You are on page 1of 4

1.

Dell Data Protection and Encryption with Credant Exam


1.Easy to use security on end-user devices is a feature enterprise PC buyers want.
2.Competitors encrypt entire disks. Why is this a problem?
3.A single lost or stolen PC can cost a company millions in lawsuits.
4.Dell delivers security through a comprehensive lifecycle approach. Which of these are part of that
lifecycle? Select all that apply.
5.What are some of the challenges of traditional endpoint data security? Select all that apply.
6.What is Authentication?
7.Dell data protection and encryption delivers the most broad product line in the industry.
8.Why is data protection and encryption important? Select all that apply.
9.Dell encrypts files, not the entire disk. Why is this a benefit?
10.What is Encryption? Select all that apply.
11.Having fast processors are the best ways PC manufacturers can differentiate themselves.
12.If your customer has a data protection solution, you should hang up. There is no opporunity there.
13.Select all that apply. Data security protects businesses by:

2. Understanding and Selling KACE


1.The Dell KACE Appliance supports all but the following operating system:
2.Entry level pricing for a KACE Appliance is roughly $10K for a 100 seat deployment?
3.The two KACE Appliance lines are the following:
4.Gartner named KACE as a what in their 2009 PCLM Magic Quadrant report
5.Select the 3 top reasons why KACE is a good fit for mid-sized organizations
6.What is the range of annual maintenance and support for Dell KACE Appliance?
7.If a customer mentions that they need Real time Server Monitoring, is this a great use case for the
Dell KACE Appliance?
8.The Dell KACE Appliance has an all inclusive pricing model?
9.Fill in the blank: _____% of KACE customers report that their appliance paid for itself in less than 3
months.
10.The Dell KACE Appliance is available the following configurations (select all that apply):
11.Reps that sell a KACE Appliance have historically had a sales cycle less than.

12.The Dell KACE Appliance form factor helps customers reduce costs in the following ways:
13.68% of Dell KACE Appliance customers reported deploying them in less than:
14.Which of the following does not describe an IT Generalist that wears many hats:
15.During one of your regular outbound call campaigns a customer mentions they will be going through
a Windows 7 refresh this year, has 120 desktops and servers, and is a two person IT Department. You now
feel that...
16.Which of these is a False Statement?
17.The KACE K2100/K2200 does all the following systems deployment tasks except:
18.Which of the following ROI drivers is not provided by the KACE Appliances
19.What type of imaging software do you use in your company today? is an example of a good
KACE
20.What are great places to point your customer for a more hands on feel of the product? (Choose 2)
21.The KACE Systems Management Appliance focuses on all of the following functional areas
EXCEPT?

3. Kace Demo
1.The Assets Tab allows the customer to tie assets to users for tracking purposes.
2.With the Service Desk Module, the customer can run multiple service desks from one K1000
Management Appliance.
3.The Dell Updates Tab is part of the Distribution Module.
4.The Managed Installations Tab is integrated with the AppDeploy.com website where IT
Professionals share information on how to install software titles.
5.With the Configuration Tab in the Service Desk Module, the customer can set up queues and
create process work flows for incoming incident tickets.
6.With the Inventory Module, the administrator can click into an individual machine for a detailed view
of that machine.
7.With the Reports Tab in the Reporting Module, the customer has access to a pre-defined list of
reports. They do not have the capability of creating customized reports.
8.One of the components of your Overview Demo should be presenting the Dell KACE Appliance Value
Proposition.

4. Application Intelligence
1.NGFW is an acronym which stands for:
2.Which feature(s) of Application Intelligence would you access to see how current network bandwidth
is being distributed? (Select 3)

3.True or False. Application control allows the control of bandwith usage by adding or changing a rule
or policy.
4.True or False. Application control rules can be applied to individual users as well as multiple users.
5.What feature of Application Intelligence allows you to see real time data flow?

5. Anti-Spam and Email Security


1.What are the features found in Dell SonicWALL's Anti-Spam Email Security solution. (Pick 3)
2.Which statements are true about our anti-spam and email security solutions? (Select 3.)
3.Spam is growing at exponential rates over 120 billion more messages a day
4.Dell SonicWALLs comprehensive anti-spam solution provides full-featured inbound protection
against spam, phishing, viruses, and malware
5.Which options differentiate Dell SonicWALL's anti-Spam solution from the competition? (Select 3.)
6.Dell SonicWALL's anti-spam solution can typically be installed in an hour or less
7.Spam has shifted from an annoyance to a security threat.
8.Dell SonicWALL's anti-spam solution scales from one to five million users.

6. Network Security
1.What percentage of office internet traffic is non-business related?
2.Dell SonicWALL firewalls use deep packet inspection technology that provides a comprehensive
approach to network security.
3.Application control enables configurable policies to block or allow applications and files, URLs, and
email attachments based upon type, user, schedules, custom signatures, and more.
4.Application visualization provides real-time graphs of applications, bandwidth consumed, users,
currently visited web sites and more.
5.Unauthorized access can result in legal liability based on legislation like HIPAA and Sarbanes-Oxley
that require data to be protected and maintained.
6.With SonicWALL application intelligence and control, our Next Generation Firewall solutions identify,
categorize, and control network traffic.

7. Policy Management and Reporting


1.Centralized management is achieved by using a single console to deploy, manage, and monitor a
distributed networked environment and policies from any location.
2.Select all deployment options available to GMS: (Select 3)

3.The acronym for the features found in GMS is RPM. What does RPM stands for?

8. Secure Remote Access


1.What is Dell SonicWALL's remote access strategy based on? (pick 3)
2.Dell SonicWALL's Aventail SSL VPN Solution for the Enterprise interrogates managed and nonmanaged devices prior to connecting AND on a recurring schedule, in order to identify the device and
determine the overall trust level.
3.Attacks are moving to the application level. Ill-defined access controls are leaving holes in the
network and this new model threatens to undermine control and policy across network boundaries
4.Companies are facing compounded security challenges as they adjust to an increasingly distributed
workforce. Mobility and remote access leads to security challenges, in addition to concerns about network
performance.

9. WXA
1.Dell SonicWALL's Secure Network Optimization uses a two pronged approach aimed at shaping
network traffic and then applying WAN acceleration. This provides your customer:
2.What is the first step in the Secure Network Optimization approach?
3.True/False. You should target existing Dell SonicWALL firewall customers with distributed networks
for WXA .
4.Dell SonicWALL's Secure Network Optimization accelerates predictable traffic, like MS office files by
remembering data previously transmitted and only passes along changes to the original document or file.
5.By default, enterprise applications such as SharePoint, Windows File Share, and MS Office do not
take into consideration bandwidth constraints.

You might also like