100% found this document useful (1 vote)
579 views18 pages

Verify Access Level 2 Quiz Attempt Review

Download as pdf or txt
Download as pdf or txt
Download as pdf or txt
You are on page 1/ 18

Verify Access Level 2 Quiz

Back Next
You must receive a score of 75% or higher on the quiz to complete the course.

Started on Monday, February 12, 2024, 8:42 AM


State Finished
Completed on Monday, February 12, 2024, 9:02 AM
Time taken 19 mins 30 secs
Feedback Congratulations, you passed the quiz!
Question 1 The client is asking: "What offering can act as a proxy
Correct for in-house applications developed on the cloud, as
well as integrate seamlessly into legacy
Points out of
applications?" What should the response be? Back Next
1.00

IBM Application Gateway 

IBM Directory

Verify Directory

Identity Fabric

Question 2 The manager is writing an email to the team saying


Incorrect there are many opportunities that exist in the market,
and using data to strengthen the argument. What
Points out of
percentage of organizations have immature identity
1.00
and access management programs?

14%

41% 

84%
14.4%
Question 3 The sales interns were doing some research and
Incorrect presented on a client call. They found out that the
advanced authentication market will grow at a
Points out of
compound growth rate of 14.4% from 2021 to 2026.Back Next
1.00
What is the projected size of this market in 2026?

$13.6 Billion

$26.1 Billion 

$9.5 Billion

$7.4 Billion
Question 4 A client heard that IBM adopted this solution
Correct internally for employees and contractors and
externally for clients, but could not remember what
Points out of
the solution was. This solution provides a consistent Back Next
1.00
and improved user experience, and simplifies the
application integration process, among other things.
Which solution did IBM implement?

Cloud Identity

Verify IDaaS

Verify SaaS 

Identity Governance
Question 5 I am leading the digital transformation journey and
Correct want to provide a frictionless experience for users.
One of my biggest concerns is the lack of company-
Points out of
wide technical knowledge to help me reach my goals.Back Next
1.00
Who am I?

Chief Information Security Officer (CISO)

Chief Information Officer (CIO) 

I/T Security Leader

Line of Business (LOB) Executive

Question 6 A client has many legacy apps and has been hesitant
Incorrect about moving to cloud. Due to competitive market
pressure, they are now looking for cloud technology
Points out of
and adaptive access with a toggle switch. What
1.00
should be included in the seller's proposal?

Privileged Access Management (PAM)

IBM Security Verify Access 

IBM Security Verify SaaS


Adaptive Access
Question 7 Your largest client has many access management
Correct solutions which are siloed, meaning multiple systems
and directories that don't "talk" to each other. You
Points out of
are considering a few ways in which IBM can help. AsBack Next
1.00
you spend more time thinking about this, you
conclude that IBM Security Verify is the right solution
for them. What capability/capabilities of IBM Security
Verify influenced your decision?

IBM Security Verify has an easy approach to


custom integrations

IBM Security Verify has better capabilities and is


cheaper than competitive products, which is a
big advantage over the competition

IBM Verify has APIs which make integration very


simple
IBM Security Verify integrates natively with 
endpoint management, threat management,
and incident response systems, and uses a
universal directory to consolidate historical
information
Question 8 At an industry conference, a client heard that IBM
Correct offers a full-featured IBM Security Verify deployment
on any public cloud dedicated to a single client, and
Points out of
designed for large consumer and citizen use cases. Back Next
1.00
The client is looking for more information but does
not recall the name of this solution. Which solution is
this?

IBM Security Verify Dedicated 

IBM Security Verify

IBM Security Verify Governance

IBM Security Verify Access


Question 9 The seller wants to make a quick sale and sells the
Incorrect benefits of IBM Security Verify Access, telling the
client that it provides enhanced security for cloud
Points out of
and on-prem apps, which includes passwordless Back Next
1.00
methods such as QR codes and one-time-passwords
(OTP). Which other passwordless method does it
support?

Push technology 

Passkeys

Fingerprint recognition

Face recognition

Question 10 A client wants to implement a consumer identity and


Correct access management (CIAM) solution. What should
the seller sell to them?
Points out of
1.00

Verify Privilege

Verify SaaS 

Verify Governance
Verify Access
Question 11 A client says that IBM access solutions are old and
Correct only focus on legacy applications. How should the
seller respond?
Points out of
Back Next
1.00

Recent innovations in access management


provide clients with the best features available in
the market

In comparison to other market vendors, only


IBM has modern solutions which are cost-
effective and provide clients with value

IBM's Verify portfolio represents a modern 


and comprehensive suite of products, which
consist of both on-prem and cloud solutions
IBM has been innovating and developing new
solutions to meet client needs
Question 12 Which one of these is NOT one of the main capability
Correct categories pertaining to access management?

Points out of
Back Next
1.00 Adaptive access
Single sign-on (SSO)

Identity governance 

Advanced authentication

Question 13 In a client meeting, the Chief Information Security


Correct Officer (CISO) asks how many attacks occur due to
compromised credentials. What should the reponse
Points out of
be?
1.00

44%

25%

75%

16% 
Question 14 When competing against Okta, which of the following
Correct might be a good approach to beat them?

Points out of
Back Next
1.00 Sell consumer identity and access management
Focus on their integration with applications

Highlight their length in the market

Highlight that they don't have true adaptive 


access
Question 15 Organizations want to deliver trust and business
Correct value to the organization and to their customers.
What 3 things are they focusing on in order to reach
Points out of
that objective? Back Next
1.00

Establishing a state of least privilege, verifying


continuously, modernizing their workforce apps

Accelerating their journey to the cloud, 


enabling workforce modernization, delivering
digital business growth

Establishing a state of least privilege, biometric


authentication, passkeys
Establishing a state of least privilege, providing
MFA access, modernizing legacy apps
Question 16 The client suffered a data breach recently and is very
Correct cautious about purchasing and deploying new
products. What product acts as the “doorman” to
Points out of
delight a client’s customers and shield them from theBack Next
1.00
bad actors?

IBM Security Verify 

IBM Security Guardium

Verify Privilege

Verify Governance
Question 17 The seller is engaged in a competitive battle against
Correct Microsoft. The client perceives Microsoft's access
management solution to be free of charge. How can
Points out of
the seller win? Back Next
1.00

Tell the client in a polite way that Microsoft tools


do not integrate well

Tell the client that Microsoft requires third- 


party integration to protect on-prem apps,
which is an extra charge

Tell the client that IBM provides a more


customizable solution
Tell the client that Verify SaaS is a much better
solution and does not cost as much
Question 18 The seller is meeting with the Chief Information
Correct Security Officer (CISO), and is asked what the
required component is when purchasing IBM
Points out of
Security Verify Access. What does the seller say? Back Next
1.00

Advanced Access Control

Federation

IBM Security Verify Access Enterprise

IBM Security Verify Access Base 

Question 19 A client unexpectedly calls the seller and wants to


Correct know what are the top three identity and access
management challenges. What should the seller say?
Points out of
1.00

Complexity in the enterprise, users can't identify


phishing, and lack of software skills

Identity breaches, lack of software tools, and


complexity in the enterprise
Identity breaches, complexity in the 
enterprise, and users can't identify phishing
Users can't identify phishing, and complexity in
the enterprise
Question 20 Although IBM is a leader in Consumer Identity and
Incorrect Access Management (CIAM) platforms and
passwordless authentication, which competitor is
Points out of
ranked highest? Back Next
1.00

Okta

ForgeRock

Microsoft

One Identity 

Question 21 At a client meeting there was some disagreement on


Correct whether the cloud identity and access management
market is growing. The IBM sales manager inform the
Points out of
participants that in 2022 the market was estimated
1.00
at $5.3 Billion and by 2030 it is projected to be what?

$33.9 Billion 

$32.6 Billion

$10.1 Billion
$15.7 Billion
Question 22 According to Forrester, the user benefits of IBM
Correct Security Verify over a three year period equate to
how much?
Points out of
Back Next
1.00

$269K

$7.5M

$10.1M 

$101K

Question 23 Organizations are increasing their spend in the


Correct identity and access management (IAM) space. They
realize a strong IAM deployment can help them do
Points out of
what?
1.00

Have better control over partner access

Modernize their solutions

Streamline how their employees and 


consumers access resources and services

Improve Return on Investment (ROI)


Question 24 The seller is meeting with a client whose focus is
Correct cloud transformation and security conflict
management. Who is the seller meeting with?
Points out of
Back Next
1.00

Chief Information Security Officer (CISO) 

Chief Information Officer (CIO)

Key developer

Line of business (LOB) manager

Question 25 When using user-based pricing (UVU's) to calculate a


Correct price, how many external users equal one UVU?

Points out of
1.00 20

15 

10

You might also like