Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam C2150-606 All Questions

View all questions & answers for the C2150-606 exam

Exam C2150-606 topic 1 question 13 discussion

Actual exam question from IBM's C2150-606
Question #: 13
Topic #: 1
[All C2150-606 Questions]

Which use cases are covered with the File Activity Monitoring feature? (Select two.)

  • A. Classify sensitive files on mainframe systems.
  • B. Encrypts database data files on file systems based on policies.
  • C. Selectively redacts sensitive data patterns in files based on policies.
  • D. Provides audit trail of access to files, alert and/or block when unauthorized users or processes attempt access.
  • E. Identifies files containing Personally Identifiable Information (PII) or proprietary confidential information on Linux Unix Windows (LUW) systems.
Show Suggested Answer Hide Answer
Suggested Answer: AE 🗳️
A: Use case example:
Critical application files can be accessed, modified, or even destroyed through back-end access to the application or database server
Solution: File Activity Monitoring can discover and monitor your configuration files, log files, source code, and many other critical application files and alert or block when unauthorized users or processes attempt access.
E: Use case example:
Need to protect files containing Personally Identifiable Information (PII) or proprietary information while not impacting day-to-day business.
Solution: File Activity Monitoring can discover and monitor access to your sensitive documents stored on many file systems. It will aggregate the data, give you a view into the activity, alert you in case of suspicious access, and allow you to block access to select files and folders and from select users.
Note: File activity monitoring consists of the following capabilities:
* Discovery to inventory files and metadata.
* Classification to crawl through the files to look for potentially sensitive data, such as credit card information or personally identifiable information.
* Monitoring, which can be used without discovery and classification, to monitor access to files and, based on policy rules, audit and alert on inappropriate access, or even block access to the files to prevent data leakage.
Reference:
https://www-01.ibm.com/support/knowledgecenter/SSMPHH_10.0.0/com.ibm.guardium.doc/protect/fam_intro.html

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Wen
5 years, 2 months ago
FAM don't monitor file activity on mainframe. https://www-01.ibm.com/support/docview.wss?uid=swg27046456 The correct answers should be: D, E
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...