IBM Exam Questions

How is authentication and encryption implemented between collectors, aggregators and the Central Pol

How is authentication and encryption implemented between collectors, aggregators and the
Central Policy Manager in a multi-tier Guardium environment?

A.
Using an encrypted file containing the system password that must be copied to the Central
Policy Manager and collectors.

B.
A System Shared Secret is specified through the GUI for each collector and the Central Policy
Manager.

C.
The Central Policy Manager scans the network for Guardium collectors and performs a security
handshake with each appliance.

D.
The communication between collectors and the Central Policy Manager is based on unsecured
network packets.