1.
In addition to vulnerability research and malware analysis, IBM Security X-Force Research and Development performs which of the following tasks?
2.
In a potential Access Manager for Web sale, the client is a large customer and has large numbers of applications and servers involved in their SSO/Web authorization plans. Oracle Access Manager (OAM) is the main competitor. What might you emphasize as you try to move the customer in your direction?

 
3.
Which of the following is NOT one of the "4 Principles" of a successful Fraud Prevention Architecture?
4.
With Federated Identity Manager, which of the following customer scenarios are able to be addressed?
5.
The IBM Security Network Protection (XGS) platform provides which of the following features on top of what is provided by the IBM Security Network IPS platform?
6.
Which of the following is Apex Exfiltration Prevention is designed to do?
7.
IBM Endpoint Manager is an agent-based solution. Which of the following characteristics/features are provided by the agent?
8.
You are in a competitive user management/identity management/user provisioning sale, and the decision seems to hinge on who has the superior role management capabilities. You handle this by:
9.
There are several key integrations of AppScan and other IBM Security solutions. Choose the answer that names two of those integrations and their value.
10.
What is the average cost to a development organization to identify and correct security defects that have gotten into production?