Data Resilience With Flash Level 1 Quiz

Download as pdf or txt
Download as pdf or txt
You are on page 1of 11

Data Resilience with Flash Level 1

Quiz Back Next

You must receive a score of 75% or higher on the quiz to complete


the course.

Started on Friday, May 17, 2024, 4:14 PM


State Finished
Completed on Friday, May 17, 2024, 4:25 PM
Time taken 10 mins 40 secs
Feedback Congratulations, you have passed the
quiz!

Question 1

Correct

Points out of 1.00

A seller has noticed that their clients seem burned out by


hearing multiple vendors talk about endless data protection
details. The client asks the seller to briefly sum up what goes
into delivering data resilience. The seller responds by talking
about the three pillars of data resilience. What are those
pillars?

Early detection, safe recovery, and integration with 


Security Operations (SecOps) workflows
Early detection sensors, safe recovery orchestration,
Security Operations (SecOps) integration
Storage for Data Resilience, Storage for Data and AI,
Storage for Hybrid Cloud
Cyber Resiliency Assessment, Software-as-a-Service
control panel, immutable copies of data
Question 2

Correct

Points out of 1.00

Back Next

A client is reluctant to implement a data resilience solution.


Which of the following seller responses could drive home the
risks of “doing nothing?”

When an organization does nothing, the typical time 


from point of attack to recovery can be 23 days,
costing the business both financial and customer
satisfaction losses.
If the organization has deployed a combination of data
resilience offerings from multiple vendors, the chances of
their exposure to a cyber incident are practically zero.

When a ransomware attack occurs, simply pay the ransom


within 24 hours and continue with business as usual.

A knowledgeable data administrator can detect an attack


within a day after it occurs, thereby limiting the impact of
data loss and downtime.
Question 3

Correct

Points out of 1.00

Back Next

In early client conversations to create the need to implement


a data resilient environment to aid in business continuity, what
is the best approach for sellers to take?

Invite clients to an executive briefing where then can see


what “good” really looks like, then follow this with a
proposal for a solution that would meet the client’s
needs.
Have a business conversation with C-suite upper 

management, including the risk officer and security


officer, to create awareness of the importance of data
resilience.

Have a technology conversation with management –


administrators and backup administrators – with a focus
on IBM’s data resilience offerings as best in the market
for protecting their data.

Present a live demo to the main stakeholders, highlighting


the uniqueness of IBM’s data resilience offerings and
focusing on capabilities, features, and benefits.
Question 4

Correct

Points out of 1.00

Back Next

The Chief Technology Officer (CTO) of a major financial


institution is reviewing their data resilience plans. The CTO is
trying to help his organization simplify operations, add the
ability to test and prove recoverability, and integrate cyber
security and cyber resiliency. What step in IBM’s approach to
Data Resilience would help address the CTO’s concerns?

Discovery

Automation 
Recovery

Immutability

Question 5

Correct

Points out of 1.00

A seller receives a phone call from the Chief Security Officer


(CSO) of a large hospital. The CSO states they are interested in
a free offering from IBM that could help with their upcoming
data resiliency transformation. What offering should the seller
present to the CSO?

IBM's Cyber Incident Response Storage Assessment

IBM's Cyberdyne 2000 Resiliency Assessment Tool

IBM's Cyber Resiliency Assessment 


IBM's Cyber Vault Data Recovery System Validation
Question 6

Correct

Points out of 1.00

Back Next

Significant operational resilience regulations are now in effect


in the European Union (EU) and will likely spread to other
geographies. Sellers want to ensure that their clients are
aware of these regulations and are taking steps to be
compliant. Which of the following DOES NOTdeal with
operational resilience regulations.

The General Data Protection Regulation is a data privacy


regulation from Europe that grants rights to individuals in
the European Union and the European Economic Area
(EU/EEA) over how their personal information gets
processed, both online and offline.

The Network and Information Security Directive (NIS2)


provides legal measures requiring EU members to be
appropriately equipped to address coordinated attacks.

The Bureau of Consumer Protection (BCP) stops 


unfair, deceptive, and fraudulent business practices;
develops rules to maintain a fair marketplace; and
educate consumers about their rights and
responsibilities.

The Digital Operational Resilience Act (DORA) is a


regulatory framework requiring all businesses to ensure
they can withstand, respond to, and recover from all types
of information and communications technology (ICT)
related disruptions and threats.
Question 7

Incorrect

Points out of 1.00

Back Next

During conversations with new clients around data resiliency,


what recommendation should sellers make before ending the
call?

Urge the clients to take advantage of a free Cyber


Resiliency Assessment from IBM.

Take the clients to an IBM Data Center for a personalized


presentation tailored to their specific needs.

Present a live demonstration of IBM’s data resiliency 


offerings at the client site.

Suggest that the seller follow up with a proposal for a


data resiliency solution from IBM.
Question 8

Correct

Points out of 1.00

Back Next

During a meeting, a client interrupts and asks what is meant


by the term “minimum viable recovery?.” Which of the
following definitions should be given to them?

Recovery of all workloads, including non-critical


workloads for back-office, and so forth, which must be
recovered so the company can experience business as
usual

Recovery of offsite air-gapped data copies, which then


can be used to guarantee that a complete data restoration
can occur

Recovery of critical workloads that are making the 


business money every second of the day and therefore
need to be recovered as quickly as possible to
minimize business disruption.

Recovery of word processing, email, and corporate web


pages so people outside the company do not notice
anything unusual occurring
Question 9

Correct

Points out of 1.00

Back Next

While talking to a Chief Security Officer (CS0) about cyber


security, they say they feel safe because they have data
protection and disaster recovery (DR) capabilities in place to
recover from system failures and natural disasters. What
would be a good response to give them?

If the organization is attacked, they can simply recover


from backups.

With synchronous or asynchronous replication to a


disaster recovery site, an undetected infection cannot be
replicated to the remote site.

Unfortunately, data protection and disaster recovery 


are not the same as cyber resilience, and it doesn't
matter whose solution the organization has because it
is not possible to have 100% absolute cyber security.
If these defenses are in place, the business is 100%
protected.
Question 10

Correct

Points out of 1.00

Back Next

As a seller talks to a Chief Technology Officer (CTO) about


cyber resiliency, the client asks, "Do traditional replication
strategies protect us from cyber-attacks?" What is the seller's
answer?

Yes, because traditional strategies and NVMe (Non-


Volatile Memory express) technology can provide 100%
protection.

Yes, if the data is replicated as compressed information to


a remote secondary site.

Maybe, but only if the organization has three-site


replication, because at least one site will remain
uninfected.

No, unfortunately traditional strategies will likely 


replicate logical errors and malware to your remote
site.

Question 11

Correct

Points out of 1.00

A seller is preparing to hold a cyber resiliency meeting with a


big client and wants to capture their attention regarding
business continuity. What statistic could the seller quote as
the average time needed to recover once a cyber-attack has
been discovered?

23 days 
9 months

1.5 days

3 months
Question 12

Correct

Points out of 1.00

Back Next

At the end of a cyber resiliency conversation with a client


about IBM Storage Defender, the seller reminds them that
accurately detecting threats is possible, but it requires
something. What does it require?

It requires IBM’s Cyber Resiliency Assessment tool


coupled with high performance flash.

It requires multiple sensors where each sensor helps 


to corroborate the threat.

It requires a single, high-activity Disaster Recovery sensor


with advanced threat detection.

It requires immutable copies of data being kept on tape to


create a physical air gap.

Question 13

Correct

Points out of 1.00

It is important to help clients understand what “good” looks


like. In order to have “good,” an organization must be able to
create secure copies of their data. And while it is important to
focus on recovery speed, it is also important to keep looking
for something else. What else should they continue to look
for?

Immutable copies of data they have lost on their


secondary storage

Dormant threats within their data 

Cold data sitting on expensive hot data tiers

Secondary replication sites with virtual or physical air


gaps
Question 14

Correct

Points out of 1.00

Back Next

A client is listening to a seller talk about the data resilience


cycle and ask what step in that cycle deals with finding active
threats and finding and preventing dormant threats?

Automation

Discovery 

Recovery

Inmmutability

Question 15

Correct

Points out of 1.00

Many clients believe that the combination of backup and


restore capabilities are all that are required to protect from
cyber-attacks and other data center disasters. How should a
seller respond to this perception?

While backup and restore are essential as part of a 


total data resiliency solution, they do not protect
against ransomware getting into the company’s data.

This is false in every situation EXCEPT a malware attack;


malware attacks can always be detected and resolved
quickly and safely.

As long as a company has at least one remote site, they


can ensure they have data that is free from corruption.

The successful use of backup and restore capabilities is


always dependent on the skills of the data center
administrators.

You might also like