
03 AZ-500: Secure your data and applications
Authored by Jomesh Joseph Veliyath
Professional Development
Professional Development
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An SQL database administrator has recently read about SQL injection attacks. They ask what can be done to minimize the risk of this type of attack. Implementing which of the following features will help protect the database?
Advanced Threat Protection
Cross-premises network connectivity
Traffic Manager
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An organization provides a Help Desk for its customers. Service representatives need to identify callers using the last four numbers of their credit card. There is a need to ensure the complete credit card number isn't fully exposed to the service representatives. Which of the following features should be implemented?
Dynamic Data Masking
Destination inbound rules
NAT rules
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Auditors need to be assured that sensitive database data always remains encrypted at rest, in transit, and in use. To assure the auditors this is being done, which of the below features is configured?
Always Encrypted
Load Balancer
Azure Web Application Firewall
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An App Service web application uses an SQL database. Users need to authenticate to the database with their Azure AD credentials. Which of the following configuration tasks would enable this?
Create users in each database
Add an Azure Firewall
Add a Web Application Firewall
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of firewall rules can be configured for an Azure SQL database?
Server-level firewall rules
Install Azure Firewall
Install a load balancer
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
When configuring Secure transfer, the Compliance office wants to understand how connections are secured when REST API operational calls are made to an Azure Storage account. What information would be provided?
By default, new storage accounts have secure transfer required enabled.
Vulnerability assessments
Authentication
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which statements are factual when configuring an Azure file share for a business group?
Azure Files can authenticate to Azure Active Directory Domain Services.
Allow Azure load balancer inbound
Allow all virtual networks inbound and outbound
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?