Which one of the following should not be stored in Azure Key Vault? What are the differences between these items? Select one.

AZ-500 Part 2

Quiz
•
Professional Development
•
Professional Development
•
Hard

CloudThat Technologies
Used 18+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Key management
Secret management
Certificate management
Identity management
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of these statements best describes Azure Key Vault's authentication and authorization process? Select one.
Applications authenticate to a vault with the username and password of the lead developer and have full access to all secrets in the vault.
Applications and users authenticate to a vault with their Azure Active Directory identities and are authorized to perform actions on all secrets in the vault.
Applications authenticate to a vault with the username and password of a user that signs in to the web app, and is granted access to secrets owned by that user.
Applications and users authenticate to a vault with a Microsoft account and are authorized to access specific secrets
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
There are two types of Managed Service Identities you can create, one is System-assigned which is second type?
Application-assigned
Database-assigned
VM-assigned
User-assigned
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You are configuring Secure transfer required. Your Compliance office wants to more about this feature. You provide all the following information, except? Select one.
Requests to storage can be HTTPS or HTTP.
Requests to storage must be SMB with encryption
Azure storage doesn't support HTTPS for custom domain names
By default, new storage accounts have secure transfer required enabled.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Your SQL database administrator has recently read about SQL injection attacks. They ask you what can be done to minimize the risk of this type of attack. You suggest implementing which of the following features?
Advanced Threat Protection
Data Discovery and Classification
Dynamic Data Masking
Transparent Data Encryption
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You can query Log Analytics workspace with which of the following? Select one.
Embedded SQL
Graph API
Kusto Query Language
Contextual Query Language
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You want to be notified when any virtual machine in the production resource group is deleted. What should you configure? Select one.
Log alert
Metric alert
Activity log alert
Application alert
Create a free account and access millions of resources
Similar Resources on Quizizz
10 questions
Azure Fundamentals Quiz 3

Quiz
•
Professional Development
10 questions
AZ-104

Quiz
•
Professional Development
13 questions
AZ-900

Quiz
•
Professional Development
7 questions
04.Azure_SeguridadGeneralyDeRed

Quiz
•
Professional Development
15 questions
Labsit AZ900 - 2º Simulado

Quiz
•
Professional Development
9 questions
Evaluación | Temas Azure

Quiz
•
Professional Development
9 questions
05.AzureDescripcionIdentidadGobernanzaPrivacidad

Quiz
•
Professional Development
9 questions
02. Azure Descripción de los servicios

Quiz
•
Professional Development
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade