Compliance

Compliance

Professional Development

20 Qs

quiz-placeholder

Similar activities

Microsoft Excel

Microsoft Excel

3rd Grade - Professional Development

22 Qs

Creating Effective Slide Presentation Pre Test

Creating Effective Slide Presentation Pre Test

Professional Development

15 Qs

class 8

class 8

Professional Development

20 Qs

MS Office

MS Office

Professional Development

20 Qs

IT User Fundamentals

IT User Fundamentals

Professional Development

18 Qs

MInecraft Education Coding

MInecraft Education Coding

Professional Development

20 Qs

About OneDrive

About OneDrive

Professional Development

17 Qs

Compliance

Compliance

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Beena Rai

FREE Resource

20 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following are principles of the Zero Trust model?

Select all that apply.

Verify explicitly

Block access

Least privileged access

Assume breach

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The shared responsibility model identifies which security tasks are handled by the cloud provider, and which are handled by you, the customer. The responsibilities vary depending on where the workload is hosted. Which approach places more responsibility on the cloud provider?

Select the correct option.

On-premises datacenter

Infrastructure as a service (IaaS)

Software as a service (SaaS)

Platform as a service (PaaS)

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Consider the shared responsibility model―in which approach does the customer own the security tasks related with information and data, devices, and accounts and identities?

Select the correct option.

On-premises datacenter

Infrastructure as a service (IaaS) and platform as a service (PaaS)

Software as a service (SaaS)

All the above (correct answer)

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The HTTPS protocol is an example of which type of encryption?

Select the correct option.

Encryption in transit

Encryption at rest

No encryption

Hashing

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term used to describe the process for verifying the identity of an object, service, or person?

Select the correct option.

Authorization

Authentication

Auditing

Administration

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are the external identity types supported by Microsoft Entra?

Select all that apply.

B2B

B2C

Device identity

Application identity

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following verification methods can be used with Microsoft Entra multifactor authentication?

Select all that apply.

Microsoft Authenticator app

SMS

Voice call

Security questions

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?