100% found this document useful (1 vote)
1K views16 pages

IBM Defender Data Protect Level 2 Quiz

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
1K views16 pages

IBM Defender Data Protect Level 2 Quiz

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 16

IBM Defender Data Protect Level 2

Quiz Back Next

You must receive a score of 75% or higher on the quiz to complete


the course.
Started on Friday, May 17, 2024, 4:07 PM
State Finished
Completed on Friday, May 17, 2024, 4:10 PM
Time taken 3 mins 8 secs
Feedback Congratulations, you passed the quiz!

Question 1

Correct

Points out of 1.00

Clients are increasingly concerned about ransomware due to


quicker deployment times over a three year period. What was
the change from 2019 to 2021.

60+ days to 9.5 days to 3.85 days 

160 days to 95 days to 38.5 days

44 days to 27 days to 23 days


44 days to 23 days to 9.5 days
Question 2

Correct

Points out of 1.00

Back Next

The IBM Storage Defenderportal is the landing page for clients


for all current and future IBM Storage Defender services. What
happens when a client purchases Data Protect?

An IBM cloud tenant instance is stood up for the client 


and registered to the IBM ID of the first client admin
user. The user identity is managed in IBM Security
Verify.
A Google cloud tenant instance is stood up for the client
and registered to the IBM ID of the first client admin user.
The user identity is managed in IBM Security Verify.

An Azure cloud tenant instance is stood up for the client


and registered to the IBM ID of the first client admin user.
The user identity is managed in IBM Security Verify.

An AWS cloud tenant instance is stood up for the client


and registered to the IBM ID of the first client admin user.
The user identity is managed in IBM Security Verify.
Question 3

Correct

Points out of 1.00

Back Next

When working with Data Protect, clients will deal with a


Storage Domain which is a named storage location on a
cluster. What settings are handled at the storage domain
level?

Block storage characteristics only, host protocol


connections and stubs for Storage insights.

Compression, deduplication, host protocol connections


and media type.

Fault tolerance, encryption, and storage efficiencies 


are applied.
Inline Data Corruption Detection, Safeguarded Copy rules
and Copy Services Management.

Question 4

Correct

Points out of 1.00

Which one of the following IS NOT a key attribute of the


physical deployment for IBM Storage Defender Data Protect
clusters?

Self-balancing Properties.
Consistent Hashing.

Fully Distributed.
Inline Data Corruption Detection. 
Question 5

Correct

Points out of 1.00

Back Next

What type of offering is IBM Storage Defender and how it is


acquired?

IBM Storage Defender is an inflexible subscription model


which is purchased as non-consumable Defender
replication units.

IBM Storage Defender is a flexible subscription model 


which is purchased as consumable Defender resource
units (RUs).

IBM Storage Defender is a perpetual license model which,


once purchased, never needs to be renewed.

IBM Storage Defender is an annual license model which,


has a yearly maintenance fee to keep it active.

Question 6

Correct

Points out of 1.00

What is one of the key gaps IBM Storage Defender Data


Protect fills within IBM's portfolio?

There are no noteworthy gaps in IBM’s portfolio

Safeguarded Copy 1.0 backup which provides clients with


modern, cutting edge and fully functional protection for
their first-gen Safeguarded Copies.

Custom Financial backup which provides clients with


modern, cutting edge and fully functional protection for
their fiduciary apps.

VMware virtual machine backup which provides 


clients with modern, cutting edge and fully functional
protection for VMware workloads.
Question 7

Correct

Points out of 1.00

Back Next

Which of the following Erasure Coding (EC) levels provides the


highest usable capacity?

3:1

2:1

4:1 

4:2

Question 8

Correct

Points out of 1.00

A client is curious about Retention Periods for workloads. They


are concerned about whether they will have enough storage to
support long retention periods regardless of the value of the
data involved. What should you tell them?

When all of an organizations data is involved, IBM


recommends that only short retention periods be used.

Due to compression, most clients can afford to have long


retention periods even when all their data is involved.

This is the reason why clients with large amounts of data


should consider buying a FlashSystem with FlashCore
Modules so data will always be compressed.

Each workload can have a different retention period 


and those periods are defined by their organization.
Question 9

Correct

Points out of 1.00

Back Next

What are the fault tolerance abilities for the storage domain
level of Data Protect Clusters?

Erasure Coding and Encryption.

Replication Factor and Deduplication.

Erasure Coding and Replication Factor. 


Replication Factor and Compression.

Question 10

Correct

Points out of 1.00

Daily Change Rate (DCR) is the percentage of a workload's


total size that changes daily. This new data must be ingested
during incremental backups. What are important issues that
clients should understand about DCR?

A higher Daily Change Rate has no appreciable impact on


the solution.

A higher Daily Change Rate increases throughput and 


storage requirements.

A higher Daily Change Rate increases the overall


efficiency, and lowers the economic costs.

A higher Daily Change Rate will not impact cluster sizes.


Question 11

Correct

Points out of 1.00

Back Next

During a client meeting you tell them about IBM Storage


Defender Data Management Service. They are beginning to
understand itis the central management SaaS portal and
holistic view engine to simplify work in a heterogeneous data
protection environment. What components are handled by
Data Management Service?

It supports IBM Storage Protectand IBM Storage


Archivesolutions today.

It supports IBM Storage Virtualizeand IBM Storage


ProtectSuitetoday.

It supports IBM Storage Sentineland IBM Storage


Defender Data Protectsolutions today.

It supports IBM Storage Protectand IBM Storage 


Defender Data Protectsolutions today and will be
expanded for other data protection solution variants in
the future.

Question 12

Incorrect

Points out of 1.00

Clients are often shocked when they hear the overall average
cost of a cyber-attack as well as the ransom demand portion
of the cost. What are those costs?

5.2 million dollars US and 800,000 dollars US

2.5 million dollars US and 300,000 dollars US

6.4 million dollars US and 1,000,000 dollars US 


4.6 million dollars US and 660,000 dollars US
Question 13

Correct

Points out of 1.00

Back Next

In discussing Data Protect with clients you frequently are


asked about where Defender Data Protect Cluster Nodes can
be deployed. What can you tell them?

They are exclusively hosted on a combination of private


clouds and VMs

They are exclusively hosted on private clouds.

They can be hosted on public clouds (AWS EC2, Azure 


VM, Google), and also on-prem using certified 3rd
party hardware/platform.

They are exclusively hosted on VMs.

Question 14

Correct

Points out of 1.00

There is a key concept/terminology within IBM Storage


Defender Data Protect that handles a backup job that runs
repeatedly, based on an associated policy, to back up data
from a source and store it on the cluster. What is the name of
this key concept?

Cluster Protection

Protection Policy

Protection Group 
Fault Tolerance
Question 15

Correct

Points out of 1.00

Back Next

In talking with clients they are impressed with Data Protect’s


ability to monitor, alert, predict issues, have anomaly
detection and reporting, simplified cluster management,
backup index searching across protection sets, and quickly
search and recover data on any Defender cluster, located
anywhere. What is the name of the “piece” that enables all of
this?

Data Management Service portal 

Secure to the Core

Resilient and Performant

Enhanced Workload Coverage

Question 16

Correct

Points out of 1.00

When talking with a client about Data Protect physical


deployments, they ask about how Data Protect handles things
if nodes are added or subtracted. How should you respond?

It employs a unique multi-spacial scheme that manages


data redistribution in batches as nodes are added or
subtracted from the cluster.
It uses an advanced Artificial Intelligence/Machine
Learning algorithm to eliminate any interruptions when
nodes are added or subtracted.
Redistribution is fast so we encourage clients to leave the
configuration alone once it is up and running

It has self-balancing properties so that data is 

redistributed automatically when nodes are added to


or removed from the cluster.
Question 17

Correct

Points out of 1.00

Back Next

It is often important to discuss things like storage efficiencies


with Clients who are considering Data Protect. Which answer
below is the most accurate, and important, statement to pass
along to clients?

Compression only is available as an inline operation, or a


post-process operation, but it cannot be completely
disabled.

Deduplication and compression are available as inline 


operations, post-process operations, or they can be
completely disabled.

Deduplication only is available as an inline operation, or a


post-process operation, but it cannot be completely
disabled.

Encryption can never be disabled so it is always providing


protection.
Question 18

Correct

Points out of 1.00

Back Next

When discussing IBM Storage Defender Data Protect, it is


common to talk about Protect Policy. What is a good
description of a Data Protect protection policy?

It is a backup job that runs repeatedly, based on an


Artificial Intelligence/Machine Learning, to back up data
from a source and store it on the cluster.

It is a node that contains a CPU with spinning disk or flash


storage that is preinstalled with the Data Protect
software.

It is a reusable set of settings that define how and 


when objects are protected, replicated and archived.

It is a named storage location on a cluster, and at the


storage domain level, settings like fault tolerance,
encryption, and storage efficiencies are applied.
Question 19

Correct

Points out of 1.00

Back Next

Clients are typically very interested in data resiliency. You will


likely find yourself speaking with them about Data Protect
Replication Factor, (RF), which refers to the number of copies
of a file that is stored across the cluster. What is important to
point out them?

Always direct clients away from Replication Factor and


move them to Erasure Coding.
It is always okay to store two replicas of data blocks on
the same node and still achieve maximum redundancy.

Replicas of data blocks are stored on different nodes 


in the cluster to achieve better resiliency.
Data Protect deals with data blocks in a totally different
way from other apps and therefore the number of copies
on a node is irrelevant.
Question 20

Correct

Points out of 1.00

Back Next

As you are meeting with clients they express surprise to learn


about a rapidly growing new form of ransomware known as
Data Exfiltration. What is exfiltration?

Data Exfiltration is where attackers gain access to an 


organization’s key assets. They transfer the data
offsite, and hold that data hostage.

Data Exfiltration is where attackers gain access to an


organization’s key assets. They filter the data and quickly
determine what is the most important content to hold
onsite for ransom.
Data Exfiltration relies upon gaining access to important
data due to disgruntled employees. The data is then
destroyed even if the organization pays.
Data Exfiltration is said to occur when an organization is
paying a ransom for the second time.

Question 21

Incorrect

Points out of 1.00

A prospective client asks about IBM’s preferred solution for


providing enterprise protection for VMware with lightning-fast
recovery. What should you tell them?

IBM Storage Defender Storage Protect


IBM Storage Defender Data Protect

IBM Storage Defender Protect for Containers 


IBM Storage Defender Virtualized Protection
Question 22

Correct

Points out of 1.00

Back Next

IBM Storage Defender Data Management Service is the


central management SaaS portal and holistic view engine to
simplify work in a heterogeneous data protection
environment. What Defender components does it work with as
of August 2023?

It supports IBM Storage Virtualize and IBM Storage


Defender Data Protect solutions today and will be
expanded for other data protection solution variants in
the future.
It supports IBM Copy Services Manager and IBM Storage
Defender Data Protect solutions today and will be
expanded for other data protection solution variants in
the future.
It supports IBM Storage Protect and IBM Storage 
Defender Data Protect solutions today and will be
expanded for other data protection solution variants in
the future.

It supports IBM Storage Sentinel and IBM Storage


Archive solutions today and will be expanded for other
data protection solution variants in the future.
Question 23

Correct

Points out of 1.00

Back Next

IBM’s message around Storage Defender Data Protect is that


there is no disruption on upgrades. How is this accomplished?

The clustered architecture allows for a sequential 


node-by-node upgrade. Nodes can be upgraded to the
latest versions without any interruption to client IOs.
It is not possible to achieve a non-disruptive upgrade with
Data Protect

The clustered architecture allows for an asymmetric


mesh-based node upgrade. Nodes can be upgraded to the
latest versions without any interruption to client IOs.

The clustered architecture allows for a simultaneous


parallel node upgrade. Nodes can be upgraded to the
latest versions without any interruption to client IOs.

Question 24

Correct

Points out of 1.00

How is licensing handled with IBM Storage Defender Data


Protect?

Fixed cost per 50TB block with a perpetual license for


simplicity

Fixed cost per 100TB block with a perpetual license for


simplicity

Flexible, and decreasing cost as TB capacity increases


Resource Unit (RU) licensing to be simple, flexible and 
cost-optimized
Question 25

Correct

Points out of 1.00

Back Next

You are helping to size an opportunity for a prospect. The


backup admin has indicated that the backup window is now
only 6 hours where it used to be 10 hours. What affect might
this have on the sizing output in comparison to a longer
backup window?

It will decrease cluster resiliency


It will increase the throughput requirements and 
impact the cluster node count.
It will require faster storage systems to supply data, more
quickly.

It will increase cluster resiliency.

You might also like