0% found this document useful (0 votes)
56 views10 pages

Quiz (Verify Governance L2) Results - Your Learning

The document details the results of a quiz on IBM Security Verify Governance, indicating that the participant scored 56% and did not pass the required 75%. It includes a breakdown of questions, the participant's incorrect answers, and highlights key topics related to identity governance and access management. The quiz results suggest areas for improvement and further study in IBM's governance solutions.

Uploaded by

hazdey
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
56 views10 pages

Quiz (Verify Governance L2) Results - Your Learning

The document details the results of a quiz on IBM Security Verify Governance, indicating that the participant scored 56% and did not pass the required 75%. It includes a breakdown of questions, the participant's incorrect answers, and highlights key topics related to identity governance and access management. The quiz results suggest areas for improvement and further study in IBM's governance solutions.

Uploaded by

hazdey
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

Quiz

Quiz [Verify Governance L2]

Sorry, you did not pass.


You can reattempt this quiz.

Your score Passing score Date

56% (14 of 25) answered correctly 75% 10 Mar 2025

Review quiz results

11 incorrect answers

Your answers are shown below. The correct answers are not included.

Question 1
You are responding to a client request for information and want to explain what IBM Security
Verify includes. IBM Security Verify provides solutions across which areas?

Access management, identity governance, consumer identity, and privilege access


management

Access management, privilege access management, and identity governance

Access management, consumer identity, and data protection

Identity governance, consumer identity and access, and data protection

Skip to main content


Question 6
You are meeting with your client and you tell them about a solution that increases operational
efficiency and enables their administrators to provide quicker responses. It integrates deeply
with IBM's Verify governance solutions and provides better security insights. What are you
trying to sell?

Verify Access

Verify SaaS

Verify Governance

Identity Analytics

Question 7
You are training a new colleague who is concerned about making quota. You explain that by
selling a governance solution and adding additional services, the deal size can grow. What is
the average deal size for a governance solution?

$125K

$450K

$110K

$1M

Question 9
You have an opportunity to upsell to a large on-prem client that needs a SaaS solution for
identity and access management for workforce and consumer. What will you upsell?

Verify SaaS

Verify On-Premise Flex-Points bundle

Verify Governance Enterprise

Skip to main content


Verify Hybrid

Question 12
The User-based pricing (UVU) pricing model requires the categorization of the user base as
either internal users, external users, or infrequent users. Each internal user equals one user for
the purpose of calculating UVUs. How many external/infrequent users equal one user for the
purpose of calculating UVUs?

Fifteen external/infrequent users equal one user for the purpose of calculating
UVUs

Five external/infrequent users equal one user for the purpose of calculating UVUs

Ten external/infrequent users equal one user for the purpose of calculating UVUs

One external/infrequent user equals one user for the purpose of calculating UVUs

Question 13
There are multiple modules within IBM Security Verify Governance, but this specific module
streamlines business processes and helps enforce governance policies for identity lifecycle
management. Which module is this?

Application adapters

Role optimization module

Compliance module

Lifecycle module

Question 17
In your efforts to close a deal you mention some unique features of Verify Governance hoping
it will seal the deal. Which of these is NOT a unique feature?

Identity Manager enables admins to configure advanced provisioning policy

Skip to main content


It supports Multi-factor Authentication (MFA)

Large ecosystem

Deployment choice of on prem, private cloud, public cloud or hybrid

Question 19
This cloud native platform covers identity and access management (IAM) use cases in different
areas. It includes identity governance and other capabilities such as single sign-on (SSO),
Multi-factor Authentication (MFA), and Consumer Identity and Access (CIAM) management.
This platform provides deep, AI-powered context for risk-based authentication and adaptive
access decisions, as well as guided experiences for developers. What is this platform?

IBM Security Verify Governance

IBM Security Verify SaaS

IBM Security Access Management

IBM Security Privileged Access Management

Question 21
You will meet with a prospective client and you anticipate they will ask you what some of the
trends are in governance. Which of these is NOT a key trend?

Analytics is playing a bigger role in real-time access decisions

Contribution to return on investment (ROI)

Transition of many organizations from on-prem to cloud

More bots are involved in provisioning access

Question 22
Governance spans multiple areas and personas within organizations. Which persona/s is most
interested in finding an efficient way to onboard applications securely, and to maintain security
Skip to main content
compliance?

System Administration Manager

Auditing Manager

Line of Business Manager

Business end-user Manager

Question 25
What is the average cost of failing a data protection audit?

$14.8M

$4.35M

$15.5M

$12.7M

14 correct answers

Question 2
You are writing a proposal and want to differentiate how IBM differs from the competition,
specifically in how IBM approaches Segregation of Duties (SoD). What is the biggest
difference?

IBM uses business activity modeling for Segregation of Duties (SoD)

IBM uses attribute basd modeling for Segregation of Duties (SoD)

IBM supports Segregation of Duties (SoD) exception approval

Skip to main content


IBM uses role-based modeling for Segregation of Duties (SoD)

Question 3
Your client tells you that competitors have more comprehensive identity governance
capabilities on cloud than IBM. How do you react?

According to Gartner, many competitors lack comprehensive governance solutions


on cloud, and IBM is the only vendor with an end-to-end solution

That statement is more a reflection of aggressive marketing and selling rather than
reality. From recent analyst reports one can see IBM's market position

Verify SaaS is a cloud native consolidated identity and access management


platform that covers key IAM technologies and includes commonly used Identity
Governance and Administration (IGA) capabilities, and with more capabilities in
IBM’s roadmap. This gives clients an option to offload an on-prem IGA workload to
cloud in a staged approach

IBM has unique solutions on-prem and in the cloud to help clients move in their
journey to cloud, and no other major vendor matches this capability

Question 4
Your client is considering use cases to capitalize on their investment. Your client's investment
in IBM Security Governance can be augmented with IBM Security Verify SaaS. Which of the
following is NOT an example of a potential use case?

Dashboard for on-prem applications

Launchpad with secure access to applications

User registration, profile and consent management

Identity analytics for risk awareness

Question 5
Identity Governance and Administration (IGA) is a fundamental building block of an
organization’s identity and access management strategy that leads to what?

Skip to main content


More stringent identity lifecycle management

A reduction in the number of unauthorized users

It leads to improved and streamlined business processes and facilitates


compliance, and a reduction in staff

Improved and streamlined business processes, facilitates compliance, reduces the


risk of unauthorized access, and provides efficient control and automation for
identity lifecycle management

Question 8
You are meeting with the Chief Information Security Officer (CISO), who is asking what the
Role Optimization Module provides. What do you say?

The Role Optimization Module helps large clients only

The Role Optimization Module helps you with role mining and modeling

The Role Optimization Module helps in entitlement synchronization

The Role Optimization Module helps in provisioning

Question 10
You are presenting to the operations team at your client, and from their questions, it is clear
they do not understand what identity governance and administration (IGA) is. Which sentence
will explain what IGA is?

By next year, Identity Governance and Administration (IGA) will help clients
automate the security lifecycle management process

Identity Governance and Administration (IGA) helps organizations comply with


data security regulations provided they adhere to GDPR standards

Identity Governance and Administration (IGA) helps clients in meeting audit


compliance only if they are on cloud

Skip to main content


Identity Governance and Administration (IGA) helps organizations manage identity
and access to ensure that the right people have the right access at the right time

Question 11
A prospective client does not think that security breaches are a big deal. In order to convince
them that they are, you cite that the cost of a data breach is up 13% in two years, and that the
average cost of a data breach is what?

$14.8M

$4.35M

$5.7M

$3.6M

Question 14
You are waiting for your client to appear and in your mind you are contemplating what
questions to ask to identify potential opportunities. Which of the following is NOT a
recommended question to ask your client?

How often do you meet with executive management to discuss security issues?

Are you enforcing your Segregation of Duties (SOD) policies?

Are you meeting your regulations for user access controls?

How do you identify and manage risks associated with user access?

Question 15
According to the KuppingerCole Leadership Compass, which of the following vendors is the
overall leader in the Identity Governance and Administration (IGA) market?

Savyint

Micro Focus
Skip to main content
SailPoint

One Identity

Question 16
In your selling strategy, you want to reach out to business end-users because they have input
in the purchasing decision. What needs do these end-users typically have?

They need to review policy violations reports and make corrections

They want to minimize the use of self-service portals

They require that all of their applications pass compliance rules set by the
Information Technology department

They need to find and access applications quickly

Question 18
You are facing stiff competition and ask your colleagues for advice. You are not sure what
approach to take. They tell you that one of the following is NOT a recommended approach to
win against the competitor. Which one is it?

IBM Verify SaaS platform is the preferred adoption method for IDaaS use cases

Demonstrate the value of SaaS-delivered IAM strategy

Prioritize Identity Analytics use cases to help mitigate risk, clean-up, and
continuous governance

Stress the value of IBM's ecosystem

Question 20
Your client heard from one of their partners that human elements account for breaches, but
does not believe it, and is asking IBM if that is true. What percentage of breaches involve
human elements such as social attacks, errors and misuse?

Skip to main content 67%


82%

72%

54%

Question 23
Employees move within, around, and outside the organization. Which of these terms identifies
employees when they move internally?

Adapters

Movers

Leavers

Joiners

Question 24
A client prospect expresses several concerns about security and risk management, one about
their access controls being all over the place. Which of these is NOT a comment that the client
makes regarding security and risk management?

Our managers automatically approve access requests

Done
W t d ith dit t thi ti

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy