The Strategic Elements Flashcards

1
Q

What are the three elements of the value proposition for IBM Cloud?

A
  • Open Hybrid Cloud
  • Security Leadership
  • Enterprise grade
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Explain Business Framing

A
  • Aligns your vision and desired business outcomes
  • Confirm executive sponsor, product owner
  • Select candidate app workloads
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the 6 stages of IBM garage client journey?

A
  1. Business Framing
  2. Technical Discovery
  3. Design Thinking
  4. Architecture
  5. Minimum Viable Product build
  6. Build Out
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the IBM garage methodology?

A

A single seamless set of proven agile practices that integrate user experience, implementation & cultural change to guide solutions from idea to enterprise scale adoption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Explain Technical Discovery

A
  • Explore technical areas of interest and nonfunctional requirements, for example applications, security, integration, and edge
  • Recommend technical next steps and further discovery as needed to build proposal
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Explain Design Thinking

A
  • Business and IT alignment on user experience to meet your business outcome
  • Identification of risks and assumptions in your modernization approach such as data security
  • A series of minimum viable products and agreement on the next MVP experiment
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Explain Architecture (IBM Cloud)

A
  • Define a secure minimum viable architecture that mitigrates risk
  • Architect and create an implementation roadmap for a hybrid, multicloud platform and DevOps adoption
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Explain Minimum Viable Product Build

A
  • Modernize, deploy and test application on the cloud environment
  • Test hypothesis using learning-driven production release against the state business outcome
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Explain Build Out

A
  • Iterate across multiple minimum MVPs, refine solution until you achieve the stated business out come
  • Become self-sufficient in achieving business results with the IBM Garage Method
  • Scale production environment and applications
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why use IBM Cloud for Financial Services?

A

Only public cloud platform with the framework in place to support regulatory workloads with automated security and industry leading encryption service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is unique about keep-your-own-key (KYOK)?

A

Only the IBM Cloud Hyper Protect Crypto Services offering features keep your own key encryption capabilities back by the highest level of security certification FIPS 140-2 Level 4- commercially available

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the IBM Cloud Framework for Financial Services?

A
  • VMware
  • Cloud Native
  • Red Hat Open Shift
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Explain IBM’s secure and enterprise-grade public cloud

A

has extensive service deployment options like VMware and Red Hat OpenShift as a service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Why use IBM Cloud for VMware Regulated Workloads?

A
  • Effectively implement and govern security controls in the cloud
  • Ensure auditing of all cloud administration
  • Protect business critical data assets
  • Prioritize meeting IT compliance for various national or industrial entities
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What do clients gain with IBM Cloud for VMware Regulated Workloads?

A

Rapid scalability

Deployment in global data centers

Disaster recovery

Backup & Security

Compliance Solutions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The IBM Cloud for VMware Regulated Workloads uses what policy for framework?

A

IBM Cloud for Financial Services Policy

which deploys a shared-responsibility model for implementing controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Name the key attributes and enabling technologies of IBM Cloud for VMware Regulated Workloads

A

Isolation

Access Restrictions- IAM, Role Based Admin

Policies

Encryption - Key management (BYOK & KYOK)

Compliance

Backup and Data Recovery

Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Why use IBM Cloud Security Portfolio?

A

You can:

Manage Access

Protect Data

Gain Visibility-

Optimize Operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Explain Manage Access as it pertains to IBM Cloud Security

A

when you create secure cloud enabled solutions you must enable identity and access management so that you can authenticate and authorize a user.

when you’re using infrastructure from the cloud it’s important to manage the identities that are associated with privileged activities, such as tasks done by cloud administrators

You also must track the activities of the people who are involved in development and operations.

You must also manage user and customer access to your cloud applications

20
Q

Explain Protecting Infrastructure, Application, and Data as it pertains to IBM Security Cloud

A

In traditional data centers you must provide tenant- specific network and isolation to protect the cloud infrastructure

For application protection you must design a secure development and operation process ( SecDevOPs or DevSecOps) * process includes steps to manage vulnerabilities in VMs, container, and application code

For data protection, your solution must cover techniques to encrypt data at rest, such as files, objects, and storage
* must also include steps for how to monitor data activity and processes to verify and audit data that is outsource

21
Q

Explain Gain Visibily as it pertains to IBM Securtiy Cloud

A

You need end to end visibility and integration of security processes and tooling throughout your organization

  • You can build improved security and visibility into virtual infrastructure by collecting and analyzing logs in real time across the various components and services in cloud
22
Q

What two environments can you implement security monitoring and intelligence?

A

IBM Cloud Foundry Environment - multi tenant public cloud instance

IBM Cloud Kubernetes Service Environment - multi tenant control plane and a single tenant compute node

23
Q

Explain the architecuture of Security on the cloud

A
Identity and Access
Application Security - App Scanning, Threat Protection
Data Security- Activity Monitoring
Infrastructure Security
Security Intelligence
24
Q

To secure data protection, what should you consider?

A

Data Encryption

Block and File Storage

Key Management Services (KMS)

Security Key Lifecycle Manager (SKLM)

Object Storage

Data Services

Certificate Management

Crypto Services

25
Q

What does data integrity refer to?

A

maintaining and assuring the accuracy and consistency of data over its entire lifecycle

26
Q

What does hashing data mean?

A

It allows you to detect unauthorized modifications that have been made into data

Used for data at rest ( such as rows in the table of a database) or for data in motion

27
Q

Give an example of hashing data

A

When data is stored in a database, you can generate a hash for the row of a table and store the hash value. If a row is tampered with by modifying a field in the row, a comparison with the previously generated hash value will indicate someone has tampered with the data

28
Q

In the IBM Cloud catalog, database-related services will have what?

A

built in data integrity capabilities

29
Q

In IBM Cloud Object Storage what combinations of encryption and data integrity algorithms are supported?

A

RC4-128 encryption with MD5-128 Hash for data Integrity

AES-128 encryption with MD5-128 Hash for data integrity

30
Q

IBM DB2 Hosted has what?

A

the same enterprise data integrity controls in place as IBM DB2.

It provides entity and referential integrity

31
Q

Explain IBM Security Guardium

A

provides integrated data classification capabilities and a seamless approach to finding, classifying, and protecting your most critical data.

32
Q

Why Use IBM Secure DevOps?

A

Secure Engineering

Secure Deployment and Operations

Separation of Duties

Availability and Business Continuity Management

Security Evaluation and Learning

33
Q

Why IBM Security Policy and Governance Approach

A

IBM builds security into its cloud solutions and meets strict governmental and industry security guidelines and policies

34
Q

What are IBM Cloud Paks?

A

package of one or more enterprise-grade, secure and lifecycle manage IBM Certified Container Offerings

Runs on a Red Hat Kubernetes-based OpenShift Container Platform base layer

35
Q

Why use Cloud Paks?

A

Cloud Paks are an open, faster, more reliable way to build, deploy and run applications on hybrid cloud

Help streamline development task and reduce operational expenses, help improve business agility

Cloud Paks run anywhere, are open and secure, and are consumable

36
Q

Features of Red Hat OpenShift

A

Enterprise grade- not subjet to continual community updates

Fully supported by Red Hat to run anywhere

Capable of supporting deployment on any infrastructure from mainframes to commercial public clouds

37
Q

How many cloud paks does IBM offer?

A

six

38
Q

Explain IBM Cloud Pak for Security

A

Delivers the next generation of Security threat Management platform that will enable managed security service providers (MSSPs) to scale their business

Provides an open secure platform by which users can access security data across different tools, clouds and IT environments

39
Q

Explain IBM Cloud Pak for Applications?

A

Enterprise ready contanerized software solution for modernizing existing applications and developing new cloud native apps that run on Red Hat OpenShift

40
Q

Explain IBM Cloud Pak for Data

A

lets you connect to your data, govern it, and trust it. It facilitates data scaling by streamlining legacy data sources.

Gives you the ability to lift and shift your data to IBM platform

41
Q

Explain IBM Cloud Pak for Integration

A

allows enterprises to modernize it s processes while positioning itself for future innovation.

Creates and manages APIs to help client access data in a fast and secure manner

42
Q

Explain IBM Cloud Pak for MultiCloud

A

Runs on Red Hat OpenShift

multicluster management

event management

application management

infrastructure management

43
Q

Explain IBM Cloud Pak for Automation

A

Lets you quickly scale up or down to meet fluctuating customer demand, create new products and increase productivity of remote and onsite workers

a complete and flexible set of integrated automation software that can be deployed whenever you need it, on any cloud.

44
Q

What is the difference between a value statement and value proposition

A

A value statmement desribes a benefit of a product

A value proposition is the value statement that resolves a client’s needs

45
Q

Supports regulatory workloads with automated security and encryption services

A

IBM Cloud for Financial Services

46
Q

Ensures auditing of all cloud administration

A

IBM Cloud for VMware Solutions for Financial Services