Quiz (PAM L2)
Quiz (PAM L2)
You must receive a score of 75% or higher on the quiz to complete the course.
State Finished
Question 1
Correct
Points out of 1.00
Flag question
Question text
A client is extremely happy because now they have the capability to know how
many people are accessing key privileged identity accounts. This is because
which product was sold to them?
Question 1Answer
IBM Verify Privileged Identity DevOps Vault
IBM Verify Privileged Identity Manager
IBM Verify Privileged Identity DevOps
IBM Verify Privileged Identity Vault Analytics
Question 2
Correct
Points out of 1.00
Flag question
Question text
Clients are faced with a number of challenges in controlling applications, one of
which includes the fact that different users require different endpoint security
policies. Which of the following is another challenge they face?
Question 2Answer
Not knowing if their users are running or installing rogue applications
Not negotiating the best price with application vendors
Not knowing the cost of installed applications
Not controlling systems administrator privileges
Question 3
Correct
Points out of 1.00
Flag question
Question text
Which product is best suited for enforcing Least Privilege security and control
application rights on endpoints?
Question 3Answer
IBM Verify Privileged Identity Manager
IBM Verify Privileged Identity DevOps
IBM Verify Privileged Identity Account Lifecycle Manager
IBM Verify Privileged Identity Vault
Question 4
Correct
Points out of 1.00
Remove flag
Question text
Verify Privileged Identity Manager enforces least privilege security and Verify
Privileged Identity Vault manages, protects, and discovers privileged accounts.
Which product/s control privileged access to hybrid enterprise servers with just-
in-time and just enough privileges?
Question 4Answer
IBM Verify Privileged Identity Vault Remote
IBM Verify Privileged Identity Server Suite and Cloud Suite
IBM Verify Privileged Identity DevOps
IBM Verify Privileged Identity Vault Analytics
Question 5
Correct
Points out of 1.00
Flag question
Question text
A client is making a buy decision but is concerned about deloyment time. What is
the average amount of time needed to deploy an IBM Privileged Access
Management (PAM) solution?
Question 5Answer
2 years
1.5 years
1 year
Few weeks or few months
Question 6
Correct
Points out of 1.00
Flag question
Question text
Who are the possible buyers or influencers within a client's organization for
Privileged Access Management (PAM) opportunities?
Question 6Answer
VP of Development, Desktop support, Chief Architect
CISO, Desktop support, Systems Administrator
CISO (Chief Information Security Officer), VP of IT Administration, VP of
Development, Desktop support
CISO, VP of IT Administration
Question 7
Correct
Points out of 1.00
Flag question
Question text
Malicious insiders can do tremendous damage to the organization, and the CEO
is very concerned about this threat, knowing that this is a very costly attack
vector. What is the cost of a data breach if the attack is initiated by a malicious
insider?
Question 7Answer
$4.54 million
$4.45 million
$4.99 million
$4.88 million
Question 8
Correct
Points out of 1.00
Flag question
Question text
Clients have challenges related to privileged identity access control. Which one
of these is a common challenge?
Question 8Answer
Not sure how many service accounts exist or where they are located
Provisioning service accounts
Classifying service accounts
Creating shared accounts
Question 9
Correct
Points out of 1.00
Remove flag
Question text
A client wants to better manage credentials for enterprise admin users and is
looking for a viable solution. What can the seller recommend?
Question 9Answer
IBM Verify Privileged Identity Manager
IBM Verify Privileged Identity DevOps Vault
IBM Verify Privileged Identity DevOps
IBM Verify Privileged Identity Vault
Question 10
Correct
Points out of 1.00
Flag question
Question text
Which of these is a concern of CyberArk clients?
Question 10Answer
Performance
Gaps in DevOps use cases
Red Hat integrations
Expensive ongoing professional services
Question 11
Correct
Points out of 1.00
Flag question
Question text
A seller is engaged in a competitive battle. To win the deal the seller presents the
key differentiators of IBM Verify Privileged Identity Vault. What are they?
Question 11Answer
Performance and ease of use
Usability and performance, ease of installation, readily customizable
Support of network and high performance
High availability and services support
Question 12
Correct
Points out of 1.00
Flag question
Question text
The Identity and Access Management (IAM) market is growing at double digits,
but the Privileged Access Management (PAM) market is growing even faster.
What is the projected compound annual growth rate (CAGR) for PAM?
Question 12Answer
21.5%
13.7%
15.6%
13.9%
Question 13
Correct
Points out of 1.00
Flag question
Question text
Who are the key competitors for IBM's Privileged Access Management (PAM)
solution?
Question 13Answer
CyberArk, One Identity, Okta
CyberArk, BeyondTrust, Okta
CyberArk, BeyondTrust, One Identity
CyberArk, BeyondTrust, Saviynt
Question 14
Correct
Points out of 1.00
Flag question
Question text
The client is looking to purchase a cloud solution that will provide high-velocity
secrets management. What should the seller recommend?
Question 14Answer
IBM Verify Privileged Identity DevOps Vault
IBM Verify Privileged Identity Vault Remote
IBM Verify Privileged Identity Account Lifecycle Manager
IBM Verify Privileged Identity Vault
Question 15
Correct
Points out of 1.00
Flag question
Question text
A systems administrator clicks on a malicious link and hackers take control. What
product should the client have implemented to stop or minimize malware and
ransomware attacks?
Question 15Answer
IBM Verify Privileged Identity Manager
IBM Verify Privileged Identity DevOps Vault
IBM Verify Privileged Identity DevOps
IBM Verify Privileged Identity Vault