0% found this document useful (0 votes)
151 views9 pages

Cyber Security for IBM Power Level 2 Quiz Attempt Review

Uploaded by

Justice Mutemwa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
151 views9 pages

Cyber Security for IBM Power Level 2 Quiz Attempt Review

Uploaded by

Justice Mutemwa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

Cyber Security for IBM Power Level 2 Quiz: Attempt review https://learn.ibm.com/mod/quiz/review.php?

attempt=1606850&cmid=199144

Started on Monday, April 11, 2022, 12:38 PM


State Finished
Completed on Monday, April 11, 2022, 1:25 PM
Time taken 46 mins 21 secs
Grade 21.00 out of 25.00 (84%)
Feedback A minimum of 19 correct answers is required to pass.
Congratulations, you passed the quiz Cyber Security for IBM Power Level 2!

Question 1

Incorrect

0.00 points out of 1.00

Your client has both IBM Power and IBM Z systems in their data center. They mention that they need to share �les between the
systems, but the �les are encrypted. Which of the following would you recommend for them?

Use the storage system’s default encryption key for all reads and writes to disk
Create a common encryption key that every system uses 

Use Guardium Key Lifecycle Manager to centrally manage keys


Use Guardium Key Manager Enterprise Edition to centrally manage keys

Question 2

Incorrect

0.00 points out of 1.00

A malicious actor is in a coffee shop and video records the person at the table beside them remotely accessing an IBM Power
system that has been setup in the enterprise’s zero trust architecture. They now have the system’s IP Address as
well as the user’s credentials. If the malicious actor tries to access the system from their laptop, will he/she be granted
access?

Yes

Only if the user has access to the Power system


No
Only if the user's credentials are also de�ned on the malicious actor's computer 

1 of 9 4/11/2022, 7:26 PM
Cyber Security for IBM Power Level 2 Quiz: Attempt review https://learn.ibm.com/mod/quiz/review.php?attempt=1606850&cmid=199144

Question 3

Correct

1.00 points out of 1.00

You are meeting with Maddie at General Hospital (GH) and they are rolling out iPads for all medical professionals to use to access
and enter patient data. Maddie is concerned about someone stealing an iPad and gaining access to all of the patient data. You
tell Maddie that access in a Zero Trust environment is only granted if the signal sent is authorized. To ensure that the signal will
not allow access to non GH medical staff, you tell her that she needs to ensure that:

The application uses a common userid and password


The application needs to run as root to check privileges for the users
All users must authenticate on the iPad using multifactor authentication 

The iPads connect to the private hotel network via a secret port so they cannot be used outside the hospital

Question 4

Correct

1.00 points out of 1.00

Zero Trust is built around the following six elements:

Identities, Devices, Applications, Infrastructure, Data, Applications 

Identities, Devices, Signal, Infrastructure, Data, Applications


Signal, Decision, Enforcement, Identities, Devices, Data
Identities, Devices, Signal, Decision, Enforcement, Data

Question 5

Incorrect

0.00 points out of 1.00

You are talking about application security to your client, and they say that their Power system is very secure, so why is
application security so important? You tell them that:

Applications are the leading cause of breaches by a wide margin - More than twice the next leading cause. Attacks searching
for these vulnerabilities are also widespread. The typical application can expect to see thousands or millions of attacks each
month.
Applications typically always have a debug userid, and if the credentials for that ID is used, the application can be taken 
over.
All applications leave open backdoors (i.e. ports, etc.) for debugging, so they are all vulnerable
Application security is only important for mobile apps, not enterprise apps running on IBM Power

2 of 9 4/11/2022, 7:26 PM
Cyber Security for IBM Power Level 2 Quiz: Attempt review https://learn.ibm.com/mod/quiz/review.php?attempt=1606850&cmid=199144

Question 6

Correct

1.00 points out of 1.00

You are presenting SafeGuarded copies to one of your clients, PTG Bank. Paul, the CISO, is impressed that SafeGuarded copies
ensure that he can always recover even if his system is attacked by Ransomware. He then says "if I can always recover, why
should I spend money, time, and effort on securing the system"? You answer that:

Ransomware is the most predominant attack currently, so this will protect you from the most costly and predominant attack
type. Are you ready to buy Cyber Vault now?
While Ransomware is the most expensive and predominant attack type today, a data breach is not far behind. You need 
to secure your system and data to prevent these as well.
SafeGuarded copies are all the protection you need to keep your data safe. Are you ready to buy the storage system now?
IBM Power is so secure that you do not need to worry about any other attack, so you are right.

Question 7

Correct

1.00 points out of 1.00

The Zero Trust architecture is built around the following:

User, Device, Signal


User, Signal, Decision
Signal, Decision, Enforcement 

User, Workload, System

Question 8

Correct

1.00 points out of 1.00

While talking to an IBM Power client you hear them say that they are not using any form of encryption because it causes too
much of a performance impact. You immediately tell them that:

They can add GPUs to their server to offload some of the load of the encryption
The Power system includes cryptographic accelerators making encryption a zero cost event 

They can add more CPUs into the system to offset the load of the encryption processing
That is a wise move

3 of 9 4/11/2022, 7:26 PM
Cyber Security for IBM Power Level 2 Quiz: Attempt review https://learn.ibm.com/mod/quiz/review.php?attempt=1606850&cmid=199144

Question 9

Correct

1.00 points out of 1.00

You are talking to a client about their move to a containerized environment, and they say that they are hard to secure. Which IBM
System would you tell them about that offers Enterprise Protected Containers, so that containers are provided the same level of
security as LPARs?

IBM Power 

IBM Z

IBM LinuxONE and IBM Z


IBM LinuxONE

Question 10

Correct

1.00 points out of 1.00

PPS is one of your banking customers running IBM Power. They need to create a failover con�guration with 2 systems in data
centers approximately 5km apart. Trevor, the CTO at PPS, asks about the security of migrating VMs from one system to the other
between data centers. You tell Trevor that:

Live Partition Mobility encrypts the partition’s data if/when it needs to be moved from one system to another
Pervasive encryption encrypts the entire partition if/when it needs to be moved from one system to another
Live Partition Mobility encrypts the entire partition if/when it needs to be moved from one system to another 

Pervasive encryption encrypts the partition’s data if/when it needs to be moved from one system to another

Question 11

Correct

1.00 points out of 1.00

Fuzz testing is de�ned as:

Making API/function calls with large amounts of random data 

Making API/function calls with a random parameter


Making API/function calls with large amounts of static data

Making API/function calls with the same parameters

4 of 9 4/11/2022, 7:26 PM
Cyber Security for IBM Power Level 2 Quiz: Attempt review https://learn.ibm.com/mod/quiz/review.php?attempt=1606850&cmid=199144

Question 12

Correct

1.00 points out of 1.00

You just presented the Zero Trust maturity model to your client, and they start asking about automation and operations. They
want to know what level they would be at if they have implemented best practices and repeatable processes. You tell them:

Intermediate 

Advanced
Preparing
Basic

Question 13

Correct

1.00 points out of 1.00

A malicious actor �nds a laptop on a table at a coffee shop. They grab the laptop and on it is a �le with the owner’s
userids and passwords for all of their web sites and also for work. If the malicious actor attempts to connect to an IBM Power
system that has been setup in the enterprise’s zero trust architecture, will he/she be granted access?

Only if the user has access to the Power system 

No
Only if the user and laptop have access to the Power system
Yes

Question 14

Correct

1.00 points out of 1.00

A client tells you that they are concerned that an attacker who gains access to their Power system can infect their system and
VMs, and that could them impact everything on their system. You tell them that the Power system:

Has a Protected Execution Facility that will stop updates to the VMs
Has an Ultravisor mode to allow you to revert back to your old VM if this happens
Supports secure virtual machines (SVMs) that are cryptographically protected at rest and at run time 

Has an Ultravisor mode that runs a validation check of all VMs at boot time

5 of 9 4/11/2022, 7:26 PM
Cyber Security for IBM Power Level 2 Quiz: Attempt review https://learn.ibm.com/mod/quiz/review.php?attempt=1606850&cmid=199144

Question 15

Correct

1.00 points out of 1.00

Which IBM system provides the ability for data to remain encrypted in memory?

IBM Z and IBM LinuxONE


IBM Power 

IBM LinuxONE
IBM Z

Question 16

Correct

1.00 points out of 1.00

You are meeting with a client and ask about their cyber resiliency requirements. They say that they are very worried about a
ransomware attack. You should tell them that according to a recent survey, breaches at organizations with advanced Zero Trust
deployments were less costly than at organizations without Zero Trust by:

$4.5M US

$3.4M US
$1.76 M US 

$3.81M US

Question 17

Correct

1.00 points out of 1.00

While talking to Trevor at PPS Inc you mention that there are multiple levels of data encryption. Trevor asks what these levels
are, and you answer:

Tape, Disk, memory, CPU


Full disk/tape, network interconnect, �le and data set, database, application 

Network, Tape, Disk, memory CPU


Tape, disk, network interconnect, �le and data set, database, application

6 of 9 4/11/2022, 7:26 PM
Cyber Security for IBM Power Level 2 Quiz: Attempt review https://learn.ibm.com/mod/quiz/review.php?attempt=1606850&cmid=199144

Question 18

Correct

1.00 points out of 1.00

When a user attempts to access an element in the Zero Trust architecture, what pieces of information are used by the Policy
Enforcement service to determine if access should be granted?

The risk for the user and device


The risk and compliance state of the device and user
The risk and compliance state of the device and the risk for the user 

The risk and compliance state of the device

Question 19

Correct

1.00 points out of 1.00

You are presenting to a client about the Zero Trust maturity model. Alyssa (the client’s CISO) says that they have every
product on the chart installed and running, and have repeatable processes and best practices. What level of maturity would that
put them at, and how should they move forward to get better?

Intermediate ZT - They need to automate the processes and best practices to move to Advanced ZT 

Basic ZT - They need IBM to certify the proper integration of the components to move to Intermediate ZT
Intermediate ZT - They need IBM to certify the proper integration of the components to move to Advanced ZT
Basic ZT - They need to automate the processes and best practices to move to Intermediate ZT

Question 20

Incorrect

0.00 points out of 1.00

A malicious actor (Des) �nds a laptop in a coffee shop containing a �le with the owner's userIDs and passwords for work. Des
connects to an IBM Power system that has been setup in the enterprise's Zero Trust architecture and tries accessing �les. The
userID has permission on the �rst couple of �les, so Des is allowed access.When Des tries to access �les the userID does not
have access to, which parts of the Zero Trust architecture are needed to revoke access?

Visibility, Analytics, Automation, and Orchestration

Analytics and Automation


Identities, Devices, Applications, Infrastructure, Data, Applications 

Identities and Devices

7 of 9 4/11/2022, 7:26 PM
Cyber Security for IBM Power Level 2 Quiz: Attempt review https://learn.ibm.com/mod/quiz/review.php?attempt=1606850&cmid=199144

Question 21

Correct

1.00 points out of 1.00

You are meeting with a client and ask about their cyber resiliency requirements. They say that anyone on their corporate network
can access any system, across the enterprise. You mention that over 30% of attacks come from someone inside the �rewall, and
introduce the Zero Trust approach as cutting off all access until the systems know:

Who you are and if you are authorized 

If the request is coming from inside or outside the �rewall


If the data is sensitive or not
Where the request is coming from

Question 22

Correct

1.00 points out of 1.00

© Copyright IBM Corporation 2022 Course materials may not be reproduced in whole or in part without the prior written
permission of IBM.
It is 3am and your phone keeps ringing. It is Paul, the CISO at PTG Bank and he sounds worried. PTG bank was migrating some
systems from one data center to another, and their DS8000 storage system has gone missing. This storage system is normally
connected to their IBM Power System and stores and manages all ATM, teller, online banking, and credit card transactions. Paul
has a backup of the data, but is concerned that the data could fall into the wrong hands. You remind Paul that:

The data can only be accessed by an IBM Power system, so he should be OK


When IBM helped PTG setup the system they turned on pervasive encryption, so the data is safe since no one outside 
PTG Bank has their encryption key
When IBM helped PTG setup the system they turned on pervasive encryption, so the data is safe since only IBM and PTG
Bank knows the storage systems default encryption key
This is not IBM's responsibility since IBM was not managing the move, so IBM is not liable if the data is exposed

Question 23

Correct

1.00 points out of 1.00

System level security is built around:

Maintaining the isolation and integrity of the hardware and �rmware, Operating System, and workloads 

Ensuring isolation between all workloads on the system


The runtime veri�cation of all workload �les
Ensuring isolation between all workloads on the system

8 of 9 4/11/2022, 7:26 PM
Cyber Security for IBM Power Level 2 Quiz: Attempt review https://learn.ibm.com/mod/quiz/review.php?attempt=1606850&cmid=199144

Question 24

Correct

1.00 points out of 1.00

A client tells you that they are concerned that an attacker who gains access to their system can infect their �rmware and that
could them impact everything on their system. You tell them that the Power system can detect this during a:

Trusted Startup
Secure Startup
Secure Boot 

Trusted Boot

Question 25

Correct

1.00 points out of 1.00

In a Zero Trust architecture, which elements make up the Signal?

User + Workload
User + Network

User + Device 

Workload + Device

9 of 9 4/11/2022, 7:26 PM

You might also like