Governance, Analytics

Asset Management, Governance, Risk Management


Strategy

Question 13 A resilient, scalable hybrid cloud solution provides data


Correct protection for which of the following?

Points out of
Physical file servers and on-premises environments
1.00
Physical file servers, applications, and virtual 

environments

File systems, databases, and applications, but not


containers
Applications and virtual environments, but not
physical file servers

Question 14 A seller is presenting to a client who is just starting on the


Correct journey to becoming data resilient. The client asks the
seller to explain what “immutable copies of data” are.
Points out of
The best answer is:
1.00

Immutable copies of data can only be edited by


individuals with 2 or more levels of security
clearance.

While an immutable copy of data can still be hacked,


it doesn’t matter because it is not in production.

Immutable copies of data cannot be changed or 

deleted – ever.

Immutable copies of data are always stored on tape


systems with true air-gap capability.
Question 15 A client asks what a ransomware attacker is trying to
Correct accomplish. Which of the following is the best response?
Back Next
Points out of
Get in and remain undetected for months, all the
1.00
while causing long-term disruption.

Get in and disable, disrupt, destroy, or control an


organization’s computer systems.

Get in and make their attack so dramatic that


organizations will be very afraid and do anything to
protect themselves.

Get in, lock up the data, put in the demand, get 

paid, and get out as fast as possible.

Question 16 A seller has been talking about the importance of


Correct Discovery capabilities in a data resilient environment. The
client asks for additional clarification. The seller explains
Points out of
that:
1.00

Discovery is about simplifying procedures that can


accelerate recovery times.

Discovery is about identifying recovery points after


an attack.

Discovery is about identifying copies of data that 


have been infected.

Discovery is about checking data copies in an


isolated environment before restoring to production.

Question 17 In the win with the farm food provider, what was the
Correct benefit of leveraging key IBM Business Partners,
Solutions II with Lab Services to ensure the
Points out of
organization's continuing success?
1.00

They can conduct ongoing Cyber Resiliency


Assessments to identify possible new problem areas.

They can keep organizations abreast of the latest


IBM data and cyber resilient offerings to ensure that
the data center remains on the cutting edge.

They can help build a fully automated Cyber Vault 


solution to make rapid recovery of critical
workloads easy.

They can provide 24/7 support to address any and all


client issues as they arise.
Question 18 After a long conversation with your client about the
Correct importance of data resiliency, they are still convinced that
they are safe from attack, and even if they are attacked, Back Next
Points out of
they feel that recovery will be easy. What can you say to
1.00
hammer home the fact that doing nothing about this the
results can be extremely costly, painful and time-
consuming.

A recent IBM security study has shown that the time


from point of infection to ransom demand can now
be a matter of months.

Ransomware attacks are about causing as much


disruption to the business as possible for as long as
possible.

Cyber attacks are showing no signs of abating; 

recovery time after an attack averages 23 days.

Even though ransomware attacks are not that


expensive in the long term, the time to recover is still
significant.

Question 19 A client asks, “How do I really know if I am being


Correct attacked?” A seller might walk them through the best
practices of data resilience, focusing specifically on which
Points out of
of the following capabilities within the overall IBM
1.00
solution?

Discovery - scanning copies of data to see if they 


are infected, and reviewing performance statistics
that provide indicators that something is not
right.

Recovery - Procedures and best practices for


recovering workloads in as little as hours vs. weeks,
while also having an isolated environment to check
data copies before restoring to the production
environment

Automation - simplifying procedures that help in


accelerating recovery times, from simple to use GUsI
with orchestration, to full integration with existing
cyber security software.

Immutability – creating secure, unchangeable copies


of data that cannot be changed or deleted, to provide
a recovery point following an attack.
Question 20 A client in a regulated industry must meet several
Correct compliance and regulatory conditions. They are not sure
what data they own and what data they need to back up Back Next
Points out of
long-term, so they back up everything, resulting in a very
1.00
large backup environment. A better solution to propose is
a resilient set of IBM Storage offerings that includes:

IBM Storage Protect, IBM Storage Protect Plus, Red


Hat Openshift on Azure, and IBM Safeguarded Copy
with IBM FlashSystem Cyber Vault

IBM Storage Protect Plus, IBM Storage Protect for 


Cloud Microsoft 365, IBM Storage Discover, and
Predatar Cyber Recovery Orchestration platform

IBM Storage Protect Plus, Kubernetes, RedHat


OpenShift, and IBM Cloud Pak

IBM Storage Virtualize, IBM Safeguarded Copy , and


IBM Copy Data Management

Question 21 A client does not understand the difference between a


Correct ransomware attack and cyber warfare. How do you
explain the difference to them?
Points out of
1.00
There is no difference; in both cases, it is simply a
matter of paying a ransom and then having the
system restored.

Organizations can prevent both kinds of attacks by


building up their defences to try and stop attackers
from getting to their data.

A ransomware attack can lie dormant and


undetected for months; a cyber warfare attack is
immediate and undetectable.

A ransomware attack is about the money; cyber 

warfare is about a complete data wipe


(production and backups).
Question 22 An IBM Seller has just closed a deal with a long-
Correct standing aerospace manufacturer who required lots of
storage, but they needed storage-level cyber resilience Back Next
Points out of
capabilities. What was the first step the seller took in
1.00
identifying the opportunity?

Positioning the problem statement

Understanding the environment 

Assessing the client’s blind spots by performing a


Cyber Resiliency Assessment (CRAT)

Engaging the organization’s decision-makers

Question 23 A mid-size manufacturing company with branch offices


Correct worldwide wants to implement a reliable cyber resiliency
strategy. What is the first step that sellers should follow
Points out of
to progress an opportunity from general client interest to
1.00
winning the business?

Identify problems and barriers to success.

Understand the client environment. 

Craft the right deal structure.

Assess client blind spots.

Question 24 To comprise a total solution, an IBM data resiliency deal


Correct should be structured to include which of the following
elements?
Points out of
1.00
IBM Storage Software and IBM Security offerings

IBM Storage Systems and IBM Storage Software

IBM Storage Software and IBM Lab Services

IBM Storage Systems, IBM Storage Software, IBM 


Security offerings, and IBM Lab Services
Question 25 A client has heard that synchronous / asynchronous
Correct replication is a safe way to replicate their data to a
disaster recovery site, and thus keep it from being Back Next
Points out of
corrupted. Which of the following statements about
1.00
replication is FALSE.

Replicated data is safe, secure, and capable of 

being recovered with no impact to the business.

If a replica is infected, now there are at least two, if


not more, corrupt copies of the data.

If all data is replicated, any infections will likely also


have been replicated to the remote site.

Replication is one of the primary attack points for


ransomware attackers.

You might also like