1.
On a Big Data environment protected by Guardium, which scenario is invalid?
2.
A developer has recently created a temporary database to test her new human resources management application. To test it in a production-like environment she copies the MANAGERS table from the production server into her test database. This table includes sensitive personal information. Which of the following will help the database auditor identify this new database?
3.
Which of the following components collects and parses the live database traffic used to trigger a real- time alert when a security policy rule is broken?
4.
Which of the following Big Data environments are supported by Guardium?
5.
How does Guardium handle correlation alerts?

 
6.
Which of the following actions is NOT a known benefit of using correlation alerts?
7.
Which of the following is true about Guardium's entitlement reports?
8.
Which of the following steps must be taken before a custom table can be defined on the Guardium appliance?
9.
Data is collected through a security policy using non-selective audit trail that only consists of rules with alert action. Which of the following cannot be viewed when reporting on these data?
10.
How is authentication and encryption implemented between collectors, aggregators and the Central Policy Manager in a multi-tier Guardium environment?