Quiz [Verify L1]
You must receive a score of 75% or higher on the quiz to complete
Back Next
the course.
Started on Tuesday, August 26, 2025, 6:19 PM
State Finished
Completed on Tuesday, August 26, 2025, 6:40 PM
Time taken 21 mins 1 sec
Feedback Sorry, you did not pass the quiz.
Question 1
Correct
Points out of 1.00
What is Privileged Access Management?
Privileged Access Management (PAM) refers to a class
of solutions that help secure, control, manage and
monitor privileged access to critical assets
Privileged Access Management (PAM) includes Verify
Access Management
Privileged Access Management (PAM) protects privileged
users from direct phishing attacks
Privileged Access Management (PAM) allows all users
access to privileged accounts
Question 2
Correct
Points out of 1.00
Back Next
When selling IBM Verify Identity Governance, one does not
need to sell the entire Governance suite, but only what the
client needs. If the client needs to get insight on risky users
and their behavior, what should the seller sell to them?
Identity Analytics
Lifecycle Management
Access certification
Password management
Question 3
Correct
Points out of 1.00
A seller is meeting with a client and the client says that one of
their major pain points is meeting industry compliance
expectations. Who is the seller meeting with?
Chief Information Officer (CIO)
Development Manager
Line of Business (LoB) Leader
Chief Information Security Officer (CISO)
Question 4
Incorrect
Points out of 1.00
Back Next
A new seller joins the team and needs assistance writing a
proposal. The seller is not sure what to propose as the lead-
with product for both access and Consumer Identity and
Access Management (CIAM) use cases. What product should
be proposed?
Verify SaaS
Verify Governance Identity
Verify Privileged Identity
Verify Identity Access
Question 5
Incorrect
Points out of 1.00
A client wants to enforce least privilege security, and control
application rights on endpoints. Which product should the
client purchase?
Verify Privileged Identity Vault
Verify Privileged Identity Cloud Suite
Verify Privileged Identity Manager
Verify Privileged Identity Server Suite
Question 6
Correct
Points out of 1.00
Back Next
When selling to a financial client, the seller gets asked what
metric does Verify pricing use to quantify an organization's
dynamic usage between user populations and product use
cases. What should the answer be?
Resource units
Processor based pricing (PVU)
Processor cores
User based pricing (UVU)
Question 7
Incorrect
Points out of 1.00
What abstraction layer in a multi-cloud identity management
framework uses orchestration to manage multiple identity
domains on multiple clouds?
Identity Fabric
Orchestration
Privileged Access
Access Management
Question 8
Incorrect
Points out of 1.00
Back Next
At a client meeting, the client wanted to know about an
information security concept or principle in which a user is
given the minimum levels of access - or permissions - needed
to perform his/her job functions. What is this principle called?
Access Management
Least Privilege
Identity Fabric
Orchestration
Question 9
Incorrect
Points out of 1.00
A client wants to discover, manage, protect and audit
privileged accounts across their organization. Which product
in the Verify Privileged Identity portfolio will help the client do
that?
Verify Privileged Identity Vault
Verify Privileged Identity Manager
Verify Privileged Identity Server Suite
Verify Privileged Identity Cloud Suite
Question 10
Incorrect
Points out of 1.00
Back Next
A new seller is learning about a product that allows
organizations to take back control with a single integrated
platform that manages access across many common
scenarios. Which product is the seller learning about?
Verify Identity Governance
Verify Identity Access
Consumer Identity and Access Management (CIAM)
Verify Privileged Identity
Question 11
Correct
Points out of 1.00
Verify Identity Governance has a number of modules, but the
client does not need to purchase all of them. A client can start
by purchasing which module/s?
Enterprise edition
Role optimization
Host adapters
Lifecycle and/or Compliance
Question 12
Incorrect
Points out of 1.00
Back Next
A seller is writing a proposal and wants to include a projected
cloud deployment rate to show that many clients will be
moving to the cloud. What percentage of clients are projected
to deploy cloud by 2027?
75.3%
69.4%
45%
76.3%
Question 13
Correct
Points out of 1.00
An IBM seller bumps into their client executive. In a short
conversation, the seller is asked for a definition of
orchestration because the client heard that it was included in
IBM's recent announcements. How should the seller respond?
Orchestration will protect sensitive data
Orchestration minimizes the cost of a data breach
Orchestration helps identify threat actors
Orchestration provides low-code/no-code automation
of the user journey and identity management flows
Question 14
Correct
Points out of 1.00
Back Next
The development manager is evaluating IBM's proposal but is
still unsure on what the main components of Verify Identity
Access are. What are they?
Advanced Access Control, Federation
IBM Verify Identity Access, Federation
IBM Verify Identity Access, Advanced Access Control
IBM Verify Identity Access, Advanced Access Control,
Federation
Question 15
Correct
Points out of 1.00
In a client meeting, the seller asks the client if they know how
many privileged accounts they have and where they are
located. Why is it important to ask this question?
Privileged accounts can be used to target outside
organizations.
Privileged accounts are the target of all phishing attacks.
More than 80% of breaches involve privileged users
and credentials, and these users have access to the
most sensitive assets and data of an organization. It's
important to know where the privileged accounts
reside.
Users of privileged accounts can obtain sensitive data
which can harm the organization.