1.
Which is not one of the three steps Gemalto promotes to help organizations “Secure the Breach”?
Correct Answer
B. Perimeter security
Explanation
Gemalto promotes three steps to help organizations "Secure the Breach": controlling access to data with strong authentication, encrypting sensitive data, and managing encryption keys. Perimeter security is not mentioned as one of the steps.
2.
Gemalto has been the leader in the Gartner Magic Quadrant for Strong Authentication for the last __ years.
Correct Answer
C. 4
Explanation
Gemalto has been the leader in the Gartner Magic Quadrant for Strong Authentication for the last 4 years. This indicates that Gemalto has consistently been recognized as the top performer in providing strong authentication solutions by Gartner, a leading research and advisory company. This achievement demonstrates Gemalto's expertise, innovation, and ability to meet the needs of organizations looking for reliable and secure authentication solutions.
3.
Gemalto authentication solutions offer organizations flexible delivery models combined with a wide range of form factors and authentication methods, including
Correct Answer
F. All of the Above
Explanation
Gemalto authentication solutions offer organizations a wide range of form factors and authentication methods, including software tokens, hardware tokens, smart cards, and one-time passwords (OTP). This means that Gemalto provides flexible delivery models and options for organizations to choose from, depending on their specific needs and preferences. Therefore, the correct answer is "All of the Above" as Gemalto offers all the mentioned authentication solutions.
4.
By using Gemalto’s Deal Registration program, you can get an additional discount of
Correct Answer
C. 10%
Explanation
By using Gemalto's Deal Registration program, customers can avail an additional discount of 10%. This program allows customers to register their deals with Gemalto, ensuring that they receive exclusive pricing and benefits for their purchases. The 10% discount serves as an incentive for customers to participate in the program, ultimately helping them save more on their purchases.
5.
When displacing RSA authentication solutions with SafeNet Authentication Service (SAS) you can offer your customers up to __% off of list price.
Correct Answer
D. 30
Explanation
When displacing RSA authentication solutions with SafeNet Authentication Service (SAS), customers can receive a discount of 30% off the list price. This means that customers can save a significant amount of money when switching to SAS for their authentication needs.
6.
Gemalto has an extensive partner ecosystem, with over ___ technology partners.
Correct Answer
C. 300
Explanation
Gemalto has an extensive partner ecosystem, which indicates that they have a large network of technology partners. The fact that they have over 300 technology partners suggests that they have a wide range of collaborations and alliances in the industry. This demonstrates their ability to work with various partners to provide comprehensive solutions and services to their customers.
7.
True or false: Key management is needed to effectively and efficiently enable protection across the enterprise wherever data resides.
Correct Answer
A. True
Explanation
Key management is necessary to ensure the effective and efficient protection of data across the entire enterprise. Encryption keys are used to encrypt and decrypt data, and proper management of these keys is crucial to maintaining the security and integrity of the data. Without effective key management, it would be difficult to control access to sensitive information and ensure its confidentiality. Therefore, it is true that key management is needed for data protection across the enterprise.
8.
By using High Speed Encryption (Layer 2), customers can
Correct Answer
B. Protect their data in motion
Explanation
High Speed Encryption (Layer 2) is used to protect data while it is in motion, meaning when it is being transmitted over a network. This encryption method ensures that the data is secure and cannot be intercepted or accessed by unauthorized individuals. It does not specifically protect data at rest, which refers to data that is stored on devices or servers, or encryption keys, which are used to encrypt and decrypt the data. Therefore, the correct answer is "Protect their data in motion."
9.
A Hardware Security Module (HSM) is used to protect
Correct Answer
D. All of the Above
Explanation
A Hardware Security Module (HSM) is a device that is used to protect various aspects of a system, including transactions, identities, and applications. It provides a secure environment for storing and managing cryptographic keys, ensuring the integrity and confidentiality of sensitive information. By using an HSM, organizations can safeguard their transactions, protect user identities, and secure their applications from unauthorized access or tampering. Therefore, the correct answer is "All of the Above" as an HSM is capable of protecting all these elements.
10.
Take advantage of our ecosystem cross sell promotions! Through the end of the year, attach Gemalto HSMs or SAS to select_____ products and received an additional 10% off net price.
Correct Answer
D. All of the Above
Explanation
The correct answer is "All of the Above." This means that customers can attach Gemalto HSMs or SAS to any of the mentioned products (Blue Coat, Palo Alto Networks, F5) and receive an additional 10% off the net price. The promotion is applicable to all the listed products, providing customers with the opportunity to take advantage of the ecosystem cross sell promotions.
11.
Enter Your First Name
Correct Answer
N/A
12.
Enter Your Last Name
Correct Answer
N/A
13.
Enter your Optiv email address
Correct Answer
N/A
14.
Enter Your Title
Correct Answer
N/A