0% found this document useful (0 votes)
111 views8 pages

IBM Security Verify Access Level 2 24 PDF

The document appears to be a quiz completed by an IBM sales representative on IBM's identity and access management solutions. It consists of 25 multiple choice questions testing the representative's knowledge of IBM's Verify portfolio, Zero Trust principles, adaptive access, and other access management topics. The representative passed the quiz with a score of 24/25 (96%).

Uploaded by

Justice Mapanga
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
111 views8 pages

IBM Security Verify Access Level 2 24 PDF

The document appears to be a quiz completed by an IBM sales representative on IBM's identity and access management solutions. It consists of 25 multiple choice questions testing the representative's knowledge of IBM's Verify portfolio, Zero Trust principles, adaptive access, and other access management topics. The representative passed the quiz with a score of 24/25 (96%).

Uploaded by

Justice Mapanga
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

Started on Saturday, February 4, 2023, 11:29 AM

Back Next
State Finished
Completed on Saturday, February 4, 2023, 11:51 AM
Time taken 22 mins 10 secs
Grade 24.00 out of 25.00 (96%)
Feedback Congratulations, you have passed the IBM Security Verify
Access Manager Level 2 Quiz!

Question 1

Complete

1.00 points out of 1.00

More and more employees are based at home, and protecting a remote
workforce is challenging. IBM's key portfolio differentiators for helping clients
with access management includes what?

Single sign on, Multifactor authentication


Multifactor authentication, adaptive access
Advanced authentication, Multifactor authentication
Single sign on, adaptive access, advanced authentication

Question 2

Complete

1.00 points out of 1.00

Which client executive is responsible for preventing data loss and fraud?

CISO (Chief Information Security Officer)


CIO (Chief Information Officer)
Chief Compliance Officer (CCO)
Chief Privacy Officer (CPO)

Question 3

Complete

1.00 points out of 1.00

You are meeting a new client, and find yourself explaining what it means to
protect customer privacy within their organization. Which of the following is not
included in the discussion?

Securing user onboarding


Enforcing policy regulations
Managing user consent
Revoking access
Question 4

Complete Back Next


1.00 points out of 1.00

Which of these is not part of access management?

Identity governance
Single sign on
Advanced authentication
Adaptive access

Question 5

Complete

1.00 points out of 1.00

Within the identity and access market, cloud adoption is growing and many
clients plan to move to hybrid cloud. What is fueling this growth?

Clients want better control over user access


Clients want to modernize their security implementations
Clients want a better return on investment
Clients want to streamline how their employees and consumers access
resources and services

Question 6

Complete

1.00 points out of 1.00

Although IBM is a leader in the access management market, which competitor is


ranked higher than IBM?

Okta
Microsoft
One Identity
ForgeRock

Question 7

Complete

1.00 points out of 1.00

You client wants to implement a consumer identity and access management


(CIAM) solution. What should you sell?

Verify Governance
Verify Privilege
Verify Access
Verify SaaS
Question 8

Complete Back Next


1.00 points out of 1.00

Many clients want adaptive access. How many have actually implemented it?

0.44
0.17
0.25
0.65

Question 9

Complete

1.00 points out of 1.00

At a meeting, your clients' focus is cloud transformation and security conflict


management. Who are you meeting with?

Line of business (LOB) manager


Chief Information Security Officer (CISO)
Chief Information Officer (CIO)
Key developer

Question 10

Complete

1.00 points out of 1.00

When using user-based pricing (UVU's) to calculate a price, how many external
users equal one UVU?

5
10
20
15

Question 11

Complete

1.00 points out of 1.00

In a client proposal, you recommend that the client implement a strong access
management foundation. Which of the following will not be included in the
access management foundation?

Identity governance policy


Data governance protocols
Single sign on (SSO)
Multi-factor authentication (MFA)
Question 12

Complete Back Next


1.00 points out of 1.00

Your are fighting a competitive battle against Microsoft. The client perceives
Microsoft's access management solution to be free of charge. How can you win?

Tell the client that Verify SaaS is a much better solution and does not cost as
much
Tell the client that IBM provides a more customizable solution
Tell the client that Microsoft requires third-party integration to protect on-
prem apps, which is an extra charge
Tell the client in a polite way that Microsoft tools do not integrate well

Question 13

Complete

1.00 points out of 1.00

According to Forrester, the user benefits of IBM Verify over a three year period
equate to how much?

$269K
$7.5M
$10.1M
$101K

Question 14

Complete

1.00 points out of 1.00

You are presenting IBM's Zero Trust use cases at a client meeting. What are
they?

Preserve client privacy, reduce the risk of insider threat, protect the hybrid
cloud, secure the hybrid workforce
Preserve client privacy, reduce insider threat, control secure access
Secure the hybrid cloud, preserve client privacy, provide secure access
Reduce insider threat, protect the hybrid cloud, secure the hybrid workforce,
control secure access
Question 15

Complete Back Next


1.00 points out of 1.00

You are asked by the systems administrator what the key technology is that fuels
Zero Trust principles. How do you respond?

Multi-factor authentication (MFA)


Adaptive access
Single sign on (SSO)
Risk based control

Question 16

Complete

1.00 points out of 1.00

One of your client executives is preparing for an important meeting and needs
some help in understanding Zero Trust. How would you explain Zero Trust?

With Zero Trust your assets are protected and your network is safer against
malicious attacks
Zaro Trust ensures compliance and compatibility
Zero Trust can be equated to access management
Zero Trust is an approach, that will give you the tools you need to deliver
trusted experiences

Question 17

Complete

1.00 points out of 1.00

In a client meeting, the Chief Information Security Officer (CISO) asks how many
attacks occur due to compromised credentials. What do you say?

0.2
0.25
0.75
0.44
Question 18

Complete Back Next


1.00 points out of 1.00

You are meeting with the Chief Information Security Officer (CISO), who is asking
what the required component is when purchasing IBM Security Verify Access.
What do you say?

Federation
IBM Security Verify Access Base
Advanced Access Control
ISVA Enterprise

Question 19

Complete

1.00 points out of 1.00

The client says that IBM access solutions are old and only focus on legacy
applications. How do you respond?

IBM has been innovating and developing new solutions to meet the needs of
our clients
In comparison to other market vendors, only IBM has modern solutions
which provide clients with value and are cost-effective
Recent innovations in access management provide IBM's clients with the
best features available in the market
IBM's Verify portfolio represents a modern and comprehensive suite of
products, which consist of both on-prem and cloud solutions

Question 20

Complete

0.00 points out of 1.00

If you are competing against Okta, which of the following might be a good
approach to beat them?

Focus on their integration with applications


Hghlight that they don't have true adaptive access
Sell consumer identity and access management
Highlight their length in the market
Question 21

Complete Back Next


1.00 points out of 1.00

Adoption of cloud identity and access management is being driven by many


factors, but which of these is not a driving force for moving to cloud?

Shortage of security professionals


Desire to preserve cash
Decrease in the remote workforce
Shift to passwordless authentication

Question 22

Complete

1.00 points out of 1.00

I am based on machine-learning, taking multiple context inputs and providing a


confidence score for whether an individual should be authenticated. What am I?

Keyboard and mouse movements


Adaptive access
Single sign on (SSO)
Multi-factor authentication (MFA)

Question 23

Complete

1.00 points out of 1.00

What is one of the top interest areas for client spending?

Control access
Multifactor authentication (MFA)
Single sign on (SSO)
Adaptive access

Question 24

Complete

1.00 points out of 1.00

Your client is losing market share due to aggressive competition. Their


applications are all on-prem and their digital presence is minimal. What solution
should you suggest to help them?

Verify Privilege and Verify SaaS


Verify Access Management and Verify SaaS
Verify Privilege and CIAM (Consumer Identity and Access Management)
Verify SaaS and CIAM (Consumer Identity and Access Management)
Question 25

Complete Back Next


1.00 points out of 1.00

As you enter your client's location, you overhear a conversation, in which clients complain about the time it takes to get acces
as a potential opportunity. Typically, in most organizations, how long does it take for a user to get access to a required system?

4 days
At least a week
5 working days
3 days

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy