Cristian Osvaldo Gómez
Quiz by , created more than 1 year ago

Test Azure

91
0
0
Cristian Osvaldo Gómez
Created by Cristian Osvaldo Gómez over 4 years ago
Close

Test Module 03

Question 1 of 14

1

Which of the following could grant or deny access based on the originating IP address?

Select one of the following:

  • Azure Active Directory

  • Aure Firewall

  • VPN Gateway

Explanation

Question 2 of 14

1

Which of the following could require both a password and a security question for full authentication?

Select one of the following:

  • Azure Firewall

  • Application Gateway

  • Multi-Factor Authentication

Explanation

Question 3 of 14

1

Which of the following services would you use to filter internet traffic in your Azure virtual network?

Select one of the following:

  • Azure Firewall

  • Network Security Group

  • VPN Gateway

Explanation

Question 4 of 14

1

Which of the following lets you store passwords in Azure so you can centrally manage them for your services and applications?

Select one of the following:

  • Azure Advanced Threat Protection

  • Azure Key Vault

  • Azure Security Center

Explanation

Question 5 of 14

1

Which of the following should you use to download published audit reports and how Microsoft builds and operates its cloud services?

Select one of the following:

  • Azure Policy

  • Azure Service Health

  • Service Trust Portal

Explanation

Question 6 of 14

1

Which of the following provides information about planned maintenance and changes that could affect the availability of your resources?

Select one of the following:

  • Azure Monitor

  • Azure Security Center

  • Azure Service Health

Explanation

Question 7 of 14

1

Where can you obtain details about the personal data Microsoft processes, how Microsoft processes it, and for what purposes?

Select one of the following:

  • Microsoft Privacy Statement

  • Compliance Manager

  • Azure Service Health

Explanation

Question 8 of 14

1

Which of the following can be used to help you enforce resource tagging so you can manage billing?

Select one of the following:

  • Azure Policy

  • Azure Service Health

  • Compliance Manager

Explanation

Question 9 of 14

1

Which of the following can be used to define a repeatable set of Azure resources that implement organizational requirements?

Select one of the following:

  • Azure Blueprint

  • Azure Policy

  • Azure Resource Groups

Explanation

Question 10 of 14

1

Which of the following lets you grant users only the rights they need to perform their jobs?

Select one of the following:

  • Azure Policy

  • Compliance Manager

  • Role-Based Access Control

Explanation

Question 11 of 14

1

Which of these options helps you most easily disable an account when an employee leaves your company?

Select one of the following:

  • Enforce multi-factor authentication (MFA)

  • Monitor sign-on attempts

  • Use single sign-on (SSO)

Explanation

Question 12 of 14

1

What is Azure Information Protection?

Select one of the following:

  • AIP is a cloud-based solution that helps organizations classify and (optionally) protect its documents and emails by applying labels. Labels can be applied automatically (by administrators who define rules and conditions), manually (by users), or with a combination of both (where users are guided by recommendations).

  • AIP is a cloud-based security solution that identifies, detects, and helps you investigate advanced threats, compromised identities, and malicious insider actions directed at your organization.

  • AIP is a monitoring service that provides threat protection across all of your services both in Azure, and on-premises.

Explanation

Question 13 of 14

1

Which of the following items would be good use of a resource lock?

Select one of the following:

  • An ExpressRoute circuit with connectivity back to your on-premises network

  • A non-production virtual machine used to test occasional application builds

  • A storage account used to temporarily store images processed in a development environment

Explanation

Question 14 of 14

1

Which of the following approaches would be the most efficient way to ensure a naming convention was followed across your subscription?

Select one of the following:

  • Send out an email with the details of your naming conventions and hope it is followed.

  • Create a policy with your naming requirements and assign it to the scope of your subscription

  • Give all other users except for yourself read-only access to the subscription. Have all requests to create resources sent to you so you can review the names being assigned to resources, and then create them.

Explanation