IBM Security Verify Access Level 2 24 PDF
IBM Security Verify Access Level 2 24 PDF
Back Next
State Finished
Completed on Saturday, February 4, 2023, 11:51 AM
Time taken 22 mins 10 secs
Grade 24.00 out of 25.00 (96%)
Feedback Congratulations, you have passed the IBM Security Verify
Access Manager Level 2 Quiz!
Question 1
Complete
More and more employees are based at home, and protecting a remote
workforce is challenging. IBM's key portfolio differentiators for helping clients
with access management includes what?
Question 2
Complete
Which client executive is responsible for preventing data loss and fraud?
Question 3
Complete
You are meeting a new client, and find yourself explaining what it means to
protect customer privacy within their organization. Which of the following is not
included in the discussion?
Identity governance
Single sign on
Advanced authentication
Adaptive access
Question 5
Complete
Within the identity and access market, cloud adoption is growing and many
clients plan to move to hybrid cloud. What is fueling this growth?
Question 6
Complete
Okta
Microsoft
One Identity
ForgeRock
Question 7
Complete
Verify Governance
Verify Privilege
Verify Access
Verify SaaS
Question 8
Many clients want adaptive access. How many have actually implemented it?
0.44
0.17
0.25
0.65
Question 9
Complete
Question 10
Complete
When using user-based pricing (UVU's) to calculate a price, how many external
users equal one UVU?
5
10
20
15
Question 11
Complete
In a client proposal, you recommend that the client implement a strong access
management foundation. Which of the following will not be included in the
access management foundation?
Your are fighting a competitive battle against Microsoft. The client perceives
Microsoft's access management solution to be free of charge. How can you win?
Tell the client that Verify SaaS is a much better solution and does not cost as
much
Tell the client that IBM provides a more customizable solution
Tell the client that Microsoft requires third-party integration to protect on-
prem apps, which is an extra charge
Tell the client in a polite way that Microsoft tools do not integrate well
Question 13
Complete
According to Forrester, the user benefits of IBM Verify over a three year period
equate to how much?
$269K
$7.5M
$10.1M
$101K
Question 14
Complete
You are presenting IBM's Zero Trust use cases at a client meeting. What are
they?
Preserve client privacy, reduce the risk of insider threat, protect the hybrid
cloud, secure the hybrid workforce
Preserve client privacy, reduce insider threat, control secure access
Secure the hybrid cloud, preserve client privacy, provide secure access
Reduce insider threat, protect the hybrid cloud, secure the hybrid workforce,
control secure access
Question 15
You are asked by the systems administrator what the key technology is that fuels
Zero Trust principles. How do you respond?
Question 16
Complete
One of your client executives is preparing for an important meeting and needs
some help in understanding Zero Trust. How would you explain Zero Trust?
With Zero Trust your assets are protected and your network is safer against
malicious attacks
Zaro Trust ensures compliance and compatibility
Zero Trust can be equated to access management
Zero Trust is an approach, that will give you the tools you need to deliver
trusted experiences
Question 17
Complete
In a client meeting, the Chief Information Security Officer (CISO) asks how many
attacks occur due to compromised credentials. What do you say?
0.2
0.25
0.75
0.44
Question 18
You are meeting with the Chief Information Security Officer (CISO), who is asking
what the required component is when purchasing IBM Security Verify Access.
What do you say?
Federation
IBM Security Verify Access Base
Advanced Access Control
ISVA Enterprise
Question 19
Complete
The client says that IBM access solutions are old and only focus on legacy
applications. How do you respond?
IBM has been innovating and developing new solutions to meet the needs of
our clients
In comparison to other market vendors, only IBM has modern solutions
which provide clients with value and are cost-effective
Recent innovations in access management provide IBM's clients with the
best features available in the market
IBM's Verify portfolio represents a modern and comprehensive suite of
products, which consist of both on-prem and cloud solutions
Question 20
Complete
If you are competing against Okta, which of the following might be a good
approach to beat them?
Question 22
Complete
Question 23
Complete
Control access
Multifactor authentication (MFA)
Single sign on (SSO)
Adaptive access
Question 24
Complete
As you enter your client's location, you overhear a conversation, in which clients complain about the time it takes to get acces
as a potential opportunity. Typically, in most organizations, how long does it take for a user to get access to a required system?
4 days
At least a week
5 working days
3 days