You are on page 1of 9

IBM Security Verify Access Level 2 Quiz: Attempt review https://learn.ibm.com/mod/quiz/review.php?attempt=2274103&cmid...

Started on Thursday, April 20, 2023, 2:47 AM


Back Next
State Finished
Completed on Thursday, April 20, 2023, 3:04 AM
Time taken 17 mins 34 secs
Grade 23.00 out of 25.00 (92%)
Feedback Congratulations, you have passed the IBM
Security Verify Access Manager Level 2
Quiz!

Question 1

Correct

1.00 points out of 1.00

When using user-based pricing (UVU's) to calculate a price,


how many external users equal one UVU?

15 

10
20
5

Question 2

Correct

1.00 points out of 1.00

Your are fighting a competitive battle against Microsoft. The


client perceives Microsoft's access management solution to be
free of charge. How can you win?

Tell the client that Verify SaaS is a much better solution


and does not cost as much
Tell the client that IBM provides a more customizable
solution
Tell the client that Microsoft requires third-party 

integration to protect on-prem apps, which is an extra


charge
Tell the client in a polite way that Microsoft tools do not
integrate well

1 sur 9 10/05/2023 10:27


IBM Security Verify Access Level 2 Quiz: Attempt review https://learn.ibm.com/mod/quiz/review.php?attempt=2274103&cmid...

Question 3

Correct Back Next


1.00 points out of 1.00

Your client is losing market share due to aggressive


competition. Their applications are all on-prem and their
digital presence is minimal. What solution should you suggest
to help them?

Verify SaaS and CIAM (Consumer Identity and Access 


Management)
Verify Privilege and Verify SaaS
Verify Access Management and Verify SaaS
Verify Privilege and CIAM (Consumer Identity and Access
Management)

Question 4

Correct

1.00 points out of 1.00

Within the identity and access market, cloud adoption is


growing and many clients plan to move to hybrid cloud. What is
fueling this growth?

Clients want better control over user access


Clients want a better return on investment
Clients want to streamline how their employees and 

consumers access resources and services


Clients want to modernize their security implementations

2 sur 9 10/05/2023 10:27


IBM Security Verify Access Level 2 Quiz: Attempt review https://learn.ibm.com/mod/quiz/review.php?attempt=2274103&cmid...

Question 5

Correct Back Next


1.00 points out of 1.00

You are presenting IBM's Zero Trust use cases at a client


meeting. What are they?

Secure the hybrid cloud, preserve client privacy, provide


secure access
Preserve client privacy, reduce insider threat, control
secure access
Reduce insider threat, protect the hybrid cloud, secure the
hybrid workforce, control secure access
Preserve client privacy, reduce the risk of insider 

threat, protect the hybrid cloud, secure the hybrid


workforce

Question 6

Correct

1.00 points out of 1.00

In a client proposal, you recommend that the client implement


a strong access management foundation. Which of the
following will not be included in the access management
foundation?

Data governance protocols 


Single sign on (SSO)


Identity governance policy
Multi-factor authentication (MFA)

Question 7

Correct

1.00 points out of 1.00

Many clients want adaptive access. How many have actually


implemented it?

0.17 

0.44
0.65
0.25

3 sur 9 10/05/2023 10:27


IBM Security Verify Access Level 2 Quiz: Attempt review https://learn.ibm.com/mod/quiz/review.php?attempt=2274103&cmid...

Question 8

Correct Back Next


1.00 points out of 1.00

In a client meeting, the Chief Information Security Officer


(CISO) asks how many attacks occur due to compromised
credentials. What do you say?

0.25
0.44
0.2 

0.75

Question 9

Correct

1.00 points out of 1.00

You are asked by the systems administrator what the key


technology is that fuels Zero Trust principles. How do you
respond?

Single sign on (SSO)


Adaptive access 

Risk based control


Multi-factor authentication (MFA)

Question 10

Correct

1.00 points out of 1.00

If you are competing against Okta, which of the following might


be a good approach to beat them?

Highlight their length in the market


Hghlight that they don't have true adaptive access 

Sell consumer identity and access management


Focus on their integration with applications

4 sur 9 10/05/2023 10:27


IBM Security Verify Access Level 2 Quiz: Attempt review https://learn.ibm.com/mod/quiz/review.php?attempt=2274103&cmid...

Question 11

Correct Back Next


1.00 points out of 1.00

You client wants to implement a consumer identity and access


management (CIAM) solution. What should you sell?

Verify SaaS 

Verify Access
Verify Governance
Verify Privilege

Question 12

Correct

1.00 points out of 1.00

I am based on machine-learning, taking multiple context


inputs and providing a confidence score for whether an
individual should be authenticated. What am I?

Keyboard and mouse movements


Multi-factor authentication (MFA)
Adaptive access 

Single sign on (SSO)

Question 13

Correct

1.00 points out of 1.00

According to Forrester, the user benefits of IBM Verify over a


three year period equate to how much?

$7.5M
$101K
$10.1M 

$269K

5 sur 9 10/05/2023 10:27


IBM Security Verify Access Level 2 Quiz: Attempt review https://learn.ibm.com/mod/quiz/review.php?attempt=2274103&cmid...

Question 14

Correct Back Next


1.00 points out of 1.00

Which client executive is responsible for preventing data loss


and fraud?

CIO (Chief Information Officer)


Chief Privacy Officer (CPO)
Chief Compliance Officer (CCO)
CISO (Chief Information Security Officer) 

Question 15

Correct

1.00 points out of 1.00

As you enter your client's location, you overhear a


conversation, in which clients complain about the time it takes
to get access, and you see this as a potential opportunity.
Typically, in most organizations, how long does it take for a
user to get access to a required system?

At least a week 

3 days
4 days
5 working days

Question 16

Correct

1.00 points out of 1.00

You are meeting with the Chief Information Security Officer


(CISO), who is asking what the required component is when
purchasing IBM Security Verify Access. What do you say?

Advanced Access Control


ISVA Enterprise
Federation
IBM Security Verify Access Base 

6 sur 9 10/05/2023 10:27


IBM Security Verify Access Level 2 Quiz: Attempt review https://learn.ibm.com/mod/quiz/review.php?attempt=2274103&cmid...

Question 17

Correct Back Next


1.00 points out of 1.00

At a meeting, your clients' focus is cloud transformation and


security conflict management. Who are you meeting with?

Key developer
Chief Information Security Officer (CISO) 

Line of business (LOB) manager


Chief Information Officer (CIO)

Question 18

Correct

1.00 points out of 1.00

You are meeting a new client, and find yourself explaining what
it means to protect customer privacy within their organization.
Which of the following is not included in the discussion?

Revoking access 

Securing user onboarding


Enforcing policy regulations
Managing user consent

Question 19

Incorrect

0.00 points out of 1.00

Which of these is not part of access management?

Identity governance
Advanced authentication
Single sign on 

Adaptive access

7 sur 9 10/05/2023 10:27


IBM Security Verify Access Level 2 Quiz: Attempt review https://learn.ibm.com/mod/quiz/review.php?attempt=2274103&cmid...

Question 20

Correct Back Next


1.00 points out of 1.00

What is one of the top interest areas for client spending?

Adaptive access
Multifactor authentication (MFA) 

Control access
Single sign on (SSO)

Question 21

Correct

1.00 points out of 1.00

The client says that IBM access solutions are old and only
focus on legacy applications. How do you respond?

IBM has been innovating and developing new solutions to


meet the needs of our clients
IBM's Verify portfolio represents a modern and 

comprehensive suite of products, which consist of both


on-prem and cloud solutions
In comparison to other market vendors, only IBM has
modern solutions which provide clients with value and are
cost-effective
Recent innovations in access management provide IBM's
clients with the best features available in the market

Question 22

Incorrect

0.00 points out of 1.00

Adoption of cloud identity and access management is being


driven by many factors, but which of these is not a driving force
for moving to cloud?

Shortage of security professionals


Decrease in the remote workforce
Shift to passwordless authentication 

Desire to preserve cash

8 sur 9 10/05/2023 10:27


IBM Security Verify Access Level 2 Quiz: Attempt review https://learn.ibm.com/mod/quiz/review.php?attempt=2274103&cmid...

Question 23

Correct Back Next


1.00 points out of 1.00

One of your client executives is preparing for an important


meeting and needs some help in understanding Zero Trust.
How would you explain Zero Trust?

Zero Trust can be equated to access management


Zero Trust is an approach, that will give you the tools 

you need to deliver trusted experiences


Zaro Trust ensures compliance and compatibility
With Zero Trust your assets are protected and your
network is safer against malicious attacks

Question 24

Correct

1.00 points out of 1.00

Although IBM is a leader in the access management market,


which competitor is ranked higher than IBM?

One Identity
ForgeRock 

Microsoft
Okta

Question 25

Correct

1.00 points out of 1.00

More and more employees are based at home, and protecting a


remote workforce is challenging. IBM's key portfolio
differentiators for helping clients with access management
includes what?

Single sign on, adaptive access, advanced 


authentication
Multifactor authentication, adaptive access
Single sign on, Multifactor authentication
Advanced authentication, Multifactor authentication

9 sur 9 10/05/2023 10:27

You might also like