Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

1.True or False. IBM Security Verify SaaS is an IDaaS platform with SaaS delivered IGA. Features include single sign-on, multifactor authentication, Adaptive access, Identity Lifecycle

1.True or False. IBM Security Verify SaaS is an IDaaS platform with SaaS delivered IGA. Features include single sign-on, multifactor authentication, Adaptive access, Identity Lifecycle Management, and Identity Analytics. 2.True or False. You can procure IBM Security Verify from the IBM Cloud Marketplace, AWS Marketplace, and as a Red Hat OpenShift Operator. 3.True or False. A customer can implement a hybrid of Verify SaaS and Verify Governance. Features include comprehensive IGA, single sign-on, multifactor authentication, Adaptive access, Customer Identity and Access Management (CIAM), SaaS application provisioning, and Identity Analytics as a SaaS subscription. 4.Where are the two (2) places that you must configure an application for single sign-on? In IBM Security Verify In the Entitlements tab of the Custom application UI In the application that IBM Security Verify is connecting to In IBM Security Guardium In the cloud provider for your organizationWhere are the two (2) places that you must configure an application for single sign-on? In IBM Security Verify In the Entitlements tab of the Custom application UI In the application that IBM Security Verify is connecting to In IBM Security Guardium In the cloud provider for your organization 5.What IBM product integrates with IBM Security Verify so you can bring single sign-on to heritage, on-premises, enterprise applications that dont support single sign-on methods like SAML or OpenID Connect? IBM Application Gateway IBM Security Trusteer Rapport IBM Security MaaS360 Cloud Extender IBM Security Guardium 6.What is the IBM Security Verify feature that simplifies setting up cloud applications for SSO? Obsfuscated browser security policies Hundreds of preconfigured cloud application templates Built-in application failover and clustering support Drag-and-drop hardware placement support 7.When configuring an application for single sign-on, what option should you select when there isn't a preconfigured application integration available? Proxy application SAML application Custom application OIDC application 8Which two (2) items are you required to configure when you add an application for single sign-on in IBM Security Verify? Endpoint ID Description SAML ID Provider ID Host name 9.What's another security feature that IBM Application Gateway integrated with IBM Security Verify provides to enterprise apps? Data loss pevention Rate limiting Application security Firewall configuration 10.Fill in the blank. ______is a lightweight, container-based proxy that, when integrated with IBM Security Verify, can enable your on-premises enterprise applications with single sign-on and bring a consistent login experience to users. 11.When configuring an application in IBM Security Verify, which role can you assign to a user to give that user the ability to control entitlement to the application? Application owner Application licensor Application manager Application admin 12.What type of authentication uses a QR Code or FIDO2? Time-based one-time passcode Passwordless Basic Randomized 13.What is required to use QR Code authentication with IBM Security Verify? IBM MaaS360 app on your phone or tablet IBM VPN on your phone or tablet Red Hat OpenShift app on your phone or tablet IBM Verify app on your phone or tablet 14.By default, what access policy is assigned for users to access their IBM Security Verify home page? Always require 2FA in all devices Allow access from all devices Require 2FA each session in all devices Adaptive access 15. By default, what access policy is assigned for admins to access the IBM Security Verify administration console? Require 2FA each session in all devices Allow access from all devices Always require 2FA in all devices Adaptive access 16.Where can an administrator review information about user attempts to access resources that are protected by adaptive access policies? IBM Security Verify admin console > Reports > Consent Activity IBM Security Verify admin console > Reports > Adaptive Access IBM Security Verify admin console > Reports > User Compliance IBM Security Verify admin console > Reports > Adaptive Behavior 17.Drag the words. In the default adaptive access policy, very high-risk users are blank , high-risk users are blank , medium-risk users are blank , and low-risk users are blank . required to do multifactor authentication per session allowed access without a challenge blocked always required to complete multifactor authentication 18.Where can you check to see whether you have an active Adaptive Access subscription? Verify administration console > Global configuration > Downloads Verify administration console > Global configuration > Subscription and usage Verify administration console > Global configuration > Appearance Verify administration console > Global configuration > Administrator roles. 19.Which two (2) types of policies can use adaptive access by default? Federated sign-on policy Mobile sign-on policy Native web app policy Mobile app policy Native custom app policy 20.When a user attempts to log in and access a resource within their organization, which of these factors might trigger a very high-risk score, and deny access to the resource? Logging in within normal working hours Using a known, corporate-owned tablet to log in Logging in from an atypical location Using a different browser 21.Adaptive access creates a risk score based on the context of the login attempt. Select two (2) criteria that are used in the assessment. Minimum passcode length Type cadence User location Password strength Passcode strength 22.Fill in the blank. When creating an adaptive access policy, an administrator can enable user notifications, so the user is notified .23.What IBM Security product does the Adaptive Access feature use to create a risk score when a user authenticates? IBM Security Guardium IBM Security MaaS360 IBM Security QRadar IBM Security Trusteer 24.An admin wants to add the popular SaaS application, Microsoft 365, to IBM Security Verify. Which two (2) tasks must the admin do in the Verify administration console? contact Microsoft for instructions on how to configure Microsoft 365 to work with IBM Security Verify manually configure the Microsoft 365 endpoints create a custom application connector for Microsoft 365 select the Microsoft 365 application links to show to users select a preconfigured Microsoft 365 application connector 25.Fill in the blanks. As IAM offerings for IBM, IBM Security Verify is the on-premises offering. IBM Security Verify Access is the SaaS offering. 26.True or False. IBM Security Verify supports passwordless authentication

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database Concepts

Authors: David Kroenke, David Auer, Scott Vandenberg, Robert Yoder

8th Edition

013460153X, 978-0134601533

More Books

Students also viewed these Databases questions

Question

In an Excel Pivot Table, how is a Fact/Measure Column repeated?

Answered: 1 week ago