Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
676 views9 pages

IBM Verify Level 1

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
676 views9 pages

IBM Verify Level 1

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 9

Quiz [Verify L1]

You must receive a score of 75% or higher on the quiz to complete the course.

Started on Monday, December 2, 2024, 11:01 AM

State Finished

Completed on Monday, December 2, 2024, 11:43 AM

Time taken 41 mins 54 secs

Feedback Congratulations, you passed the quiz!

Question 1
Correct
Points out of 1.00

Flag question
Question text
When selling IBM Verify Governance, one does not need to sell the entire
Governance suite, but only what the client needs. If the client needs to get
insight on risky users and their behavior, what should the seller sell to them?
Question 1Answer
Lifecycle Management
Password management
Access certification
Identity Analytics
Question 2
Correct
Points out of 1.00

Flag question
Question text
What is a Privileged Access Management?
Question 2Answer
Privileged Access Management (PAM) refers to a class of solutions that help
secure, control, manage, and monitor privileged access to critical assets
Privileged Access Management (PAM) allows all users access to privileged
accounts
Privileged Access Management (PAM) protects privileged users from direct
phishing attacks
Privileged Access Management (PAM) includes Verify Access Management
Question 3
Incorrect
Points out of 1.00

Remove flag
Question text
You are writing a proposal and want to add how many clients are moving to the
cloud. In fact, what percentage are projected to deploy cloud by 2027?
Question 3Answer
69.4%
76.3%
45%
75.3%
Question 4
Correct
Points out of 1.00

Flag question
Question text
IBM Security Verify Governance provides automation and compliance support on
multiple platforms, and approaches access personas in a different, more
productive way than most competitors. Because roles and titles can often be
confusing and unclear, Verify Governance is NOT based on roles but on what?
Question 4Answer
Business modeling
Business activity
Business plans
Business results
Question 5
Incorrect
Points out of 1.00
Flag question
Question text
A new seller joins the team and needs assistance writing a proposal. The seller is
not sure what to propose as the lead-with product for both access and Consumer
Identity and Access Management (CIAM) use cases. What product should be
proposed?
Question 5Answer
Verify Privilege
Verify SaaS
Verify Access
Verify Governance
Question 6
Correct
Points out of 1.00

Flag question
Question text
The client wants to discover, manage, protect, and audit privileged accounts
across their organization.
Which product in the Verify Privilege portfolio will help the client do that?
Question 6Answer
Verify Privilege Server Suite
Verify Privilege Cloud Suite
Verify Privilege Manager
Verify Privilege Vault
Question 7
Incorrect
Points out of 1.00

Flag question
Question text
The client heard about Identity Threat Detection and Response (ITDR) but does
not understand it. In simple terms, how should the seller describe what it is?
Question 7Answer
ITDR enables quick detection of threats and when enhanced with QRadar
capabilities, will protect clients 99.9% of the time
ITDR (Identity Threat Detection and Response) is a multi-faceted approach to
protecting identity data and the IAM (Identity and Access Management)
infrastructure around it
IBM will have capabilities in ITDR which the competition will not match
ITDR protects privileged accounts
Question 8
Correct
Points out of 1.00

Flag question
Question text
The client wants to enforce least privilege security, and control application rights
on endpoints. Which product will the client benefit most from?
Question 8Answer
Verify Privilege Cloud Suite
Verify Privilege Vault
Verify Privilege Server Suite
Verify Privilege Manager
Question 9
Correct
Points out of 1.00

Flag question
Question text
Verify Governance has 3 add-ons which clients can purchase. What are they?
Question 9Answer
Lifecycle, Compliance, Role optimization
Lifecycle, Compliance, Application Adapters
Lifecycle, Compliance, Host Adapters
Role optimization, Application Adapters, Host Adapters
Question 10
Correct
Points out of 1.00

Flag question
Question text
At a client meeting, the client wanted to know about an information security
concept or principle in which a user is given the minimum levels of access – or
permissions – needed to perform their job functions. What is this principle called?
Question 10Answer
Least Privilege
Access Management
Orchestration
Identity Fabric
Question 11
Correct
Points out of 1.00

Flag question
Question text
In a client meeting, the seller asks the client if they know how many privileged
accounts they have and where they are located. Why is it important to ask this
question?
Question 11Answer
More than 80% of breaches involve privileged users and credentials, and these
users have access to the most sensitive assets and data of an organization. It's
important to know where the privileged accounts reside.
Users of privileged accounts can obtain sensitive data which can harm the
organization.
Privileged accounts are the target of all phishing attacks.
Privileged accounts can be used to target outside organizations.
Question 12
Correct
Points out of 1.00

Flag question
Question text
What abstraction layer in a multi-cloud identity management uses orchestration
to manage multiple identity domains on multiple clouds?
Question 12Answer
Orchestration
Access Management
Privileged Access
Identity Fabric
Question 13
Correct
Points out of 1.00

Flag question
Question text
Verify Governance has a number of modules, but the client does not need to
purchase all of them. Which modules should the seller recommend that the client
start with?
Question 13Answer
Enterprise edition
Role optimization
Host adapters
Lifecycle and/or Compliance
Question 14
Correct
Points out of 1.00

Remove flag
Question text
A new seller is learning about a product that allows organizations to take back
control with a single integrated platform that manages access across many
common scenarios. Which product is the seller learning about?
Question 14Answer
Consumer Identity and Access Management (CIAM)
Verify Access
Verify Governance
Verify Privilege
Question 15
Incorrect
Points out of 1.00

Remove flag
Question text
When selling to a financial client, the seller gets asked what metric does Verify
pricing use to quantify an organization’s dynamic usage between user
populations and product use cases. What should the answer be?
Question 15Answer
Resource units
Processor cores
Processor based pricing (PVU)
User based pricing (UVU)
Question 16
Correct
Points out of 1.00

Flag question
Question text
An IBM seller bumps into their client executive. In a short conversation, the seller
is asked for a definition of orchestration because the client heard that it was
included in IBM's recent announcements. How should the seller respond?
Question 16Answer
Orchestration will protect sensitive data
Orchestration helps clients identify threat actors
Orchestration provides low-code/no-code automation of the user journey and
identity management flows
Orchestration minimizes the cost of a data breach
Question 17
Correct
Points out of 1.00

Flag question
Question text
The development manager is evaluating IBM and wants to know the main
components of Verify Access. What are they?
Question 17Answer
Advanced Access Control, Federation
IBM Security Verify Access, Advanced Access Control, Federation
IBM Security Verify Access, Federation
IBM Security Verify Access, Advanced Access Control
Question 18
Correct
Points out of 1.00

Flag question
Question text
Identity Fabric fundamentals include: enabling risk-based authentication,
consolidating identity silos, integrating legacy apps, delivering actionable
insights across threats, and what else?
Question 18Answer
Orchestrating integration across existing identity solutions
Mitigating threats
Low code/no code
Consolidating identity policies
Question 19
Correct
Points out of 1.00

Flag question
Question text
The seller meets with a client and the client says that one of his major pain
points is meeting industry compliance expectations. Who is the seller meeting
with?
Question 19Answer
Chief Information Security Officer (CISO)
Line of Business (LoB) Leader
Chief Information Officer (CIO)
Development Manager
Question 20
Correct
Points out of 1.00

Flag question
Question text
The client is confused on what IBM Security Verify is and what it provides. The
seller should say what?
Question 20Answer
IBM Security Verify is the only solution in the market which addresses Separation
of Duties (SoD)
The IBM Security® Verify family provides automated, cloud-based and on-
premises capabilities for administering identity governance, managing workforce
and consumer identity and access, and controlling privileged accounts
IBM Security Verify provides trusted use cases and a client needs to use
complementing products to get full capability
IBM Security Verify enables quick detection of threats using Identity Threat
Detection and Response (ITDR) capabilities, coupled with Verify Privilege

You might also like