You are on page 1of 15

IBM Security Verify Privilege Level 2

Quiz Back Next

ALL ANSWERS to the quiz can be found in the slides and speaker notes
included in the presentation material of this course. Others assets (videos) are
provided to enhance and deepen the learning experience.
Started on Monday, February 12, 2024, 7:05 AM
State Finished
Completed on Monday, February 12, 2024, 7:14 AM
Time taken 8 mins 46 secs
Grade 18.00 out of 25.00 (72%)
Feedback Sorry, you did not pass the IBM Security Privilege
Access Manager Level 2 Quiz.
Question 1 Your client is capable of knowing how many people
Complete are accessing key privileged accounts. This is
because you sold which product?
0.00 points out
Back Next
of 1.00

IBM Security Verify Privilege Vault Analytics

IBM Security Verify Privilege DevOps Vault

IBM Security Verify Privilege Manager

IBM Security Verify Privilege DevOps

Question 2 Who are possible buyers or influencers within the


Complete client organization for Privileged Access Management
(PAM) opportunities?
1.00 points out
of 1.00

CISO, VP of IT Administration

CISO (Chief Information Security Officer), VP of


IT Administration, VP of Development, Desktop
support

VP of Development, Desktop support, Chief


Architect
CISO, Desktop support, Systems Administrator
Question 3 The client wants an on prem and cloud solution that
Complete will provide application control and enforce least
privilege. What do you propose?
0.00 points out
Back Next
of 1.00

IBM Security Verify Privilege DevOps

IBM Security Verify Privilege Vault

IBM Security Verify Privilege DevOps Vault

IBM Security Verify Privilege Manager

Question 4 For clients buying a Verify Privilege Vault SaaS


Complete solution, what is entitled without any additional cost
to them?
1.00 points out
of 1.00

All of Verify SaaS

Multi-factor authentication (MFA) from Verify


SaaS

Single sign-on (SSO) and Multi-factor


authentication (MFA) from Verify SaaS

Single sign-on (SSO) from Verify SaaS


Question 5 Which is best suited for enforcing Least Privilege
Complete security, and control application rights on endpoints?

1.00 points out


Back Next
of 1.00 IBM Security Verify Privilege Account Lifecycle
Manager
IBM Security Verify Privilege Vault

IBM Security Verify Privilege DevOps

IBM Security Verify Privilege Manager

Question 6 Your client wants to better manage credentials for


Complete enterprise admin users and is looking for a viable
solution. What do you recommend?
1.00 points out
of 1.00

IBM Security Verify Privilege DevOps

IBM Security Verify Privilege DevOps Vault

IBM Security Verify Privilege Manager

IBM Security Verify Privilege Vault


Question 7 Your client wants to integrate a Privileged Access
Complete Management (PAM) solution into DevOps use cases.
Which PAM component is the right fit for this?
1.00 points out
Back Next
of 1.00

IBM Security Verify Privilege DevOps

IBM Security Verify Privilege Account Lifecycle


Manager

IBM Security Verify Privilege Vault

IBM Security Verify Privilege Manager

Question 8 Who are the key competitors for IBM's Privileged


Complete Access Management (PAM solution?

1.00 points out


of 1.00 CyberArk, One Identity, Okta

CyberArk, BeyondTrust, One Identity

CyberArk, BeyondTrust, Saviynt

CyberArk, BeyondTrust, Okta


Question 9 A client asks, "How do we trust that there are no
Complete backdoors in Privilege Vault to allow the vendor
access to our passwords?" How do you respond?
0.00 points out
Back Next
of 1.00

Privilege Vault is supported by a team of


technical gurus who deal with identity and
access management, in a diverse array of
customer environments

Privilege Vault is meant to be installed on-


premises so that all data is stored securely in a
customer’s database

All secret data is salted, hashed, and then


encrypted
Privilege Vault supports a large number of
platforms for password changes
Question 10 Your client wants to know which of these capabilities
Complete are correctly aligned for IBM Security Verify Privilege
Vault? How do you respond?
0.00 points out
Back Next
of 1.00

Vaulting, auditing, and discovery

Vaulting, auditing, and session control

End point privilege enforcement

Discovery, vaulting, auditing, and session control

Question 11 IBM Security Verify Privilege provides out-of-the-box


Complete integration with which of these products?

1.00 points out


of 1.00 IBM Security Verify Governance, IBM Security
Verify SaaS

IBM QRadar, IBM Guardium Insights, IBM


Security Verify Governance, IBM Security Verify
SaaS
IBM Security Verify SaaS

IBM QRadar, IBM Guardium Insights


Question 12 Your client wants to govern service accounts. Which
Complete Privileged Access Management (PAM) component is
the right fit for this?
1.00 points out
Back Next
of 1.00

IBM Security Verify Privilege Vault Remote

IBM Security Verify Privilege Vault Analytics

IBM Security Verify Privilege Account Lifecycle


Manager

IBM Security Verify Privilege Manager

Question 13 A client is considering a CyberArk, IBM, and


Complete Hashicorp solution. Which of these statements is
correct for Hashicorp?
1.00 points out
of 1.00

Not an enterprise Privileged Access Management


(PAM) solution, just focused on Developer or
DevOps use cases

Not useful for Red Hat and OpenShift


integrations
Does not provide DevOps use cases

Not useful for application integration


Question 14 Your client is afraid of a ransomware attack, knowing
Complete that a large percentage of companies do actually pay
the ransomware. What percentage of companies in
1.00 points out
the last two years actually paid the ransomware? Back Next
of 1.00

61%

25%

5%

33%

Question 15 Which of these is a concern for CyberArk clients?


Complete

1.00 points out Gaps in DevOps use cases


of 1.00
Performance

Red Hat integrations

Expensive ongoing professional services


Question 16 Twenty-eight percent of critical infrastructure
Complete organizations experienced a destructive or
ransomware attack, but what percentage Back Next
0.00 points out
experienced a breach because of a business partner
of 1.00
being compromised?

17%

40%

25%

33%

Question 17 Your client wants an easy way to decommission,


Complete provision and secure service accounts. What do you
recommend?
1.00 points out
of 1.00

IBM Security Verify Account Lifecycle Manager

IBM Security Verify Privilege Vault

IBM Security Verify Privilege DevOps Vault


IBM Security Verify Privilege DevOps
Question 18 A systems administrator clicks on a malicious link
Complete and hackers take control. What product should the
client have implemented to stop malware and
0.00 points out
ransomware attacks? Back Next
of 1.00

IBM Security Verify Privilege DevOps Vault

IBM Security Verify Privilege Manager

IBM Security Verify Privilege DevOps

IBM Security Verify Privilege Vault

Question 19 A client is making a buy decision but is concerned


Complete about deloyment time. What is the average amount
of time needed to deploy an IBM Privileged Access
1.00 points out
Management (PAM) solution?
of 1.00

1 year

2 years

1.5 years

Few weeks or few months


Question 20 How can you differentiate with an IBM Privileged
Complete Access Management (PAM) solution if a client is
interested in Zero Trust adoption?
1.00 points out
Back Next
of 1.00

Can't differentiate with Zero Trust, since all PAM


vendors provide the same capabilities

Other PAM vendors do not provide privileged


access use cases with the same capabilities as
the IBM PAM solution

The IBM PAM solution is rightly positioned as


part of the broader Zero Trust strategy and IBM
Security ecosystem of integrations

No other PAM vendor in the market claims that


they can provide a Zero Trust solution
Question 21 You are engaged in a competitive battle. To win the
Complete deal you present the key differentiators of IBM
Security Verify Privilege Vault. What are they?
1.00 points out
Back Next
of 1.00

High availability, and sevices support

Performance, and ease of use

Support of network, and high performance

Usability and performance, ease of installation,


readily customizable

Question 22 Which Privileged Access Management (PAM)


Complete component will you propose if a client's application
development team wants to remove hardcoded
1.00 points out
credentials from their applications?
of 1.00

IBM Security Verify Privilege Vault

IBM Security Verify Privilege DevOps

IBM Security Verify Privilege Manager

IBM Security Verify Privilege Account Lifecycle


Manager
Question 23 You are closing a deal. The competition tells the
Complete client they can send instant alerts to notify that there
is unusual activity on the system. What should you
1.00 points out
propose? Back Next
of 1.00

IBM Security Verify Privilege DevOps Vault

IBM Security Verify Privilege Vault

IBM Security Verify Privilege Vault Analytics

IBM Security Verify Privilege DevOps

Question 24 Clients have challenges related to privileged access


Complete control. Which one of these is a common challenge?

1.00 points out


of 1.00 Not sure how many service accounts exist or
where they are located

Provisioning service accounts

Classifying service accounts

Creating shared accounts


Question 25 Which competitor has a strategy to solve the problem
Complete of how to detect hard-to-find embedded Windows
service accounts?
0.00 points out
Back Next
of 1.00

One Identity

BeyondTrust

Both CyberArk and BeyondTrust

CyberArk

You might also like