verify identity protection quiz
verify identity protection quiz
You must receive a score of 75% or higher on the quiz to complete the course.
State Finished
Question 1
Incorrect
Points out of 1.00
Flag question
Question text
These unauthorized and unmonitored systems grant access to organizational
resources without any oversight or governance. What are they?
Question 1Answer
Dormant service accounts
Unauthorized local accounts
Shadow directories
Legacy applications
Question 2
Correct
Points out of 1.00
Flag question
Question text
What percentage of cyber attacks were focused on identities?
Question 2Answer
60%
72%
65%
71%
Question 3
Correct
Points out of 1.00
Flag question
Question text
Full identity observability that provides critical context, identifies major problems
and enhances identity and security team's capability is offered by IBM with VIP
(Verify Identity Protection). Which vendor does not offer access to any cloud or
SaaS app?
Question 3Answer
Silverfort
CrowdStrike
Sentinel One
Cisco
Question 4
Correct
Points out of 1.00
Remove flag
Question text
A client wants to connect directly into data sources and collect information.
Which VIP (Verify Identity Protection) deployment option would be optimal for
this client?
Question 4Answer
Cloud SIEM
SIEM
Direct
On-prem
Question 5
Correct
Points out of 1.00
Flag question
Question text
Getting a holistic picture of an identity's risk profile and identifying the actions to
manage that risk is called what?
Question 5Answer
ISPM (Identity Security Posture Management)
Identity-Based Zero Trust
ZTNA (Zero Trust Network Access)
ITDR (Identity Threat Detection and Response)
Question 6
Correct
Points out of 1.00
Flag question
Question text
A seller is developing an account plan and identifying clients to call on to
increase chances of selling VIP (Verify Identity Protection) in the account. Which
clients should be on the list to call on?
Question 6Answer
Security Directors
Threat and IT (Information Technology) teams
First line managers
Line of business owners
Question 7
Correct
Points out of 1.00
Flag question
Question text
A client wants IBM to help them identify gaps in their security posture but they
do not have a budget to pay for that. The seller knows which workshop to
recommend to the client, but needs to decide if it will be virtual or in person.
What is this workshop called?
Question 7Answer
Identity Fabric Interactive Workshop
Identity Fabric Framing and Discovery Workshop
IBM Verify Interactive Tour
Security Demo Central
Question 8
Correct
Points out of 1.00
Flag question
Question text
A disagreement arises between the SOC (Security Operations Center) manager
and the IAM (Identity and Access Management) manager as to which product has
the capability to consolidate identity silos. The seller responds with the answer.
What is the correct answer?
Question 8Answer
IBM Verify Directory
IBM Application Gateway
IBM Verify SaaS
IBM Verify Trust
Question 9
Correct
Points out of 1.00
Flag question
Question text
A client is asking how IBM's ITDR (Identity Threat Detection and Response)
capabilities are different from CrowdStrike's. How should the seller respond?
Question 9Answer
Verify Identity Protection not only provides industry-leading ITDR capability, but
also identifies risky identity accesses and highlights the information on a user-
friendly dashboard.
Verify Identity Protection not only provides industry-leading ITDR capability, but
also connects to IBM Verify SaaS, IBM QRadar and IBM Verify Governance.
Verify Identity Protection not only provides industry-leading ITDR capability, but
also comes with an orchestration engine which is vendor-neutral.
Verify Identity Protection not only provides industry-leading ITDR capability, but
uniquely also delivers Identity Security Posture Management (ISPM), which adds
proactive analysis such as detecting MFA bypass, shadow assets and directories,
and many others.
Question 10
Correct
Points out of 1.00
Flag question
Question text
A client suffered a sophisticated attack which aimed to compromise multiple user
accounts by testing a few commonly used passwords against a large number of
accounts over many days and weeks. What is this attack called?
Question 10Answer
PAM Bypass
Access without MFA
Password Spray attack
Brute Force attack
Question 11
Correct
Points out of 1.00
Flag question
Question text
A client was describing a security discipline to a new security team which
consists of behavior analysis and tools to enhance identity infrastructure security
and accelerate remediation of identity attacks. What is this discipline called?
Question 11Answer
ITDR (Identity Threat Detection and Response)
ISPM (Identity Security Posture Management)
MFA Bypass
ZTNA (Zero Trust Network Access)
Question 12
Correct
Points out of 1.00
Flag question
Question text
If a client says they have legacy applications which are not able to take
advantage of modern authentication capabilities or if they say they would be
interested in an automated, low-code/no-code way of doing this, means a seller
should introduce which solution?
Question 12Answer
Verify Application Gateway
Verify Trust
Verify Privilege
Verify Identity Protection
Question 13
Correct
Points out of 1.00
Flag question
Question text
Verify Identity Protection (VIP) can identify risky activity in real-time so that IT
teams can act quickly to stop it. Which of the following is NOT an example of
risky activity that VIP will identify?
Question 13Answer
Bypass of ZTNA (Zero Trust Network Access)
Bypass of VPN (Virtual Private Network)
Bypass of PAM (Privileged Access Management)
Monthly compliance reporting
Question 14
Correct
Points out of 1.00
Remove flag
Question text
Many modern organizations have hybrid environments, so getting an accurate
picture of the identity risk posture across various systems becomes difficult.
Which of the following are key challenges these organizations face?
Question 14Answer
Inability to monitor user behavior across the enterprise, legacy apps marginally
modernized
Inconsistent user experience, elevated identity risk and drift, expensive
management
Teams lack ability, compliance enforced monthly
Lack of executive vision to develop a consistent identity strategy, lack of a five-
year budget
Question 15
Correct
Points out of 1.00
Flag question
Question text
A seller has an important call with the CISO (Chief Information Security Officer),
which provides a great opportunity to introduce Verify Identity Protection (VIP). To
gain interest in VIP, the seller should discuss some key capabilities. What is a
major differentiator of VIP when compared to other vendors?
Question 15Answer
Detecting ZTNA (Zero Trust Network Access) bypass
Cloud deployments
Human and non-human entities
ITDR (Identity Threat Detection and Response) and ISPM (Identity Security
Posture Management) capabilities