You are on page 1of 10

11/5/23, 16:52 IBM Security Verify Access Level 2 Quiz: Attempt review

Started on Monday, April 17, 2023, 12:09 PM


Back Next
State Finished
Completed on Monday, April 17, 2023, 12:30 PM
Time taken 21 mins 18 secs
Grade 20.00 out of 25.00 (80%)
Feedback Congratulations, you have passed the IBM
Security Verify Access Manager Level 2
Quiz!

Question 1

Correct

1.00 points out of 1.00

Your are fighting a competitive battle against Microsoft. The


client perceives Microsoft's access management solution to be
free of charge. How can you win?

Tell the client that IBM provides a more customizable


solution
Tell the client that Verify SaaS is a much better solution
and does not cost as much
Tell the client in a polite way that Microsoft tools do not
integrate well
Tell the client that Microsoft requires third-party 

integration to protect on-prem apps, which is an extra


charge

Question 2

Correct

1.00 points out of 1.00

I am based on machine-learning, taking multiple context


inputs and providing a confidence score for whether an
individual should be authenticated. What am I?

Adaptive access 

Keyboard and mouse movements


Multi-factor authentication (MFA)
Single sign on (SSO)

https://learn.ibm.com/mod/quiz/review.php?attempt=2256848&cmid=234280 1/10
11/5/23, 16:52 IBM Security Verify Access Level 2 Quiz: Attempt review

Question 3

Correct Back Next


1.00 points out of 1.00

At a meeting, your clients' focus is cloud transformation and


security conflict management. Who are you meeting with?

Chief Information Officer (CIO)


Key developer
Line of business (LOB) manager
Chief Information Security Officer (CISO) 

Question 4

Correct

1.00 points out of 1.00

You are presenting IBM's Zero Trust use cases at a client


meeting. What are they?

Secure the hybrid cloud, preserve client privacy, provide


secure access
Reduce insider threat, protect the hybrid cloud, secure
the hybrid workforce, control secure access
Preserve client privacy, reduce insider threat, control
secure access
Preserve client privacy, reduce the risk of insider 

threat, protect the hybrid cloud, secure the hybrid


workforce

https://learn.ibm.com/mod/quiz/review.php?attempt=2256848&cmid=234280 2/10
11/5/23, 16:52 IBM Security Verify Access Level 2 Quiz: Attempt review

Question 5

Correct Back Next


1.00 points out of 1.00

As you enter your client's location, you overhear a


conversation, in which clients complain about the time it takes
to get access, and you see this as a potential opportunity.
Typically, in most organizations, how long does it take for a
user to get access to a required system?

At least a week 

3 days
4 days
5 working days

Question 6

Correct

1.00 points out of 1.00

You are meeting with the Chief Information Security Officer


(CISO), who is asking what the required component is when
purchasing IBM Security Verify Access. What do you say?

IBM Security Verify Access Base 

ISVA Enterprise
Advanced Access Control
Federation

https://learn.ibm.com/mod/quiz/review.php?attempt=2256848&cmid=234280 3/10
11/5/23, 16:52 IBM Security Verify Access Level 2 Quiz: Attempt review

Question 7

Incorrect Back Next


0.00 points out of 1.00

Your client is losing market share due to aggressive


competition. Their applications are all on-prem and their
digital presence is minimal. What solution should you suggest
to help them?

Verify SaaS and CIAM (Consumer Identity and Access


Management)
Verify Privilege and Verify SaaS
Verify Access Management and Verify SaaS
Verify Privilege and CIAM (Consumer Identity and 

Access Management)

Question 8

Correct

1.00 points out of 1.00

Within the identity and access market, cloud adoption is


growing and many clients plan to move to hybrid cloud. What
is fueling this growth?

Clients want to streamline how their employees and 

consumers access resources and services


Clients want better control over user access
Clients want to modernize their security implementations
Clients want a better return on investment

Question 9

Correct

1.00 points out of 1.00

Adoption of cloud identity and access management is being


driven by many factors, but which of these is not a driving
force for moving to cloud?

Decrease in the remote workforce 

Shift to passwordless authentication


Shortage of security professionals
Desire to preserve cash

https://learn.ibm.com/mod/quiz/review.php?attempt=2256848&cmid=234280 4/10
11/5/23, 16:52 IBM Security Verify Access Level 2 Quiz: Attempt review

Question 10

Correct Back Next


1.00 points out of 1.00

More and more employees are based at home, and protecting


a remote workforce is challenging. IBM's key portfolio
differentiators for helping clients with access management
includes what?

Single sign on, Multifactor authentication


Multifactor authentication, adaptive access
Advanced authentication, Multifactor authentication
Single sign on, adaptive access, advanced 

authentication

Question 11

Correct

1.00 points out of 1.00

Which client executive is responsible for preventing data loss


and fraud?

CISO (Chief Information Security Officer) 

CIO (Chief Information Officer)


Chief Compliance Officer (CCO)
Chief Privacy Officer (CPO)

Question 12

Incorrect

0.00 points out of 1.00

You are asked by the systems administrator what the key


technology is that fuels Zero Trust principles. How do you
respond?

Single sign on (SSO)


Risk based control
Adaptive access
Multi-factor authentication (MFA) 

https://learn.ibm.com/mod/quiz/review.php?attempt=2256848&cmid=234280 5/10
11/5/23, 16:52 IBM Security Verify Access Level 2 Quiz: Attempt review

Question 13

Correct Back Next


1.00 points out of 1.00

Which of these is not part of access management?

Adaptive access
Single sign on
Identity governance 

Advanced authentication

Question 14

Incorrect

0.00 points out of 1.00

In a client meeting, the Chief Information Security Officer


(CISO) asks how many attacks occur due to compromised
credentials. What do you say?

0.25
0.44
0.75 

0.2

Question 15

Correct

1.00 points out of 1.00

What is one of the top interest areas for client spending?

Single sign on (SSO)


Control access
Multifactor authentication (MFA) 

Adaptive access

https://learn.ibm.com/mod/quiz/review.php?attempt=2256848&cmid=234280 6/10
11/5/23, 16:52 IBM Security Verify Access Level 2 Quiz: Attempt review

Question 16

Correct Back Next


1.00 points out of 1.00

One of your client executives is preparing for an important


meeting and needs some help in understanding Zero Trust.
How would you explain Zero Trust?

Zaro Trust ensures compliance and compatibility


With Zero Trust your assets are protected and your
network is safer against malicious attacks
Zero Trust can be equated to access management
Zero Trust is an approach, that will give you the tools 

you need to deliver trusted experiences

Question 17

Correct

1.00 points out of 1.00

In a client proposal, you recommend that the client implement


a strong access management foundation. Which of the
following will not be included in the access management
foundation?

Identity governance policy


Multi-factor authentication (MFA)
Data governance protocols 

Single sign on (SSO)

Question 18

Correct

1.00 points out of 1.00

You are meeting a new client, and find yourself explaining


what it means to protect customer privacy within their
organization. Which of the following is not included in the
discussion?

Enforcing policy regulations


Securing user onboarding
Managing user consent
Revoking access 

https://learn.ibm.com/mod/quiz/review.php?attempt=2256848&cmid=234280 7/10
11/5/23, 16:52 IBM Security Verify Access Level 2 Quiz: Attempt review

Question 19

Correct Back Next


1.00 points out of 1.00

You client wants to implement a consumer identity and access


management (CIAM) solution. What should you sell?

Verify Privilege
Verify Access
Verify SaaS 

Verify Governance

Question 20

Incorrect

0.00 points out of 1.00

Although IBM is a leader in the access management market,


which competitor is ranked higher than IBM?

Okta 

Microsoft
One Identity
ForgeRock

Question 21

Correct

1.00 points out of 1.00

Many clients want adaptive access. How many have actually


implemented it?

0.25
0.17 

0.65
0.44

https://learn.ibm.com/mod/quiz/review.php?attempt=2256848&cmid=234280 8/10
11/5/23, 16:52 IBM Security Verify Access Level 2 Quiz: Attempt review

Question 22

Incorrect Back Next


0.00 points out of 1.00

The client says that IBM access solutions are old and only
focus on legacy applications. How do you respond?

IBM's Verify portfolio represents a modern and


comprehensive suite of products, which consist of both
on-prem and cloud solutions
Recent innovations in access management provide IBM's
clients with the best features available in the market
In comparison to other market vendors, only IBM has
modern solutions which provide clients with value and are
cost-effective
IBM has been innovating and developing new solutions 
to meet the needs of our clients

Question 23

Correct

1.00 points out of 1.00

According to Forrester, the user benefits of IBM Verify over a


three year period equate to how much?

$10.1M 

$7.5M
$101K
$269K

Question 24

Correct

1.00 points out of 1.00

If you are competing against Okta, which of the following


might be a good approach to beat them?

Focus on their integration with applications


Hghlight that they don't have true adaptive access 

Sell consumer identity and access management


Highlight their length in the market

https://learn.ibm.com/mod/quiz/review.php?attempt=2256848&cmid=234280 9/10
11/5/23, 16:52 IBM Security Verify Access Level 2 Quiz: Attempt review

Question 25

Correct Back Next


1.00 points out of 1.00

When using user-based pricing (UVU's) to calculate a price,


how many external users equal one UVU?

5
10
15 

20

https://learn.ibm.com/mod/quiz/review.php?attempt=2256848&cmid=234280 10/10

You might also like