Download as pdf or txt
Download as pdf or txt
You are on page 1of 9

IBM Security Verify Privilege Level 2 Quiz: Attempt review https://learn.ibm.com/mod/quiz/review.php?attempt=2274270&cmid...

Started on Thursday, April 20, 2023, 3:31 AM


Back Next
State Finished
Completed on Thursday, April 20, 2023, 3:49 AM
Time taken 17 mins 55 secs
Grade 21.00 out of 25.00 (84%)
Feedback Congratulations, you have passed the IBM
Security Privilege Access Manager Level 2
Quiz!

Question 1

Complete

1.00 points out of 1.00

Your client wants to integrate a Privileged Access Management


(PAM) solution into DevOps use cases. Which PAM component
is the right fit for this?

IBM Security Verify Privilege Account Lifecycle Manager


IBM Security Verify Privilege Vault
IBM Security Verify Privilege DevOps
IBM Security Verify Privilege Manager

Question 2

Complete

1.00 points out of 1.00

Your client wants an easy way to decommission, provision and


secure service accounts. What do you recommend?

IBM Security Verify Privilege DevOps Vault


IBM Security Verify Privilege Vault
IBM Security Verify Account Lifecycle Manager
IBM Security Verify Privilege DevOps

1 sur 9 10/05/2023 10:29


IBM Security Verify Privilege Level 2 Quiz: Attempt review https://learn.ibm.com/mod/quiz/review.php?attempt=2274270&cmid...

Question 3

Complete Back Next


1.00 points out of 1.00

Who are the key competitors for IBM's Privileged Access


Management (PAM solution?

CyberArk, One Identity, Okta


CyberArk, BeyondTrust, One Identity
CyberArk, BeyondTrust, Saviynt
CyberArk, BeyondTrust, Okta

Question 4

Complete

1.00 points out of 1.00

Who are possible buyers or influencers within the client


organization for Privileged Access Management (PAM)
opportunities?

CISO (Chief Information Security Officer), VP of IT


Administration, VP of Development, Desktop support
VP of Development, Desktop support, Chief Architect
CISO, Desktop support, Systems Administrator
CISO, VP of IT Administration

Question 5

Complete

1.00 points out of 1.00

A client asks, "How do we trust that there are no backdoors in


Privilege Vault to allow the vendor access to our passwords?"
How do you respond?

Privilege Vault supports a large number of platforms for


password changes
All secret data is salted, hashed, and then encrypted
Privilege Vault is meant to be installed on-premises so
that all data is stored securely in a customer’s database
Privilege Vault is supported by a team of technical gurus
who deal with identity and access management, in a
diverse array of customer environments

2 sur 9 10/05/2023 10:29


IBM Security Verify Privilege Level 2 Quiz: Attempt review https://learn.ibm.com/mod/quiz/review.php?attempt=2274270&cmid...

Question 6

Complete Back Next


1.00 points out of 1.00

How can you differentiate with an IBM Privileged Access


Management (PAM) solution if a client is interested in Zero
Trust adoption?

Other PAM vendors do not provide privileged access use


cases with the same capabilities as the IBM PAM solution
The IBM PAM solution is rightly positioned as part of the
broader Zero Trust strategy and IBM Security ecosystem
of integrations
No other PAM vendor in the market claims that they can
provide a Zero Trust solution
Can't differentiate with Zero Trust, since all PAM vendors
provide the same capabilities

Question 7

Complete

1.00 points out of 1.00

For clients buying a Verify Privilege Vault SaaS solution, what is


entitled without any additional cost to them?

All of Verify SaaS


Multi-factor authentication (MFA) from Verify SaaS
Single sign-on (SSO) and Multi-factor authentication (MFA)
from Verify SaaS
Single sign-on (SSO) from Verify SaaS

3 sur 9 10/05/2023 10:29


IBM Security Verify Privilege Level 2 Quiz: Attempt review https://learn.ibm.com/mod/quiz/review.php?attempt=2274270&cmid...

Question 8

Complete Back Next


0.00 points out of 1.00

Your client is afraid of a ransomware attack, knowing that a


large percentage of companies do actually pay the
ransomware. What percentage of companies in the last two
years actually paid the ransomware? 

33%
61%
25%
5%

Question 9

Complete

1.00 points out of 1.00

Your client wants to govern service accounts. Which Privileged


Access Management (PAM) component is the right fit for this?

IBM Security Verify Privilege Manager


IBM Security Verify Privilege Vault Remote
IBM Security Verify Privilege Account Lifecycle Manager
IBM Security Verify Privilege Vault Analytics

Question 10

Complete

1.00 points out of 1.00

IBM Security Verify Privilege provides out-of-the-box


integration with which of these products?

IBM Security Verify SaaS


IBM QRadar, IBM Guardium Insights
IBM Security Verify Governance, IBM Security Verify SaaS
IBM QRadar, IBM Guardium Insights, IBM Security Verify
Governance, IBM Security Verify SaaS

4 sur 9 10/05/2023 10:29


IBM Security Verify Privilege Level 2 Quiz: Attempt review https://learn.ibm.com/mod/quiz/review.php?attempt=2274270&cmid...

Question 11

Complete Back Next


1.00 points out of 1.00

You are engaged in a competitive battle. To win the deal you


present the key differentiators of IBM Security Verify Privilege
Vault. What are they?

Performance, and ease of use


High availability, and sevices support
Usability and performance, ease of installation, readily
customizable
Support of network, and high performance

Question 12

Complete

1.00 points out of 1.00

Which Privileged Access Management (PAM) component will


you propose if a client's application development team wants
to remove hardcoded credentials from their applications?

IBM Security Verify Privilege Manager


IBM Security Verify Privilege Account Lifecycle Manager
IBM Security Verify Privilege DevOps
IBM Security Verify Privilege Vault

Question 13

Complete

1.00 points out of 1.00

A client is making a buy decision but is concerned about


deloyment time. What is the average amount of time needed to
deploy an IBM Privileged Access Management (PAM) solution?

1 year
Few weeks or few months
1.5 years
2 years

5 sur 9 10/05/2023 10:29


IBM Security Verify Privilege Level 2 Quiz: Attempt review https://learn.ibm.com/mod/quiz/review.php?attempt=2274270&cmid...

Question 14

Complete Back Next


1.00 points out of 1.00

A client is considering a CyberArk, IBM, and Hashicorp


solution. Which of these statements is correct for Hashicorp?

Does not provide DevOps use cases


Not useful for application integration
Not useful for Red Hat and OpenShift integrations
Not an enterprise Privileged Access Management (PAM)
solution, just focused on Developer or DevOps use cases

Question 15

Complete

1.00 points out of 1.00

You are closing a deal. The competition tells the client they can
send instant alerts to notify that there is unusual activity on
the system. What should you propose?

IBM Security Verify Privilege Vault


IBM Security Verify Privilege DevOps
IBM Security Verify Privilege DevOps Vault
IBM Security Verify Privilege Vault Analytics

Question 16

Complete

1.00 points out of 1.00

Clients have challenges related to privileged access control.


Which one of these is a common challenge?

Creating shared accounts


Not sure how many service accounts exist or where they
are located
Provisioning service accounts
Classifying service accounts

6 sur 9 10/05/2023 10:29


IBM Security Verify Privilege Level 2 Quiz: Attempt review https://learn.ibm.com/mod/quiz/review.php?attempt=2274270&cmid...

Question 17

Complete Back Next


1.00 points out of 1.00

Your client wants to better manage credentials for enterprise


admin users and is looking for a viable solution. What do you
recommend?

IBM Security Verify Privilege Manager


IBM Security Verify Privilege Vault
IBM Security Verify Privilege DevOps
IBM Security Verify Privilege DevOps Vault

Question 18

Complete

1.00 points out of 1.00

A systems administrator clicks on a malicious link and hackers


take control. What product should the client have
implemented to stop malware and ransomware attacks?

IBM Security Verify Privilege Manager


IBM Security Verify Privilege DevOps
IBM Security Verify Privilege Vault
IBM Security Verify Privilege DevOps Vault

Question 19

Complete

1.00 points out of 1.00

Which of these is a concern for CyberArk clients?

Performance
Red Hat integrations
Gaps in DevOps use cases
Expensive ongoing professional services

7 sur 9 10/05/2023 10:29


IBM Security Verify Privilege Level 2 Quiz: Attempt review https://learn.ibm.com/mod/quiz/review.php?attempt=2274270&cmid...

Question 20

Complete Back Next


1.00 points out of 1.00

Your client is capable of knowing how many people are


accessing key privileged accounts. This is because you sold
which product?

IBM Security Verify Privilege DevOps Vault


IBM Security Verify Privilege Manager
IBM Security Verify Privilege Vault Analytics
IBM Security Verify Privilege DevOps

Question 21

Complete

1.00 points out of 1.00

Which is best suited for enforcing Least Privilege security, and


control application rights on endpoints?

IBM Security Verify Privilege Vault


IBM Security Verify Privilege DevOps
IBM Security Verify Privilege Manager
IBM Security Verify Privilege Account Lifecycle Manager

Question 22

Complete

1.00 points out of 1.00

Your client wants to know which of these capabilities are


correctly aligned for IBM Security Verify Privilege Vault? How
do you respond?

Vaulting, auditing, and discovery


Discovery, vaulting, auditing, and session control
Vaulting, auditing, and session control
End point privilege enforcement

8 sur 9 10/05/2023 10:29


IBM Security Verify Privilege Level 2 Quiz: Attempt review https://learn.ibm.com/mod/quiz/review.php?attempt=2274270&cmid...

Question 23

Complete Back Next


0.00 points out of 1.00

Which competitor has a strategy to solve the problem of how


to detect hard-to-find embedded Windows service accounts?

CyberArk
BeyondTrust
Both CyberArk and BeyondTrust
One Identity

Question 24

Complete

0.00 points out of 1.00

The client wants an on prem and cloud solution that will


provide application control and enforce least privilege. What
do you propose?

IBM Security Verify Privilege Vault


IBM Security Verify Privilege DevOps
IBM Security Verify Privilege Manager
IBM Security Verify Privilege DevOps Vault

Question 25

Complete

0.00 points out of 1.00

Twenty-eight percent of critical infrastructure organizations


experienced a destructive or ransomware attack, but what
percentage experienced a breach because of a business
partner being compromised?

17%
25%
33%
40%

9 sur 9 10/05/2023 10:29

You might also like