Cyber Security for IBM Power Level 2 Quiz Attempt Review
Cyber Security for IBM Power Level 2 Quiz Attempt Review
attempt=1606850&cmid=199144
Question 1
Incorrect
Your client has both IBM Power and IBM Z systems in their data center. They mention that they need to share �les between the
systems, but the �les are encrypted. Which of the following would you recommend for them?
Use the storage system’s default encryption key for all reads and writes to disk
Create a common encryption key that every system uses
Question 2
Incorrect
A malicious actor is in a coffee shop and video records the person at the table beside them remotely accessing an IBM Power
system that has been setup in the enterprise’s zero trust architecture. They now have the system’s IP Address as
well as the user’s credentials. If the malicious actor tries to access the system from their laptop, will he/she be granted
access?
Yes
1 of 9 4/11/2022, 7:26 PM
Cyber Security for IBM Power Level 2 Quiz: Attempt review https://learn.ibm.com/mod/quiz/review.php?attempt=1606850&cmid=199144
Question 3
Correct
You are meeting with Maddie at General Hospital (GH) and they are rolling out iPads for all medical professionals to use to access
and enter patient data. Maddie is concerned about someone stealing an iPad and gaining access to all of the patient data. You
tell Maddie that access in a Zero Trust environment is only granted if the signal sent is authorized. To ensure that the signal will
not allow access to non GH medical staff, you tell her that she needs to ensure that:
The iPads connect to the private hotel network via a secret port so they cannot be used outside the hospital
Question 4
Correct
Question 5
Incorrect
You are talking about application security to your client, and they say that their Power system is very secure, so why is
application security so important? You tell them that:
Applications are the leading cause of breaches by a wide margin - More than twice the next leading cause. Attacks searching
for these vulnerabilities are also widespread. The typical application can expect to see thousands or millions of attacks each
month.
Applications typically always have a debug userid, and if the credentials for that ID is used, the application can be taken
over.
All applications leave open backdoors (i.e. ports, etc.) for debugging, so they are all vulnerable
Application security is only important for mobile apps, not enterprise apps running on IBM Power
2 of 9 4/11/2022, 7:26 PM
Cyber Security for IBM Power Level 2 Quiz: Attempt review https://learn.ibm.com/mod/quiz/review.php?attempt=1606850&cmid=199144
Question 6
Correct
You are presenting SafeGuarded copies to one of your clients, PTG Bank. Paul, the CISO, is impressed that SafeGuarded copies
ensure that he can always recover even if his system is attacked by Ransomware. He then says "if I can always recover, why
should I spend money, time, and effort on securing the system"? You answer that:
Ransomware is the most predominant attack currently, so this will protect you from the most costly and predominant attack
type. Are you ready to buy Cyber Vault now?
While Ransomware is the most expensive and predominant attack type today, a data breach is not far behind. You need
to secure your system and data to prevent these as well.
SafeGuarded copies are all the protection you need to keep your data safe. Are you ready to buy the storage system now?
IBM Power is so secure that you do not need to worry about any other attack, so you are right.
Question 7
Correct
Question 8
Correct
While talking to an IBM Power client you hear them say that they are not using any form of encryption because it causes too
much of a performance impact. You immediately tell them that:
They can add GPUs to their server to offload some of the load of the encryption
The Power system includes cryptographic accelerators making encryption a zero cost event
They can add more CPUs into the system to offset the load of the encryption processing
That is a wise move
3 of 9 4/11/2022, 7:26 PM
Cyber Security for IBM Power Level 2 Quiz: Attempt review https://learn.ibm.com/mod/quiz/review.php?attempt=1606850&cmid=199144
Question 9
Correct
You are talking to a client about their move to a containerized environment, and they say that they are hard to secure. Which IBM
System would you tell them about that offers Enterprise Protected Containers, so that containers are provided the same level of
security as LPARs?
IBM Power
IBM Z
Question 10
Correct
PPS is one of your banking customers running IBM Power. They need to create a failover con�guration with 2 systems in data
centers approximately 5km apart. Trevor, the CTO at PPS, asks about the security of migrating VMs from one system to the other
between data centers. You tell Trevor that:
Live Partition Mobility encrypts the partition’s data if/when it needs to be moved from one system to another
Pervasive encryption encrypts the entire partition if/when it needs to be moved from one system to another
Live Partition Mobility encrypts the entire partition if/when it needs to be moved from one system to another
Pervasive encryption encrypts the partition’s data if/when it needs to be moved from one system to another
Question 11
Correct
4 of 9 4/11/2022, 7:26 PM
Cyber Security for IBM Power Level 2 Quiz: Attempt review https://learn.ibm.com/mod/quiz/review.php?attempt=1606850&cmid=199144
Question 12
Correct
You just presented the Zero Trust maturity model to your client, and they start asking about automation and operations. They
want to know what level they would be at if they have implemented best practices and repeatable processes. You tell them:
Intermediate
Advanced
Preparing
Basic
Question 13
Correct
A malicious actor �nds a laptop on a table at a coffee shop. They grab the laptop and on it is a �le with the owner’s
userids and passwords for all of their web sites and also for work. If the malicious actor attempts to connect to an IBM Power
system that has been setup in the enterprise’s zero trust architecture, will he/she be granted access?
No
Only if the user and laptop have access to the Power system
Yes
Question 14
Correct
A client tells you that they are concerned that an attacker who gains access to their Power system can infect their system and
VMs, and that could them impact everything on their system. You tell them that the Power system:
Has a Protected Execution Facility that will stop updates to the VMs
Has an Ultravisor mode to allow you to revert back to your old VM if this happens
Supports secure virtual machines (SVMs) that are cryptographically protected at rest and at run time
Has an Ultravisor mode that runs a validation check of all VMs at boot time
5 of 9 4/11/2022, 7:26 PM
Cyber Security for IBM Power Level 2 Quiz: Attempt review https://learn.ibm.com/mod/quiz/review.php?attempt=1606850&cmid=199144
Question 15
Correct
Which IBM system provides the ability for data to remain encrypted in memory?
IBM LinuxONE
IBM Z
Question 16
Correct
You are meeting with a client and ask about their cyber resiliency requirements. They say that they are very worried about a
ransomware attack. You should tell them that according to a recent survey, breaches at organizations with advanced Zero Trust
deployments were less costly than at organizations without Zero Trust by:
$4.5M US
$3.4M US
$1.76 M US
$3.81M US
Question 17
Correct
While talking to Trevor at PPS Inc you mention that there are multiple levels of data encryption. Trevor asks what these levels
are, and you answer:
6 of 9 4/11/2022, 7:26 PM
Cyber Security for IBM Power Level 2 Quiz: Attempt review https://learn.ibm.com/mod/quiz/review.php?attempt=1606850&cmid=199144
Question 18
Correct
When a user attempts to access an element in the Zero Trust architecture, what pieces of information are used by the Policy
Enforcement service to determine if access should be granted?
Question 19
Correct
You are presenting to a client about the Zero Trust maturity model. Alyssa (the client’s CISO) says that they have every
product on the chart installed and running, and have repeatable processes and best practices. What level of maturity would that
put them at, and how should they move forward to get better?
Intermediate ZT - They need to automate the processes and best practices to move to Advanced ZT
Basic ZT - They need IBM to certify the proper integration of the components to move to Intermediate ZT
Intermediate ZT - They need IBM to certify the proper integration of the components to move to Advanced ZT
Basic ZT - They need to automate the processes and best practices to move to Intermediate ZT
Question 20
Incorrect
A malicious actor (Des) �nds a laptop in a coffee shop containing a �le with the owner's userIDs and passwords for work. Des
connects to an IBM Power system that has been setup in the enterprise's Zero Trust architecture and tries accessing �les. The
userID has permission on the �rst couple of �les, so Des is allowed access.When Des tries to access �les the userID does not
have access to, which parts of the Zero Trust architecture are needed to revoke access?
7 of 9 4/11/2022, 7:26 PM
Cyber Security for IBM Power Level 2 Quiz: Attempt review https://learn.ibm.com/mod/quiz/review.php?attempt=1606850&cmid=199144
Question 21
Correct
You are meeting with a client and ask about their cyber resiliency requirements. They say that anyone on their corporate network
can access any system, across the enterprise. You mention that over 30% of attacks come from someone inside the �rewall, and
introduce the Zero Trust approach as cutting off all access until the systems know:
Question 22
Correct
© Copyright IBM Corporation 2022 Course materials may not be reproduced in whole or in part without the prior written
permission of IBM.
It is 3am and your phone keeps ringing. It is Paul, the CISO at PTG Bank and he sounds worried. PTG bank was migrating some
systems from one data center to another, and their DS8000 storage system has gone missing. This storage system is normally
connected to their IBM Power System and stores and manages all ATM, teller, online banking, and credit card transactions. Paul
has a backup of the data, but is concerned that the data could fall into the wrong hands. You remind Paul that:
Question 23
Correct
Maintaining the isolation and integrity of the hardware and �rmware, Operating System, and workloads
8 of 9 4/11/2022, 7:26 PM
Cyber Security for IBM Power Level 2 Quiz: Attempt review https://learn.ibm.com/mod/quiz/review.php?attempt=1606850&cmid=199144
Question 24
Correct
A client tells you that they are concerned that an attacker who gains access to their system can infect their �rmware and that
could them impact everything on their system. You tell them that the Power system can detect this during a:
Trusted Startup
Secure Startup
Secure Boot
Trusted Boot
Question 25
Correct
User + Workload
User + Network
User + Device
Workload + Device
9 of 9 4/11/2022, 7:26 PM