IBM Security Verify SaaS Administrator (C1000-120) Certification Sample Questions

Security Verify SaaS Administrator Dumps, C1000-120 Dumps, C1000-120 PDF, Security Verify SaaS Administrator VCE, IBM C1000-120 VCE, IBM Security Verify SaaS Administrator PDFThe purpose of this Sample Question Set is to provide you with information about the IBM Security Verify SaaS v1 Administrator exam. These sample questions will make you very familiar with both the type and the difficulty level of the questions on the C1000-120 certification test. To get familiar with real exam environment, we suggest you try our Sample IBM Security Verify SaaS Administrator Certification Practice Exam. This sample practice exam gives you the feeling of reality and is a clue to the questions asked in the actual IBM Certified Administrator - Security Verify SaaS v1 certification exam.

These sample questions are simple and basic questions that represent likeness to the real IBM C1000-120 exam questions. To assess your readiness and performance with real time scenario based questions, we suggest you prepare with our Premium IBM Security Verify SaaS Administrator Certification Practice Exam. When you solve real time scenario based questions practically, you come across many difficulties that give you an opportunity to improve.

IBM C1000-120 Sample Questions:

01. What are two actions available in the IBM Resilient integration with IBM Security Verify?
a) Add User
b) Add User to Role
c) Add User as Admin
d) Add User to Group
e) Add User Entitlement
 
02. An administrator has been asked to configure an application, so that users in the sales group are automatically provisioned with an account. Which option should be used to configure this under Application Entitlements?
a) Automatic access for all users and groups.
b) Approval required for all users and groups.
c) Select users and groups, and assign individual access.
d) This can only be configured using Roles and Permissions.
 
03. Which use case describes the IBM Security Verify integration with IBM QRadar?
a) Protects application access through conditional constraints.
b) Provides a way to archive and analyze events.
c) Enhances user registration capabilities.
d) Automates user lifecycle events.
 
04. An administrator tries to onboard an application to IBM Security Verify but the application isn't in the catalog. What action should the user take to continue to onboard the application?
a) Use Add app in the Launchpad.
b) Create a custom application.
c) Connect an identity agent.
d) Open a support ticket.
 
05. Where can the IBM Security Verify Directory Sync Agent be downloaded?
a) GitHub
b) Dockerhub
c) IBM App Exchange
d) IBM Passport Advantage
 
06. If an account on a target system shows as compliant, which statement was true at the time of the account synchronization?
a) The account was marked as active in IBM Security Verify.
b) The remediation policy was set to Do not remediate non-compliant accounts automatically.
c) All attributes set in attribute mapping matched between the account and the IBM Security Verify user.
d) All attributes set in reverse attribute mapping configuration matched between the account and the IBM Security Verify user.
 
07. What are two types of application access policies that can be authored in IBM Security Verify?
a) Native custom app policy
b) Kerberos based policy
c) Form login based policy
d) HTTP header based policy
e) Federated sign-on policy
 
08. Which three methods can be used to authenticate to the provisioning endpoint when Account lifecycle is enabled for a custom application?
a) SAML
b) OAuth Bearer
c) Kerberos Token
d) JSON Web Token
e) Client Certificate
f) Basic Authentication
 
09. How can an OpenID Connect 1.0 application definition be added in the IBM Security Verify administrator interface?
a) Add a custom application with OIDC 1.0 as the sign-on method.
b) Add an OAuth application definition and add OIDC as a permitted scope.
c) Add a Generic OpenID Connect application in the application type selector.
d) Add an OAuth application definition and select the Enable OIDC 1.0 checkbox.
 
10. What functionality is covered by the Authentication Activity Report?
a) multi-factor authentication activity by method
b) all sign-in attempts, application access requests, and API calls
c) management events performed by administrator users and application owners
d) all sign-in attempts to IBM Security Verify for a given time range

Answers:

Question: 01
Answer: d, e
Question: 02
Answer: c
Question: 03
Answer: b
Question: 04
Answer: b
Question: 05
Answer: c
Question: 06
Answer: d
Question: 07
Answer: a, e
Question: 08
Answer: b, d, f
Question: 09
Answer: a
Question: 10
Answer: d

Note: For any error in IBM Certified Administrator - Security Verify SaaS v1 (C1000-120) certification exam sample questions, please update us by writing an email on feedback@edusum.com.

Rating: 5 / 5 (39 votes)