Assessments
Chapter 1: Azure Security Introduction
Here are some sample answers to the questions presented in this chapter:
- Answer C. Responsibility is shared
- Answer B. Cloud provider
- Answer B. Cloud provider
- Answer C. Depends on service model
- Answer A. User
- Answer D. Both, but Q10 is replacing DLA
- Answer C. Customer is notified
Chapter 2: Governance and Security
Here are some sample answers to the questions presented in this chapter:
- Answer D. All of the above
- Answer D. Depends on deployment method
- Answer C. Management locks
- Answer B. Management group
- Answer B. Subscription
- Answer C. Both of the above
- Answer B. Service to gather information
Chapter 3: Governance and Security
Here are some sample answers to the questions presented in this chapter:
- Answer A. More exposed to attacks
- Answer C. Password protection
- Answer C. Multi-Factor Authentication (MFA)
- Answer A. Yes
- Answer C. Infected users
- Answer C. To activate privileges
- Answer C. Passwordless
Chapter 4: Azure Network Security
Here are some sample answers to the questions presented in this chapter:
- Answer B. Network Security Group (NSG)
- Answer B. Site-to-Site
- Answer C. Both of the above
- Answer B. Service endpoints
- Answer E. 1 and 3 are correct
- Answer B. Web Application Firewall (WAF)
- Answer C. Distributed Denial of Service (DDoS)
Chapter 5: Azure Key Vault
Here are some sample answers to the questions presented in this chapter:
- Answer D. All of the above
- Answer B. Access policies
- Answer A. Service Principal
- Answer A. EnabledForDeployment
- Answer B. EnabledForTemplateDeployment
- Answer C. EnabledForDiskEncryption
- Answer C. Reference Azure Key Vault
Chapter 6: Data Security
Here are some sample answers to the questions presented in this chapter:
- Answer B. Enforce HTTPS
- Answer C. Blob soft delete
- Answer A. Yes
- Answer B. No
- Answer B. No
- Answer C. Both of the above
- Answer C. Transparent Database Encryption (TDE)
Chapter 7: Azure Security Center
Here are some sample answers to the questions presented in this chapter:
- Answer C. Log Analytics workspace
- Answer E. Only 1 and 2
- Answer B. Recommendations
- Answer B. Logic Apps
- Answer B. JAR
- Answer D. Has to request access
- Answer B. User has to create response to attack
Chapter 8: Azure Sentinel
Here are some sample answers to the questions presented in this chapter:
- Answer C. Security Information Event Management (SIEM)
- Answer C. A Log Analytics workspace
- Answer C. A variety of data connectors from different vendors
- Answer C. Kusto
- Answer A. Visual detection of issues
- Answer B. Constant monitoring
- Answer C. Analyzing data with Jupyter Notebook
Chapter 9: Security Best Practices
Here are some sample answers to the questions presented in this chapter:
- Answer B. Use regional workspaces
- Answer B. Firewall
- Answer D. All of the above
- Answer A. Access restriction
- Answer B. Managed identity
- Answer D. All of the above
- Answer C. Different services and features
..................Content has been hidden....................
You can't read the all page of ebook, please click
here login for view all page.