Quiz (Verify Governance L2) Results - Your Learning
Quiz (Verify Governance L2) Results - Your Learning
11 incorrect answers
Your answers are shown below. The correct answers are not included.
Question 1
You are responding to a client request for information and want to explain what IBM Security
Verify includes. IBM Security Verify provides solutions across which areas?
Verify Access
Verify SaaS
Verify Governance
Identity Analytics
Question 7
You are training a new colleague who is concerned about making quota. You explain that by
selling a governance solution and adding additional services, the deal size can grow. What is
the average deal size for a governance solution?
$125K
$450K
$110K
$1M
Question 9
You have an opportunity to upsell to a large on-prem client that needs a SaaS solution for
identity and access management for workforce and consumer. What will you upsell?
Verify SaaS
Question 12
The User-based pricing (UVU) pricing model requires the categorization of the user base as
either internal users, external users, or infrequent users. Each internal user equals one user for
the purpose of calculating UVUs. How many external/infrequent users equal one user for the
purpose of calculating UVUs?
Fifteen external/infrequent users equal one user for the purpose of calculating
UVUs
Five external/infrequent users equal one user for the purpose of calculating UVUs
Ten external/infrequent users equal one user for the purpose of calculating UVUs
One external/infrequent user equals one user for the purpose of calculating UVUs
Question 13
There are multiple modules within IBM Security Verify Governance, but this specific module
streamlines business processes and helps enforce governance policies for identity lifecycle
management. Which module is this?
Application adapters
Compliance module
Lifecycle module
Question 17
In your efforts to close a deal you mention some unique features of Verify Governance hoping
it will seal the deal. Which of these is NOT a unique feature?
Large ecosystem
Question 19
This cloud native platform covers identity and access management (IAM) use cases in different
areas. It includes identity governance and other capabilities such as single sign-on (SSO),
Multi-factor Authentication (MFA), and Consumer Identity and Access (CIAM) management.
This platform provides deep, AI-powered context for risk-based authentication and adaptive
access decisions, as well as guided experiences for developers. What is this platform?
Question 21
You will meet with a prospective client and you anticipate they will ask you what some of the
trends are in governance. Which of these is NOT a key trend?
Question 22
Governance spans multiple areas and personas within organizations. Which persona/s is most
interested in finding an efficient way to onboard applications securely, and to maintain security
Skip to main content
compliance?
Auditing Manager
Question 25
What is the average cost of failing a data protection audit?
$14.8M
$4.35M
$15.5M
$12.7M
14 correct answers
Question 2
You are writing a proposal and want to differentiate how IBM differs from the competition,
specifically in how IBM approaches Segregation of Duties (SoD). What is the biggest
difference?
Question 3
Your client tells you that competitors have more comprehensive identity governance
capabilities on cloud than IBM. How do you react?
That statement is more a reflection of aggressive marketing and selling rather than
reality. From recent analyst reports one can see IBM's market position
IBM has unique solutions on-prem and in the cloud to help clients move in their
journey to cloud, and no other major vendor matches this capability
Question 4
Your client is considering use cases to capitalize on their investment. Your client's investment
in IBM Security Governance can be augmented with IBM Security Verify SaaS. Which of the
following is NOT an example of a potential use case?
Question 5
Identity Governance and Administration (IGA) is a fundamental building block of an
organization’s identity and access management strategy that leads to what?
Question 8
You are meeting with the Chief Information Security Officer (CISO), who is asking what the
Role Optimization Module provides. What do you say?
The Role Optimization Module helps you with role mining and modeling
Question 10
You are presenting to the operations team at your client, and from their questions, it is clear
they do not understand what identity governance and administration (IGA) is. Which sentence
will explain what IGA is?
By next year, Identity Governance and Administration (IGA) will help clients
automate the security lifecycle management process
Question 11
A prospective client does not think that security breaches are a big deal. In order to convince
them that they are, you cite that the cost of a data breach is up 13% in two years, and that the
average cost of a data breach is what?
$14.8M
$4.35M
$5.7M
$3.6M
Question 14
You are waiting for your client to appear and in your mind you are contemplating what
questions to ask to identify potential opportunities. Which of the following is NOT a
recommended question to ask your client?
How often do you meet with executive management to discuss security issues?
How do you identify and manage risks associated with user access?
Question 15
According to the KuppingerCole Leadership Compass, which of the following vendors is the
overall leader in the Identity Governance and Administration (IGA) market?
Savyint
Micro Focus
Skip to main content
SailPoint
One Identity
Question 16
In your selling strategy, you want to reach out to business end-users because they have input
in the purchasing decision. What needs do these end-users typically have?
They require that all of their applications pass compliance rules set by the
Information Technology department
Question 18
You are facing stiff competition and ask your colleagues for advice. You are not sure what
approach to take. They tell you that one of the following is NOT a recommended approach to
win against the competitor. Which one is it?
IBM Verify SaaS platform is the preferred adoption method for IDaaS use cases
Prioritize Identity Analytics use cases to help mitigate risk, clean-up, and
continuous governance
Question 20
Your client heard from one of their partners that human elements account for breaches, but
does not believe it, and is asking IBM if that is true. What percentage of breaches involve
human elements such as social attacks, errors and misuse?
72%
54%
Question 23
Employees move within, around, and outside the organization. Which of these terms identifies
employees when they move internally?
Adapters
Movers
Leavers
Joiners
Question 24
A client prospect expresses several concerns about security and risk management, one about
their access controls being all over the place. Which of these is NOT a comment that the client
makes regarding security and risk management?
Done
W t d ith dit t thi ti