Question : 4
Which of the following IBM software products provides enhanced security for the mobile environment?
A user ID/password has been compromised, and the unauthorized person has tried to access sensitive DB2 data, which the user ID is not permitted to access. The company is now interested in taking a more proactive approach to user ID protection. Which product can be used to detect this unauthorized DB2 activity and block specific requests?
B. Tivoli Omegamon
What ability does Custom Patterns for Linux on z Systems provide?
A. Progresses from an idea to a complete application within days, in order to develop composable business services.
B. Manages Linux on z Systems from your z environment or a distributed environment.
C. Improves productivity, simplify management and quickly move to a cloud environment through virtualization.
D. Increases agility by reducing provisioning times while increasing quality through automation.