What type of disk encryption is used for Linux disks?
AZ-500 Assessment - 2
Quiz
•
Managobinda Sethi
•
Professional Development
•
Professional Development
•
1 plays
•
Medium
23 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What type of disk encryption is used for Linux disks?
BitLocker
DM-Crypt
FileVault
Answer explanation
Explanation
DM-Crypt . Azure Disk Encryption is a capability that lets you encrypt your Windows and Linux IaaS VM
disks. Azure Disk Encryption uses the industry standard BitLocker feature of Windows and the `DM-Crypt`
feature of Linux to provide OS and data disk encryption to help protect and safeguard your data.
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A company, with both Azure and on-premises virtual machines, needs to ensure your virtual machines are
kept up to date with security patches. Update Management is the Azure tool they will use, hopefully at
limited cost. Will Update management monitor their virtual machines for updates?
.
The Microsoft Monitoring Agent must be installed for both Windows and Linux virtual machines
on-premises.
Both the Update Management feature and the log data storage are free for the customer.
Update Management only pertains to cloud deployed virtual machines
Answer explanation
Explanation
Update Management only pertains to cloud deployed virtual machines. Update Management pertains to
virtual machines in on-premises environments, and in other cloud environments.
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following recommendations from Security Center is a medium-severity recommendation for
virtual machines and servers?
Disk encryption should be applied on virtual machines.
Install endpoint protection solution on virtual machines.
System updates should be installed on your machines.
Answer explanation
Explanation
Install endpoint protection solution on virtual machines is a medium-severity recommendation.
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following items should be stored in Azure Key Vault?
Secret
Links to external certificate
Identity management
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A select group of users must be able to create and delete keys in the key vault. When authenticating to
the data plane using Azure AD, what security tool should be used the authorize access at a role level to
these users?
Key vault access policies
Role-based Access Control
Azure AD authentication
Answer explanation
Explanation
Role-based Access Control. To create and delete key vaults the data plane you should grant access with
RBAC. For example, Key Vault Contributor. Using Access Policies would not give you role level control, and
does not follow least privilege rules.
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of these statements best describes Azure Key Vault's authentication and authorization process?
Applications authenticate to a vault with the username and password of the lead developer and have
full access to all secrets in the vault.
Applications and users authenticate to a vault with their Azure Active Directory identities and are
authorized to perform actions on all secrets in the vault.
Applications and users authenticate to a vault with a Microsoft account and are authorized to access
specific secrets.
Answer explanation
Explanation
Authentication to Key Vault uses Azure Active Directory identities. Access policies are used to provide
authorization for actions that apply to every secret in the vault.
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What type of Managed Service Identities can be created?
Application-assigned and VM-assigned
Database-assigned and unsigned
System-assigned and User-assigned
Answer explanation
Explanation
System-assigned, user assigned. There are two types of managed identities: A system-assigned managed
identity is enabled directly on an Azure service instance. When the identity is enabled, Azure creates an
identity for the instance in the Azure AD tenant that's trusted by the subscription of the instance. Creating
an app with a user-assigned identity requires that an organization create the identity and then add its
resource identifier to the app config.
Explore all questions with a free account
20 questions
SQL MASTERCLASS
Quiz
•
Professional Development
20 questions
Uji Teknis Junior IT Infrastructure Engineer
Quiz
•
Professional Development
27 questions
GCP
Quiz
•
University - Professi...
18 questions
VMware vSphere Quiz
Quiz
•
Professional Development
20 questions
Treasury and Ebanking
Quiz
•
Professional Development
25 questions
SC-200 Quiz
Quiz
•
Professional Development
23 questions
DP-900_01-Conceitos Gerais
Quiz
•
Professional Development
20 questions
Uji Unit Kompetensi 4 (UK.4)
Quiz
•
Professional Development
19 questions
Naming Polygons
Quiz
•
3rd Grade
14 questions
Prime Factorization
Quiz
•
6th Grade
20 questions
math review
Quiz
•
4th Grade
21 questions
6th Grade Math CAASPP Practice
Quiz
•
6th Grade
20 questions
Reading Comprehension
Quiz
•
5th Grade
20 questions
Types of Credit
Quiz
•
9th - 12th Grade
35 questions
4th Grade Math SOL Review
Quiz
•
4th Grade
20 questions
Taxes
Quiz
•
9th - 12th Grade