Quiz [Verify L1] results _ Your Learning
Quiz [Verify L1] results _ Your Learning
6 incorrect answers
Your answers are shown below. The correct answers are not included.
Question 11
A new seller is learning about a product that allows organizations to take back control with a single integrated
platform that manages access across many common scenarios. Which product is the seller learning about?
Verify Access
Verify Privilege
Verify Governance
Question 13
Verify Governance has 3 add-ons which clients can purchase. What are they?
Question 15
An IBM seller bumps into their client executive. In a short conversation, the seller is asked for a definition of
orchestration because the client heard that it was included in IBM's recent announcements. How should the
seller respond?
Question 18
The client wants to enforce least privilege security, and control application rights on endpoints. Which product
will the client benefit most from?
Question 19
The development manager is evaluating IBM and wants to know the main components of Verify Access. What
are they?
Question 20
When selling to a financial client, the seller gets asked what metric does Verify pricing use to quantify an
organization’s dynamic usage between user populations and product use cases. What should the answer be?
Resource units
Processor cores
14 correct answers
Question 1
In a client meeting, the seller asks the client if they know how many privileged accounts they have and where
they are located. Why is it important to ask this question?
More than 80% of breaches involve privileged users and credentials, and these users have access to
the most sensitive assets and data of an organization. It's important to know where the privileged
accounts reside.
Users of privileged accounts can obtain sensitive data which can harm the organization.
Question 2
A new seller joins the team and needs assistance writing a proposal. The seller is not sure what to
propose as the lead-with product for both access and Consumer Identity and Access Management
(CIAM) use cases. What product should be proposed?
Verify Privilege
Verify Governance
Verify Access
Verify SaaS
Question 3
IBM Security Verify Governance provides automation and compliance support on multiple platforms, and
approaches access personas in a different, more productive way than most competitors. Because roles and
titles can often be confusing and unclear, Verify Governance is NOT based on roles but on what?
Business results
Business activity
Business modeling
Business plans
Question 4
The client heard about Identity Threat Detection and Response (ITDR) but does not understand it. In simple
terms, how should the seller describe what it is?
ITDR enables quick detection of threats and when enhanced with QRadar capabilities,
will protect clients 99.9% of the time
IBM will have capabilities in ITDR which the competition will not match
Question 5
The client wants to discover, manage, protect, and audit privileged accounts across their organization. Which
product in the Verify Privilege portfolio will help the client do that?
Question 6
Identity Fabric fundamentals include: enabling risk-based authentication, consolidating identity silos,
integrating legacy apps, delivering actionable insights across threats, and what else?
Mitigating threats
Question 7
At a client meeting, the client wanted to know about an information security concept or principle in
which a user is given the minimum levels of access – or permissions – needed to perform their job
functions. What is this principle called?
Identity Fabric
Orchestration
Least Privilege
Access Management
Question 8
You are writing a proposal and want to add how many clients are moving to the cloud. In fact, what percentage
are projected to deploy cloud by 2027?
75.3%
69.4%
45%
76.3%
Question 9
What abstraction layer in a multi-cloud identity management uses orchestration to manage multiple identity
domains on multiple clouds?
Access Management
Identity Fabric
Orchestration
Privileged Access
Question 10
Verify Governance has a number of modules, but the client does not need to purchase all of them. Which
modules should the seller recommend that the client start with?
Role optimization
Enterprise edition
Host adapters
Question 12
What is a Privileged Access Management?
Privileged Access Management (PAM) protects privileged users from direct phishing attacks
Privileged Access Management (PAM) allows all users access to privileged accounts
Privileged Access Management (PAM) refers to a class of solutions that help secure, control, manage,
and monitor privileged access to critical assets
Question 14
The seller meets with a client and the client says that one of his major pain points is meeting industry
compliance expectations. Who is the seller meeting with?
Chief Information Officer (CIO)
Development Manager
Question 16
When selling IBM Verify Governance, one does not need to sell the entire Governance suite, but only what the
client needs. If the client needs to get insight on risky users and their behavior, what should the seller sell to
them?
Lifecycle Management
Access certification
Password management
Identity Analytics
Question 17
The client is confused on what IBM Security Verify is and what it provides. The seller should say what?
IBM Security Verify provides trusted use cases and a client needs to use
complementing products to get full capability
IBM Security Verify is the only solution in the market which addresses Separation of Duties
(SoD)
The IBM Security® Verify family provides automated, cloud-based and on-premises capabilities for
administering identity governance, managing workforce and consumer identity and access, and
controlling privileged accounts
IBM Security Verify enables quick detection of threats using Identity Threat Detection
and Response (ITDR) capabilities, coupled with Verify Privilege