7/11/25, 6:31 PM Quiz [Guardium L1]: Attempt review
Quiz [Guardium L1]
You must receive a score of 75% or higher on the quiz to complete
Back Next
the course.
Started on Friday, July 11, 2025, 8:23 AM
State Finished
Completed on Friday, July 11, 2025, 9:00 AM
Time taken 36 mins 38 secs
Feedback Congratulations, you passed the quiz!
Question 1
Correct
Points out of 1.00
What percentage of data breaches involve data stored in cloud
environments?
60%
20%
40%
80%
Question 2
Correct
Points out of 1.00
What is the Market CAGR (Compound Annual Growth Rate) for
the data security market?
16%
12%
14%
18%
https://learn.ibm.com/mod/quiz/review.php?attempt=3990188&cmid=335696 1/11
7/11/25, 6:31 PM Quiz [Guardium L1]: Attempt review
Question 3
Correct
Points out of 1.00
Back Next
According to the 2024 Cost of a Data Breach Report, what is
the average total cost of a breach?
2.88 million dollars
3.88 million dollars
4.88 million dollars
5.88 million dollars
Question 4
Correct
Points out of 1.00
If a client wants to future-proof their encryption strategy
against quantum threats, what steps should you guide them to
take using Guardium Quantum Safe?
Use Guardium Quantum Safe to build a cryptographic
inventory, identify vulnerabilities, and prioritize
remediation based on risk posture and policies, and
protect applications and network endpoints without
application changes.
Leverage Guardium Quantum Safe to create a risk-based
plan, but NOT to track progress or accelerate remediation,
and instead rely on periodic manual audits to ensure
quantum safety.
Utilize Guardium Quantum Safe to scan custom
application code for cryptographic vulnerabilities, and
then manually update the code without evaluating the
performance of quantum-safe cryptographic algorithms.
Implement Guardium Quantum Safe to focus on replacing
existing encryption protocols with quantum-safe
algorithms, without assessing the current cryptographic
inventory or risk posture.
https://learn.ibm.com/mod/quiz/review.php?attempt=3990188&cmid=335696 2/11
7/11/25, 6:31 PM Quiz [Guardium L1]: Attempt review
Question 5
Correct
Points out of 1.00
Back Next
A client requires assistance in discovering and classifying
sensitive data across their hybrid environments to improve
compliance and reduce risk. What features of Guardium
Discover and Classify would you highlight?
Guardium Discover and Classify includes limited
discovery, automated tagging, and high classification with
95% accuracy to protect data and simplify compliance.
Guardium Discover and Classify delivers partial discovery,
business-driven tagging, and low classification with 70%
accuracy to improve compliance and reduce risk.
Guardium Discover and Classify offers comprehensive
discovery, business-driven tagging, and accurate
classification with 99.7% accuracy, verified by
independent tests, to protect data and simplify
compliance.
Guardium Discover and Classify provides manual
discovery, automated tagging, and moderate
classification with 80% accuracy to reduce risk and
improve compliance.
https://learn.ibm.com/mod/quiz/review.php?attempt=3990188&cmid=335696 3/11
7/11/25, 6:31 PM Quiz [Guardium L1]: Attempt review
Question 6
Correct
Points out of 1.00
Back Next
Suppose a client is struggling with managing encryption keys
across different environments. How would you propose they
utilize Guardium Key Lifecycle Manager to centralize and
automate key management?
Use Guardium Key Lifecycle Manager to centralize key
management, automate lifecycle controls, and provide
protocol flexibility, allowing clients to securely
generate, store, and serve encryption keys across
hybrid environments.
Propose the use of Guardium Key Lifecycle Manager
solely for data migration purposes, without addressing
key lifecycle automation, centralized management, or
protocol flexibility, thereby NOT fully leveraging its
capabilities.
Implement Guardium Key Lifecycle Manager to manage
only human identities, ignoring non-human identities, and
focus solely on on-premise deployments, thus neglecting
the needs of hybrid environments.
Utilize Guardium Key Lifecycle Manager to decentralize
key management, manually control key lifecycles, and
limit protocol flexibility, resulting in reduced security and
efficiency across environments.
https://learn.ibm.com/mod/quiz/review.php?attempt=3990188&cmid=335696 4/11
7/11/25, 6:31 PM Quiz [Guardium L1]: Attempt review
Question 7
Correct
Points out of 1.00
Back Next
If a client seeks to protect their AI models and data from
potential threats, what capabilities of Guardium AI Security
should you emphasize to help them discover, protect, and
govern their AI assets effectively?
Guardium AI Security is mainly designed for cloud-based
AI deployments, lacking comprehensive features for on-
premises AI solutions, and does NOT integrate with
external governance platforms like watsonx.governance.
Guardium AI Security provides capabilities to discover
shadow AI, prevent AI data leakage, secure AI
models, and govern with watsonx.governance to
ensure effective protection and compliance.
Guardium AI Security primarily focuses on securing Large
Language Models, offering limited support for other AI
systems, and relies on manual penetration testing for
vulnerability identification.
Guardium AI Security is centered around preventing AI
data leakage through real-time protections, but it does
NOT offer capabilities for discovering shadow AI or
securing AI models, and its governance features are
limited to tracking sanctioned models.
Question 8
Correct
Points out of 1.00
How many days on average does it take to identify and contain
breaches involving stolen credentials?
292 days
365 days
180 days
420 days
https://learn.ibm.com/mod/quiz/review.php?attempt=3990188&cmid=335696 5/11
7/11/25, 6:31 PM Quiz [Guardium L1]: Attempt review
Question 9
Correct
Points out of 1.00
Back Next
What percentage of current generative AI projects are being
secured?
12%
24%
40%
50%
Question 10
Correct
Points out of 1.00
A client wants to migrate their data to a hybrid cloud
environment and needs assistance with data security. What
product from the IBM Guardium portfolio should you
recommend to protect their sensitive data?
IBM MaaS360, because it offers a unified endpoint
management solution that helps manage and secure
devices.
IBM Cloud Pak for Security, because it offers a
comprehensive security platform that integrates with
various data sources and provides advanced threat
detection and response capabilities.
IBM Guardium, as it provides end-to-end data security
across the data lifecycle, protecting sensitive data,
simplifying compliance, and addressing AI and
encryption challenges.
IBM QRadar, as it provides a security information and
event management system that helps detect and respond
to threats.
https://learn.ibm.com/mod/quiz/review.php?attempt=3990188&cmid=335696 6/11
7/11/25, 6:31 PM Quiz [Guardium L1]: Attempt review
Question 11
Incorrect
Points out of 1.00
Back Next
Considering that 61% of IT leaders recognize it as a significant
threat, how would you advise a client to handle the issue of
shadow AI in their organization?
Recommend using only open-source AI models to avoid
the risks associated with shadow AI, as they are more
transparent and community-driven, thus reducing the
need for specialized security solutions.
Suggest that the client focus solely on securing their
cloud AI providers and code repositories, as these are
the primary sources of shadow AI, and ignore
embedded AI systems and assistants.
Implement Guardium AI Security to discover and protect
AI data, models, and applications, and integrate with
watsonx.governance for full lifecycle risk management
and compliance with emerging regulations.
Advise the client to adopt a wait-and-see approach,
monitoring the development of AI regulations and waiting
for more mature security solutions to emerge, rather than
investing in current technologies like Guardium AI
Security.
https://learn.ibm.com/mod/quiz/review.php?attempt=3990188&cmid=335696 7/11
7/11/25, 6:31 PM Quiz [Guardium L1]: Attempt review
Question 12
Incorrect
Points out of 1.00
Back Next
If a client expresses concern over the perceived complexity of
setting up and using IBM Guardium, what features or
improvements would you mention to alleviate their worries?
The complexity of IBM Guardium is mitigated by its
compatibility with third-party automation tools that
simplify the deployment and management process.
IBM Guardium introduced a new graphical user interface
(GUI) that allows for easy operations and automated
deployments and upgrades with Guardium Install
Manager.
IBM Guardium's complexity is offset by its extensive
library of pre-built templates that can be easily
customized to meet specific client needs, reducing the
setup time.
IBM Guardium has a simple command-line interface that
streamlines the setup process and reduces the need for
manual configuration, making it easy to use.
https://learn.ibm.com/mod/quiz/review.php?attempt=3990188&cmid=335696 8/11
7/11/25, 6:31 PM Quiz [Guardium L1]: Attempt review
Question 13
Correct
Points out of 1.00
Back Next
A client is concerned about the security of their sensitive data
across various cloud platforms. What product would you
recommend to provide granular encryption at the file,
database, and application layers?
For comprehensive data security, the client should opt for
Guardium for tokenization, which offers advanced data
masking and encryption capabilities.
The client should consider implementing Teradata
encryption, which provides robust encryption for data
stored in the cloud and on-premises environments.
CipherTrust Manager is the ideal solution for granular
encryption across cloud platforms, as it offers advanced
key management and user access control.
Guardium Data Encryption provides granular
encryption at the file, database, and application layers
for data stored both on premise and in the cloud,
addressing the client's security concerns.
https://learn.ibm.com/mod/quiz/review.php?attempt=3990188&cmid=335696 9/11
7/11/25, 6:31 PM Quiz [Guardium L1]: Attempt review
Question 14
Correct
Points out of 1.00
Back Next
A prospective client asks about the differences between IBM
Guardium and Imperva, particularly regarding agentless
monitoring. How would you respond to highlight Guardium's
advantages?
IBM Guardium only supports agent-based monitoring,
which is more secure than Imperva's agentless approach,
and is the reason why Guardium is preferred for sensitive
data.
IBM Guardium's agentless monitoring is limited to only a
few data sources, whereas Imperva offers agentless
monitoring for all data sources, giving it a broader range
of monitoring capabilities.
IBM Guardium provides flexibility with both agent and
agentless monitoring options, including the Universal
Connector Framework for agentless monitoring,
whereas Imperva does not offer the same level of
flexibility.
Imperva's agentless monitoring is more comprehensive
than Guardium's, as it can monitor more data sources
without the need for agents, making it a better choice for
large-scale deployments.
https://learn.ibm.com/mod/quiz/review.php?attempt=3990188&cmid=335696 10/11
7/11/25, 6:31 PM Quiz [Guardium L1]: Attempt review
Question 15
Incorrect
Points out of 1.00
Back Next
A client is experiencing difficulties in complying with
regulations due to the sprawling nature of their data across
on-premises and cloud environments. How should you
position IBM Guardium to address this challenge?
IBM Guardium simplifies compliance by offering a data
discovery and classification tool, enabling clients to
identify and categorize their sensitive data, and then
apply the appropriate governance policies.
IBM Guardium helps clients simplify compliance by
enforcing governance policies consistently and
demonstrating compliance with automated tools,
reducing costs and effort with no impact on business
processes.
IBM Guardium addresses compliance challenges by
providing a centralized platform for data storage, allowing
clients to consolidate their data and reduce the
complexity of their data environment.
IBM Guardium helps clients comply with regulations
by providing a comprehensive data encryption
solution, ensuring that all data is protected from
unauthorized access, regardless of its location.
https://learn.ibm.com/mod/quiz/review.php?attempt=3990188&cmid=335696 11/11