1.
Which consideration is true for a Vulnerability Assessment (VA) deployment?
2.
When planning the deployment for Data Activity Monitoring (DAM) there is a need to determine the location of the various Guardium solution components (I.e. Agents, appliances). Which statement is correct?
3.
What is the correct way to stop a UNIX S-TAP that was installed with a non-GIM installer?
4.
In the Session level entity, how many UID Chain attribute(s) are there?

 
5.
What is the main command line utility to control and configure A-TAP on all platforms?
6.
What is the documented procedure for handling delayed cluster disk mounting?
7.
Which GIM component controls starting and stopping managed agents on UNIX?
8.
What is the correct way to stop S-TAP that is managed by GIM?
9.
Where are DB2 z audit rules stored?
10.
Which ports are used by UNIX S-TAP?