How is authentication and encryption implemented between collectors, aggregators and the
Central Policy Manager in a multi-tier Guardium environment?
Answer : B
Which of the following best describes the role of the aggregator in a Guardium environment?
Answer : A
Which of the following items cannot be identified using database auto-discovery?
Answer : C
What is the purpose of Guardium's Application Events API?
Answer : A
Which of the following is often required to ensure that Guardium can identify a user's credentials through the Stored Procedure Monitoring feature?
Answer : B
Which of the following cannot be monitored using CAS?
Answer : C
A database known to contain the medical records of a foreign head of state is accessed at
1:30 AM. No security mechanism is installed and so this highly sensitive information is leaked to the media. Could this breach have been detected by running a Guardium vulnerability assessment without creating any custom assessment tests?
Answer : C
What is Guardium's primary storage mechanism for logs and audit information?
Answer : C
Which of the following is true about applying CAS templates to CAS hosts?
Answer : B
Which of the following native SQL commands is required to link external data to internal data?
Answer : B
How would a DBA or developer notify Guardium using the Application User API that an application user has taken or given up control of a data server connection?
Answer : D
Which of the following is a valid use case for scheduled database auto-discovery?
Answer : D
Which of the following steps must be taken before a custom table can be defined on the
Guardium appliance?
Answer : D
In a Guardium environment where data servers can talk to the collector, what is the relationship between the S-TAP and the collector appliance?
Answer : B
Which of the following actions is NOT a known benefit of using correlation alerts?
Answer : A
Have any questions or issues ? Please dont hesitate to contact us