0% found this document useful (0 votes)
160 views8 pages

Quiz [Verify L1] results _ Your Learning

The document is a quiz result indicating that the participant scored 70% but did not pass the required 75%. It includes details about incorrect answers and specific questions related to IBM's security products and concepts. The participant can reattempt the quiz to improve their score.

Uploaded by

hazdey
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
160 views8 pages

Quiz [Verify L1] results _ Your Learning

The document is a quiz result indicating that the participant scored 70% but did not pass the required 75%. It includes details about incorrect answers and specific questions related to IBM's security products and concepts. The participant can reattempt the quiz to improve their score.

Uploaded by

hazdey
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

Quiz

Quiz [Verify L1]

Sorry, you did not pass.


You can reattempt this quiz.

Your score Passing score Date

70% (14 of 20) answered correctly 75% 19 Dec 2024

Review quiz results

6 incorrect answers

Your answers are shown below. The correct answers are not included.

Question 11
A new seller is learning about a product that allows organizations to take back control with a single integrated
platform that manages access across many common scenarios. Which product is the seller learning about?

Verify Access

Verify Privilege

Consumer Identity and Access Management (CIAM)

Verify Governance

Question 13
Verify Governance has 3 add-ons which clients can purchase. What are they?

Lifecycle, Compliance, Role optimization


Lifecycle, Compliance, Host Adapters

Lifecycle, Compliance, Application Adapters

Role optimization, Application Adapters, Host Adapters

Question 15
An IBM seller bumps into their client executive. In a short conversation, the seller is asked for a definition of
orchestration because the client heard that it was included in IBM's recent announcements. How should the
seller respond?

Orchestration will protect sensitive data

Orchestration minimizes the cost of a data breach

Orchestration helps clients identify threat actors

Orchestration provides low-code/no-code automation of the user journey and identity


management flows

Question 18
The client wants to enforce least privilege security, and control application rights on endpoints. Which product
will the client benefit most from?

Verify Privilege Cloud Suite

Verify Privilege Manager

Verify Privilege Vault

Verify Privilege Server Suite

Question 19
The development manager is evaluating IBM and wants to know the main components of Verify Access. What
are they?

IBM Security Verify Access, Federation

IBM Security Verify Access, Advanced Access Control, Federation

Advanced Access Control, Federation


IBM Security Verify Access, Advanced Access Control

Question 20
When selling to a financial client, the seller gets asked what metric does Verify pricing use to quantify an
organization’s dynamic usage between user populations and product use cases. What should the answer be?

User based pricing (UVU)

Resource units

Processor based pricing (PVU)

Processor cores

14 correct answers

Question 1
In a client meeting, the seller asks the client if they know how many privileged accounts they have and where
they are located. Why is it important to ask this question?

Privileged accounts can be used to target outside organizations.

More than 80% of breaches involve privileged users and credentials, and these users have access to
the most sensitive assets and data of an organization. It's important to know where the privileged
accounts reside.

Privileged accounts are the target of all phishing attacks.

Users of privileged accounts can obtain sensitive data which can harm the organization.

Question 2
A new seller joins the team and needs assistance writing a proposal. The seller is not sure what to
propose as the lead-with product for both access and Consumer Identity and Access Management
(CIAM) use cases. What product should be proposed?

Verify Privilege

Verify Governance
Verify Access

Verify SaaS

Question 3
IBM Security Verify Governance provides automation and compliance support on multiple platforms, and
approaches access personas in a different, more productive way than most competitors. Because roles and
titles can often be confusing and unclear, Verify Governance is NOT based on roles but on what?

Business results

Business activity

Business modeling

Business plans

Question 4
The client heard about Identity Threat Detection and Response (ITDR) but does not understand it. In simple
terms, how should the seller describe what it is?

ITDR protects privileged accounts

ITDR (Identity Threat Detection and Response) is a multi-faceted approach to protecting


identity data and the IAM (Identity and Access Management) infrastructure around it

ITDR enables quick detection of threats and when enhanced with QRadar capabilities,
will protect clients 99.9% of the time

IBM will have capabilities in ITDR which the competition will not match

Question 5
The client wants to discover, manage, protect, and audit privileged accounts across their organization. Which
product in the Verify Privilege portfolio will help the client do that?

Verify Privilege Cloud Suite

Verify Privilege Server Suite

Verify Privilege Vault


Verify Privilege Manager

Question 6
Identity Fabric fundamentals include: enabling risk-based authentication, consolidating identity silos,
integrating legacy apps, delivering actionable insights across threats, and what else?

Mitigating threats

Orchestrating integration across existing identity solutions

Low code/no code

Consolidating identity policies

Question 7
At a client meeting, the client wanted to know about an information security concept or principle in
which a user is given the minimum levels of access – or permissions – needed to perform their job
functions. What is this principle called?

Identity Fabric

Orchestration

Least Privilege

Access Management

Question 8
You are writing a proposal and want to add how many clients are moving to the cloud. In fact, what percentage
are projected to deploy cloud by 2027?

75.3%

69.4%

45%

76.3%
Question 9
What abstraction layer in a multi-cloud identity management uses orchestration to manage multiple identity
domains on multiple clouds?

Access Management

Identity Fabric

Orchestration

Privileged Access

Question 10
Verify Governance has a number of modules, but the client does not need to purchase all of them. Which
modules should the seller recommend that the client start with?

Role optimization

Lifecycle and/or Compliance

Enterprise edition

Host adapters

Question 12
What is a Privileged Access Management?

Privileged Access Management (PAM) includes Verify Access Management

Privileged Access Management (PAM) protects privileged users from direct phishing attacks

Privileged Access Management (PAM) allows all users access to privileged accounts

Privileged Access Management (PAM) refers to a class of solutions that help secure, control, manage,
and monitor privileged access to critical assets

Question 14
The seller meets with a client and the client says that one of his major pain points is meeting industry
compliance expectations. Who is the seller meeting with?
Chief Information Officer (CIO)

Development Manager

Chief Information Security Officer (CISO)

Line of Business (LoB) Leader

Question 16
When selling IBM Verify Governance, one does not need to sell the entire Governance suite, but only what the
client needs. If the client needs to get insight on risky users and their behavior, what should the seller sell to
them?

Lifecycle Management

Access certification

Password management

Identity Analytics

Question 17
The client is confused on what IBM Security Verify is and what it provides. The seller should say what?

IBM Security Verify provides trusted use cases and a client needs to use
complementing products to get full capability

IBM Security Verify is the only solution in the market which addresses Separation of Duties
(SoD)

The IBM Security® Verify family provides automated, cloud-based and on-premises capabilities for
administering identity governance, managing workforce and consumer identity and access, and
controlling privileged accounts

IBM Security Verify enables quick detection of threats using Identity Threat Detection
and Response (ITDR) capabilities, coupled with Verify Privilege

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy