Assessments

In the following pages, we will review all the practice questions from each of the chapters in this book and provide the correct answers.

Chapter 1 – An Introduction to Azure Security

  1. C. Responsibility is shared
  2. B. Cloud provider
  3. B. Cloud provider
  4. C. Depends on the service model
  5. A. User
  6. C. Both, but DLA is replacing Q10
  7. C. Customer is notified

Chapter 2 – Governance and Security

  1. D. All of the above
  2. C. We need to define both the what and the how
  3. C. Delete locks
  4. D. Management Group
  5. E. Management Group or Subscription
  6. D. All of the above
  7. B. A service to gather information about deployments

Chapter 3 – Managing Cloud Identities

  1. A. More exposed to attacks
  2. C. Password protection
  3. D. Passwordless sign-in methods
  4. A. Yes
  5. C. Infected users
  6. C. To activate privileges
  7. D. Passwordless authentication

Chapter 4 – Azure Network Security

  1. B. A Network Security Group (NSG)
  2. B. Site-to-Site
  3. C. Both of the above
  4. B. Service endpoints
  5. D. A and B are correct
  6. C. Distributed Denial of Service (DDoS)

Chapter 5 – Azure Key Vault

  1. E. All of the above
  2. B. Access policies 
  3. A. Service principals
  4. A. EnabledForDeployment
  5. B. EnabledForTemplateDeployment
  6. C. EnabledForDiskEncryption
  7. C. Reference an Azure Key vault

Chapter 6 – Data Security

  1. B. Enforce HTTPS
  2. C. Blob soft delete
  3. A. Yes
  4. A. Yes
  5. A. Yes
  6. C. Both of the above
  7. B. Dynamic data masking

Chapter 7 – Microsoft Defender for Cloud

  1. C. Log Analytics Workspace
  2. A. Recommendations
  3. B. Logic Apps
  4. E. Both A and C
  5. D. Both B and C
  6. E. Both B and D

Chapter 8 – Microsoft Sentinel

  1. C. Security Information Event Management (SIEM)
  2. C. A Log Analytics workspace
  3. C. A variety of data connectors from different vendors
  4. C. Kusto
  5. A. Visual detection of issues
  6. B. Constant monitoring
  7. C. Analyzing data with Jupyter Notebooks

Chapter 9 – Security Best Practices

  1. D. Based on requirements, both A and B can be correct
  2. B. A firewall
  3. D. All of the above
  4. A. Access restriction
  5. B. Managed identity
  6. D. All of the above
  7. C. Different services and features
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset