Isr Moneyball Quiz - Sept 2013

9 Questions
Data Quizzes & Trivia

This is your description.

Please wait...
Questions and Answers
  • 1. 
    What companies offer a joint solution that protects databases and file stores from targeted attacks originating from malware-compromised machines.
    • A. 

      Imperva & Incapsula

    • B. 

      Imperva & Informatica

    • C. 

      Imperva & FireEye

    • D. 

      Imperva & Colin Kaepernick

  • 2. 
    File Security is most relevant for addressing:
    • A. 

      Hacking and external threats

    • B. 

      Insider threats

    • C. 

      Secure web development

    • D. 

      Geographically distributed threats

  • 3. 
    When a security breach occurs, either by an insider or a hacker, SharePoint cannot privide the __________ capabilities that would help to identify the malicious or compromised user.
    • A. 

      Logging

    • B. 

      Forensic

    • C. 

      Database

    • D. 

      Administrative

  • 4. 
    The FireEye Virtual Execution (VX) technology identifies infected hosts and then passes that information along to Imperva SecureSphere. SecureSphere uses this actionable intelligence to prevent infected machines from accessing sensitive information in _________ and ________ and FireEye blocks any command and control communications by the malware-compromised device.                                                                           
    • A. 

      Web App and Databases

    • B. 

      Web App and File Servers

    • C. 

      Database and File Servers

  • 5. 
    What are some fo the integration benefits between Imperva's SecureSphere and FireEye's Malware Protection System (check all that apply):
    • A. 

      Alert on, or block, sensitive data

    • B. 

      Isolate malware infected machines

    • C. 

      Audit all access to sensitive data

    • D. 

      Prevent malware-compromised devices from access critical apps & sensitive data

    • E. 

      Dynamically learn legitimate application and data usage

  • 6. 
    When speaking w/a prospect a good analogy to describe what Imperva does is, "your web applications are the front door to your datacenter.  When you use an IPS/NGFW system, you are only putting a screen door in place and sophisticated attackers and well-motivated outsiders can slip right through the holes.  Imperva’s WAF is a steel door guarding the vault inside."
    • A. 

      True

    • B. 

      False

  • 7. 
    If speaking to a prospect and they say "we have a DLP (data loss prevention) system in place, why would I need Imperva?"  A good response would be (mark any that apply):
    • A. 

      Your DLP focuses on data that your users already have, it does not give you visibility into data usage or user rights and it cannot help with access control.

    • B. 

      Imperva shows which data is being used & which data is accessible by too many people.

    • C. 

      Once your DLP identifies sensitive data, Imperva can tell you who owns it, which helps with remediation.

    • D. 

      Classifying file content within many areas of your infrastructure can take a long time. Imperva will help make this process more efficient by showing where to prioritize your efforts.

  • 8. 
    When targeting database personnel, what is a good question to initially ask?  Select the best answer.
    • A. 

      What are you currently doing to meet your database auditing compliance requirements?

    • B. 

      How do you protect your systems against web attacks?

    • C. 

      Is PCI compliance a concern for you?

    • D. 

      How do you protect your environment against malware attacks?

  • 9. 
    In a normal scenario, what are the two choices organizations use to audit their databases?
    • A. 

      Utilize “built-in” native database auditing capabilities

    • B. 

      They utilize an outside auditor

    • C. 

      They implement a dedicated database auditing solution (SecureSphere)

    • D. 

      A DLP (data loss prevention) solution is used