IBM Security Trusteer Fundamentals Level 1 Quiz - 2023 - Q19

pdf

School

Universidade Católica Portuguesa ( Portugal) *

*We aren’t endorsed by this school

Course

922

Subject

Information Systems

Date

Nov 24, 2024

Type

pdf

Pages

10

Uploaded by adalbarbosa

Report
IBM Security Trusteer Fundamentals Level 1 Quiz Back Next You must receive a score of 75% or higher on the quiz to complete the course. Started on Monday, November 20, 2023, 3:33 AM State Finished Completed on Monday, November 20, 2023, 3:51 AM Time taken 17 mins 41 secs Feedback Congratulations, you passed the quiz! Question 1 Correct Points out of 1.00 For account takeover and malware protection, what competitor is often criticized for the large amount of very expensive professional services required to get their solution working? Riskyfied BioCatch NuData Threat Metrix « Question 2 Correct Points out of 1.00 According to Forbes, how many Billion stolen credentials were posted on the dark web in 2020? 11 15v 17 14
Question 3 Correct Points out of 1.00 Back Next The global fraud prevention market is expected to grow by what percentage over the next 7 years? 23% v 20% 28% 40% Question 4 Correct Points out of 1.00 Your client is worried about fraud impacting profitability. What buyer typically manages fraud losses as a cost of doing business? Chief Information Security Officer Regulatory compliance officer Security administrator Line of business leader v Question 5 Correct Points out of 1.00 During a meeting with your client, you introduce the Boursorama Banque case study that deployed which Trusteer product? Rapport Pinpoint Detect v Pinpoint Assure Pinpoint Pointer
Question 6 Correct Points out of 1.00 Back You are demonstrating Trusteer to a client. The Trusteer dashboard for reports and alerts is called what? Advanced Fraud Protection Platform Administration dashboard Trustboard v Trusteer console Question 7 Incorrect Points out of 1.00 As Pinpoint monitors an application, it works in the background without the need for downloading executable files or plug-ins to the user's computer. For web applications, Pinpoint relies on a small piece of code that is embedded into the webpage and runs on the user's browser. What is it called? Rest API % Detection snippet Agent BOT Next
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Question 8 Incorrect Points out of 1.00 Back A form of identity theft and fraud, where a malicious third party successfully gains access to a user's account credentials using email, remote access tools or social engineering? Zero-day attack % Social engineering Account opening fraud Advanced account takeover Question 9 Incorrect Points out of 1.00 Assuming a client has 1000 fraud cases per month, how much can Trusteer Pinpoint fraud detection save them per year? 0.3 M USD 0.6 M USD 6.0 M USD 3.0MUSD % Question 10 Correct Points out of 1.00 You are asking a client about the digital journey of their customers. What is NOT a part of a customer's digital journey? Transactions User temperature v Opening an account Account login Next
Question 11 Correct Points out of 1.00 Back The value of an IBM Trusteer solution is directly dependent on the value of what? Potential fraud losses for a client v Type of authentication methods in use Number of employees at the client Number of identities managed Question 12 Correct Points out of 1.00 What type of users are NOT considered for pricing a Trusteer service? Internal users External business users External competitors users « External retail users Next
Question 13 Incorrect Points out of 1.00 Back Next What is the key value Trusteer Pinpoint delivers to clients? Step up authentication, Threat research labs, Detection accuracy, and Cloud native Advanced fraud protection, Threat research labs, Detection accuracy, and Open Source Advanced fraud protection, Threat research labs, Detection accuracy, and Cloud native Advanced fraud protection, Known user fraud, Unknown user fraud, and Cloud native Question 14 Correct Points out of 1.00 A client has asked for a budgetary pricing proposal. Which of the following is NOT a key pricing question to ask this client? What type of users will be protected by the service? Will the solution be integrated with IBM Security Verify Access (ISAM)? Do you use behavioral biometric authentication? v How many mobile applications will be protected by the service?
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Question 15 Correct Points out of 1.00 Back When positioning the IBM Trusteer Pinpoint Assure product, what is the primary use case? Unknown user fraud and risk assessment of new v identities Step up authentication Known user fraud detection and prevention Mobile Application and device compromise Question 16 Correct Points out of 1.00 Mobile Carrier Intelligence is an add-on for which Trusteer offering? Rapport Pinpoint Detect Pinpoint Assure v Mobile Software Development Kit Question 17 Correct Points out of 1.00 You are discussing service deployment with your client, and you want to highlight the IBM Fraud and Identity Analytics Services team. What service does this team provide? Tuning and tailoring of policy rules and models v Snippet support and backend API support Implementation and testing Project scoping and security analysis Next
Question 18 Correct Points out of 1.00 Back Next When discussing new account fraud with a line of business owner, you highlight the billions in losses identified by Javelin Strategy and Research. How much is lost per year according to Javelin? $2.9 Billion $3.4 Billion v $1 Billion $2.5 Billion Question 19 Correct Points out of 1.00 What important question can help you gauge the value and potential benefit Trusteer could provide to a client? What percentage of your login activity is detectedas « fraudulent? When was the last time you audited your access logs? Why do fraudsters target your company? How do you stop fraud in your stores?
Question 20 Incorrect Points out of 1.00 Back When talking about IBM Trusteer Pinpoint Assure to a client, you should always highlight what fraud scheme that it protects against? Digital asset transfer % New digital identity or unknown users Phishing credentials Account take over Question 21 Correct Points out of 1.00 What activity is the IBM Trusteer Threat Research Lab NOT constantly doing? Monitoring the dark web Identifying emerging threats Devising algorithms to detect threats Using malware for phishing v Question 22 Correct Points out of 1.00 During your presentation to a client, they ask about alerts. What is the most common reason Trusteer generates an alert? Suspicious behavioral anomaly Access from a known fraudster device v Suspicious access using a Virtual Machine Access from a new device Next
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Question 23 Incorrect Points out of 1.00 Back During an active session, Trusteer is monitoring the user's interaction with the client's application. When anomalies are identified during a session, Trusteer sends an alert and provides an explanation of what type of session risk was detected. What are these called? Alert Reason IDs or Reason codes Vulnerability Warning Question 24 Correct Points out of 1.00 What is the industry benchmark for fraud alert rate? 1% 0.05% v 0.5% 5% Question 25 Correct Points out of 1.00 You are preparing to meet with a client. What persona is NOT a typical buyer of fraud solutions? Identity and Access Management Security Leader IT Director v Chief Information Security Officer (CISO) Line of Business Leader Next