Assessments

Chapter 1: Azure Security Introduction

Here are some sample answers to the questions presented in this chapter:

  1. Answer C. Responsibility is shared
  2. Answer B. Cloud provider
  3. Answer B. Cloud provider
  4. Answer C. Depends on service model
  5. Answer A. User
  6. Answer D. Both, but Q10 is replacing DLA
  7. Answer C. Customer is notified

Chapter 2: Governance and Security

Here are some sample answers to the questions presented in this chapter:

  1. Answer D. All of the above
  2. Answer D. Depends on deployment method
  3. Answer C. Management locks
  4. Answer B. Management group
  5. Answer B. Subscription
  6. Answer C. Both of the above
  7. Answer B. Service to gather information

Chapter 3: Governance and Security

Here are some sample answers to the questions presented in this chapter:

  1. Answer A. More exposed to attacks
  2. Answer C. Password protection
  3. Answer C. Multi-Factor Authentication (MFA)
  4. Answer A. Yes
  5. Answer C. Infected users
  6. Answer C. To activate privileges
  7. Answer C. Passwordless

Chapter 4: Azure Network Security

Here are some sample answers to the questions presented in this chapter:

  1. Answer B. Network Security Group (NSG)
  2. Answer B. Site-to-Site
  3. Answer C. Both of the above
  4. Answer B. Service endpoints
  5. Answer E. 1 and 3 are correct
  6. Answer B. Web Application Firewall (WAF)
  7. Answer C. Distributed Denial of Service (DDoS)

Chapter 5: Azure Key Vault

Here are some sample answers to the questions presented in this chapter:

  1. Answer D. All of the above
  2. Answer B. Access policies
  3. Answer A. Service Principal
  4. Answer A. EnabledForDeployment
  5. Answer B. EnabledForTemplateDeployment
  6. Answer C. EnabledForDiskEncryption
  7. Answer C. Reference Azure Key Vault

Chapter 6: Data Security

Here are some sample answers to the questions presented in this chapter:

  1. Answer B. Enforce HTTPS
  2. Answer C. Blob soft delete
  3. Answer A. Yes
  4. Answer B. No
  5. Answer B. No
  6. Answer C. Both of the above
  7. Answer C. Transparent Database Encryption (TDE)

Chapter 7: Azure Security Center

Here are some sample answers to the questions presented in this chapter:

  1. Answer C. Log Analytics workspace
  2. Answer E. Only 1 and 2
  3. Answer B. Recommendations
  4. Answer B. Logic Apps
  5. Answer B. JAR
  6. Answer D. Has to request access
  7. Answer B. User has to create response to attack

Chapter 8: Azure Sentinel

Here are some sample answers to the questions presented in this chapter:

  1. Answer C. Security Information Event Management (SIEM)
  2. Answer C. A Log Analytics workspace
  3. Answer C. A variety of data connectors from different vendors
  4. Answer C. Kusto
  5. Answer A. Visual detection of issues
  6. Answer B. Constant monitoring
  7. Answer C. Analyzing data with Jupyter Notebook

Chapter 9: Security Best Practices

Here are some sample answers to the questions presented in this chapter:

  1. Answer B. Use regional workspaces
  2. Answer B. Firewall
  3. Answer D. All of the above
  4. Answer A. Access restriction
  5. Answer B. Managed identity
  6. Answer D. All of the above
  7. Answer C. Different services and features
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset