IBM Security Trusteer Fundamentals Level 1 Quiz - 2023 - Q19
pdf
keyboard_arrow_up
School
Universidade Católica Portuguesa ( Portugal) *
*We aren’t endorsed by this school
Course
922
Subject
Information Systems
Date
Nov 24, 2024
Type
Pages
10
Uploaded by adalbarbosa
IBM
Security
Trusteer
Fundamentals
Level
1
Quiz
Back
Next
You
must
receive
a
score
of
75%
or
higher
on
the
quiz
to
complete
the
course.
Started
on
Monday,
November
20,
2023,
3:33
AM
State
Finished
Completed
on
Monday,
November
20,
2023,
3:51
AM
Time
taken
17
mins
41
secs
Feedback
Congratulations,
you
passed
the
quiz!
Question
1
Correct
Points
out
of
1.00
For
account
takeover
and
malware
protection,
what
competitor
is
often
criticized
for
the large
amount
of
very
expensive
professional
services
required
to
get
their
solution
working?
Riskyfied
BioCatch
NuData
Threat
Metrix
«
Question
2
Correct
Points
out
of
1.00
According
to
Forbes,
how
many
Billion
stolen
credentials
were
posted
on
the
dark
web
in
2020?
11
15v
17
14
Question
3
Correct
Points
out
of
1.00
Back
Next
The
global
fraud
prevention
market
is
expected
to
grow
by
what
percentage
over
the
next
7
years?
23%
v
20%
28%
40%
Question
4
Correct
Points
out
of
1.00
Your
client
is
worried
about
fraud
impacting
profitability.
What
buyer
typically
manages
fraud
losses
as
a
cost
of
doing
business?
Chief
Information
Security
Officer
Regulatory
compliance
officer
Security
administrator
Line
of
business
leader
v
Question
5
Correct
Points
out
of
1.00
During
a
meeting
with
your
client,
you
introduce
the
Boursorama
Banque
case
study
that
deployed
which
Trusteer
product?
Rapport
Pinpoint
Detect
v
Pinpoint
Assure
Pinpoint
Pointer
Question
6
Correct
Points
out
of
1.00
Back
You
are
demonstrating
Trusteer
to
a
client.
The
Trusteer
dashboard
for
reports
and
alerts
is
called
what?
Advanced
Fraud
Protection
Platform
Administration
dashboard
Trustboard
v
Trusteer
console
Question
7
Incorrect
Points
out
of
1.00
As
Pinpoint
monitors
an
application,
it
works
in
the
background
without
the
need
for
downloading
executable
files
or
plug-ins
to
the
user's
computer.
For
web
applications,
Pinpoint
relies
on
a
small
piece
of
code
that
is
embedded
into
the
webpage
and
runs
on
the
user's
browser.
What
is
it
called?
Rest
API
%
Detection
snippet
Agent
BOT
Next
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Question
8
Incorrect
Points
out
of
1.00
Back
A
form
of
identity
theft
and
fraud,
where
a
malicious
third
party
successfully
gains
access
to
a
user's
account
credentials
using
email,
remote
access
tools
or
social
engineering?
Zero-day
attack
%
Social
engineering
Account
opening
fraud
Advanced
account
takeover
Question
9
Incorrect
Points
out
of
1.00
Assuming
a
client
has
1000
fraud
cases
per
month,
how
much
can
Trusteer
Pinpoint
fraud
detection
save
them
per
year?
0.3
M
USD
0.6
M
USD
6.0
M
USD
3.0MUSD
%
Question
10
Correct
Points
out
of
1.00
You
are
asking
a
client
about
the
digital
journey
of
their
customers.
What
is
NOT
a
part
of
a
customer's
digital
journey?
Transactions
User
temperature
v
Opening
an
account
Account
login
Next
Question
11
Correct
Points
out
of
1.00
Back
The
value
of
an
IBM
Trusteer
solution
is
directly
dependent
on
the
value
of
what?
Potential
fraud
losses
for
a
client
v
Type
of
authentication
methods
in
use
Number
of
employees
at
the
client
Number
of
identities
managed
Question
12
Correct
Points
out
of
1.00
What
type
of
users
are
NOT
considered
for
pricing
a
Trusteer
service?
Internal
users
External
business
users
External
competitors
users
«
External
retail
users
Next
Question
13
Incorrect
Points
out
of
1.00
Back
Next
What
is
the
key
value
Trusteer
Pinpoint
delivers
to
clients?
Step
up
authentication,
Threat
research
labs,
Detection
accuracy,
and
Cloud
native
Advanced
fraud
protection,
Threat
research
labs,
Detection
accuracy,
and
Open
Source
Advanced
fraud
protection,
Threat
research
labs,
Detection
accuracy,
and
Cloud
native
Advanced
fraud
protection,
Known
user
fraud,
Unknown
user
fraud,
and
Cloud
native
Question
14
Correct
Points
out
of
1.00
A
client
has
asked
for
a
budgetary
pricing
proposal.
Which
of
the
following
is
NOT
a
key
pricing
question
to
ask
this
client?
What
type
of
users
will
be
protected
by
the
service?
Will
the
solution
be
integrated
with
IBM
Security
Verify
Access
(ISAM)?
Do
you
use
behavioral
biometric
authentication?
v
How
many
mobile
applications
will
be
protected
by
the
service?
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Question
15
Correct
Points
out
of
1.00
Back
When
positioning
the
IBM
Trusteer
Pinpoint
Assure
product,
what
is
the
primary
use
case?
Unknown
user
fraud
and
risk
assessment
of
new
v
identities
Step
up
authentication
Known
user
fraud
detection
and
prevention
Mobile
Application
and
device
compromise
Question
16
Correct
Points
out
of
1.00
Mobile
Carrier
Intelligence
is
an
add-on
for
which
Trusteer
offering?
Rapport
Pinpoint
Detect
Pinpoint
Assure
v
Mobile
Software
Development
Kit
Question
17
Correct
Points
out
of
1.00
You
are
discussing
service
deployment
with
your
client,
and
you
want
to
highlight
the
IBM
Fraud
and
Identity
Analytics
Services
team.
What
service
does
this
team
provide?
Tuning
and
tailoring
of
policy
rules
and
models
v
Snippet
support
and
backend
API
support
Implementation
and
testing
Project
scoping
and
security analysis
Next
Question
18
Correct
Points
out
of
1.00
Back
Next
When
discussing
new
account
fraud
with
a
line
of
business
owner,
you
highlight
the
billions
in
losses
identified
by
Javelin
Strategy
and
Research.
How
much
is
lost
per
year
according
to
Javelin?
$2.9
Billion
$3.4
Billion
v
$1
Billion
$2.5
Billion
Question
19
Correct
Points
out
of
1.00
What
important
question
can
help
you
gauge
the
value
and
potential
benefit
Trusteer
could
provide
to
a
client?
What
percentage
of
your
login
activity
is
detectedas
«
fraudulent?
When
was
the
last
time
you
audited
your
access
logs?
Why
do
fraudsters
target
your
company?
How
do
you
stop
fraud
in
your
stores?
Question
20
Incorrect
Points
out
of
1.00
Back
When
talking
about
IBM
Trusteer
Pinpoint
Assure
to
a
client,
you
should
always
highlight
what
fraud
scheme
that
it
protects
against?
Digital
asset
transfer
%
New
digital
identity
or
unknown
users
Phishing
credentials
Account
take
over
Question
21
Correct
Points
out
of
1.00
What
activity
is
the
IBM
Trusteer
Threat
Research
Lab
NOT
constantly
doing?
Monitoring
the
dark
web
Identifying
emerging
threats
Devising
algorithms
to
detect
threats
Using
malware
for
phishing
v
Question
22
Correct
Points
out
of
1.00
During
your
presentation
to
a
client,
they
ask
about
alerts.
What
is
the
most
common
reason
Trusteer
generates
an
alert?
Suspicious
behavioral
anomaly
Access
from
a
known
fraudster
device
v
Suspicious
access
using
a
Virtual
Machine
Access
from
a
new
device
Next
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Question
23
Incorrect
Points
out
of
1.00
Back
During
an
active
session,
Trusteer
is
monitoring
the
user's
interaction
with
the client's
application.
When
anomalies
are
identified
during
a
session,
Trusteer
sends
an
alert
and
provides
an
explanation
of
what
type
of
session
risk
was
detected.
What
are
these
called?
Alert
Reason
IDs
or
Reason
codes
Vulnerability
Warning
Question
24
Correct
Points
out
of
1.00
What
is
the
industry
benchmark
for
fraud
alert
rate?
1%
0.05%
v
0.5%
5%
Question
25
Correct
Points
out
of
1.00
You
are
preparing
to
meet
with
a
client.
What
persona
is
NOT
a
typical
buyer
of
fraud
solutions?
Identity
and
Access
Management
Security
Leader
IT
Director
v
Chief
Information
Security
Officer
(CISO)
Line
of
Business
Leader
Next