0% found this document useful (0 votes)
20 views8 pages

Quiz (Verify L1) - Attempt Review

The document outlines a quiz that assesses knowledge on Privileged Access Management and related IBM products, requiring a score of 75% or higher to pass. The quiz includes various questions on product features, client needs, and security principles, with the user failing to achieve the passing score. Feedback indicates that the user did not pass the quiz, highlighting areas of incorrect responses.

Uploaded by

Jairo De leon
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views8 pages

Quiz (Verify L1) - Attempt Review

The document outlines a quiz that assesses knowledge on Privileged Access Management and related IBM products, requiring a score of 75% or higher to pass. The quiz includes various questions on product features, client needs, and security principles, with the user failing to achieve the passing score. Feedback indicates that the user did not pass the quiz, highlighting areas of incorrect responses.

Uploaded by

Jairo De leon
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

Quiz [Verify L1]

You must receive a score of 75% or higher on the quiz to complete


Back Next
the course.
Started on Tuesday, August 26, 2025, 6:19 PM
State Finished
Completed on Tuesday, August 26, 2025, 6:40 PM
Time taken 21 mins 1 sec
Feedback Sorry, you did not pass the quiz.

Question 1

Correct

Points out of 1.00

What is Privileged Access Management?

Privileged Access Management (PAM) refers to a class 


of solutions that help secure, control, manage and
monitor privileged access to critical assets

Privileged Access Management (PAM) includes Verify


Access Management

Privileged Access Management (PAM) protects privileged


users from direct phishing attacks

Privileged Access Management (PAM) allows all users


access to privileged accounts
Question 2

Correct

Points out of 1.00

Back Next

When selling IBM Verify Identity Governance, one does not


need to sell the entire Governance suite, but only what the
client needs. If the client needs to get insight on risky users
and their behavior, what should the seller sell to them?

Identity Analytics 
Lifecycle Management
Access certification

Password management

Question 3

Correct

Points out of 1.00

A seller is meeting with a client and the client says that one of
their major pain points is meeting industry compliance
expectations. Who is the seller meeting with?

Chief Information Officer (CIO)

Development Manager

Line of Business (LoB) Leader


Chief Information Security Officer (CISO) 
Question 4

Incorrect

Points out of 1.00

Back Next

A new seller joins the team and needs assistance writing a


proposal. The seller is not sure what to propose as the lead-
with product for both access and Consumer Identity and
Access Management (CIAM) use cases. What product should
be proposed?

Verify SaaS

Verify Governance Identity 


Verify Privileged Identity

Verify Identity Access

Question 5

Incorrect

Points out of 1.00

A client wants to enforce least privilege security, and control


application rights on endpoints. Which product should the
client purchase?

Verify Privileged Identity Vault 


Verify Privileged Identity Cloud Suite

Verify Privileged Identity Manager

Verify Privileged Identity Server Suite


Question 6

Correct

Points out of 1.00

Back Next

When selling to a financial client, the seller gets asked what


metric does Verify pricing use to quantify an organization's
dynamic usage between user populations and product use
cases. What should the answer be?

Resource units 

Processor based pricing (PVU)

Processor cores
User based pricing (UVU)

Question 7

Incorrect

Points out of 1.00

What abstraction layer in a multi-cloud identity management


framework uses orchestration to manage multiple identity
domains on multiple clouds?

Identity Fabric

Orchestration 

Privileged Access

Access Management
Question 8

Incorrect

Points out of 1.00

Back Next

At a client meeting, the client wanted to know about an


information security concept or principle in which a user is
given the minimum levels of access - or permissions - needed
to perform his/her job functions. What is this principle called?

Access Management 

Least Privilege
Identity Fabric

Orchestration

Question 9

Incorrect

Points out of 1.00

A client wants to discover, manage, protect and audit


privileged accounts across their organization. Which product
in the Verify Privileged Identity portfolio will help the client do
that?

Verify Privileged Identity Vault


Verify Privileged Identity Manager 

Verify Privileged Identity Server Suite

Verify Privileged Identity Cloud Suite


Question 10

Incorrect

Points out of 1.00

Back Next

A new seller is learning about a product that allows


organizations to take back control with a single integrated
platform that manages access across many common
scenarios. Which product is the seller learning about?

Verify Identity Governance 

Verify Identity Access


Consumer Identity and Access Management (CIAM)

Verify Privileged Identity

Question 11

Correct

Points out of 1.00

Verify Identity Governance has a number of modules, but the


client does not need to purchase all of them. A client can start
by purchasing which module/s?

Enterprise edition
Role optimization

Host adapters

Lifecycle and/or Compliance 


Question 12

Incorrect

Points out of 1.00

Back Next

A seller is writing a proposal and wants to include a projected


cloud deployment rate to show that many clients will be
moving to the cloud. What percentage of clients are projected
to deploy cloud by 2027?

75.3%

69.4% 

45%

76.3%

Question 13

Correct

Points out of 1.00

An IBM seller bumps into their client executive. In a short


conversation, the seller is asked for a definition of
orchestration because the client heard that it was included in
IBM's recent announcements. How should the seller respond?

Orchestration will protect sensitive data

Orchestration minimizes the cost of a data breach

Orchestration helps identify threat actors

Orchestration provides low-code/no-code automation 


of the user journey and identity management flows
Question 14

Correct

Points out of 1.00

Back Next

The development manager is evaluating IBM's proposal but is


still unsure on what the main components of Verify Identity
Access are. What are they?

Advanced Access Control, Federation

IBM Verify Identity Access, Federation

IBM Verify Identity Access, Advanced Access Control

IBM Verify Identity Access, Advanced Access Control, 


Federation

Question 15

Correct

Points out of 1.00

In a client meeting, the seller asks the client if they know how
many privileged accounts they have and where they are
located. Why is it important to ask this question?

Privileged accounts can be used to target outside


organizations.

Privileged accounts are the target of all phishing attacks.

More than 80% of breaches involve privileged users 


and credentials, and these users have access to the
most sensitive assets and data of an organization. It's
important to know where the privileged accounts
reside.

Users of privileged accounts can obtain sensitive data


which can harm the organization.

You might also like