A. To identify and report on vulnerabilities in databases
B. To monitor real-time database transactions
C. To backup and restore database instances
D. To encrypt database data at rest and in transit
A. The prioritization of data traffic to collectors based on current load
B. The allocation of network bandwidth for Guardium data traffic
C. The maximum storage limit for incident logs
D. The threshold for triggering alerts on suspicious activities
A. Encryption standards used in the database
B. Suggested remediation activities for identified vulnerabilities
C. Database uptime and performance metrics
D. Identified vulnerabilities and their severities
A. Reformat the hard drive and restart the installation process.
B. Manually create the directory using the command mkdir /etc/event.d.
C. Increase the system's virtual memory allocation.
D. Ignore the error and continue with the installation.
A. Time
B. Configuration
C. Database
D. Operating System
E. Agentless
A. Limiting the discovery process to non-business hours to reduce the load on the network
B. Setting up appropriate access controls and permissions for the autodiscovery process
C. Ensuring that the autodiscovery application has root or administrator access to the target servers
D. Configuring the application to bypass firewall and antivirus detection
A. Add policy rules that apply S-GATE ATTACH every time the user logs in to the database and S-GATE Terminate if the user queries the EMPLOYEES table.
B. Update the guard_tap.ini for the database server's Inspection Engines to include the line db_watch:<user>
C. Add the user to the Suspicious Users group so that the Risk Analyzer blocks him.
D. Run the Entitlement Optimization function to remove the user's access to the table.
A. A separate S-TAP agent must be installed for each Identity Provider
B. Guardium must be restarted after each Identity Provider is added
C. Each Identity Provider must use a different encryption algorithm
D. Identity Providers must be configured to use the same user attribute names
A. S-TAP requires a reboot of the database server for installation, whereas K-TAP does not.
B. S-TAP is used for Windows-based systems, while K-TAP is used for Linux-based systems.
C. K-TAP supports real-time alerts, whereas S-TAP does not.
D. S-TAP is a software-based agent, while K-TAP is a kernel-based agent.
A. Vulnerability assessment
B. Policy management
C. Data encryption
D. Network security