
Revision
Authored by Beena Rai
Computers
Professional Development

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
OPEN ENDED QUESTION
3 mins • 1 pt
A client wants to implement a Zero Trust security strategy that’s based on the three key principles: verify explicitly, least privilege access, and assume breach. As they consider their strategy, what elements/pillars should they account for to provide an end-to-end Zero Trust security strategy. What are examples of the types of security considerations they should contemplate for each element/pillar?
Evaluate responses using AI:
OFF
Answer explanation
Should include the six pillars: identities, devices, applications, data, infrastructure, and networks. Refer to the content to see explicit examples for each. This topic will be revisited in subsequent learning paths/modules as you further explore identity, security, and compliance
2.
OPEN ENDED QUESTION
3 mins • 1 pt
The shared responsibility identifies which security tasks are handled by the cloud provider, and which ones are dealt with by you, the customer. The responsibilities vary depending on where the workload is hosted. For each approach to hosting (on-premises datacenter, IaaS, PaaS, and SaaS) describe the types of security responsibilities that would be owned by the customer versus those of the cloud provider
Evaluate responses using AI:
OFF
Answer explanation
The responses should show that, as the customer moves from on-premises to IaaS to PaaS to SaaS, more of the responsibility shifts to the cloud provider. Importantly, the answer should also reflect that, regardless of which hosting is used, the customer always owns information and data, devices, and accounts and identities.
3.
OPEN ENDED QUESTION
3 mins • 1 pt
Defense in depth uses a layered approach to security, rather than relying on a single perimeter. What are examples of security layers and the security measures that can be taken for each layer described?
Evaluate responses using AI:
OFF
Answer explanation
Should include the layers from the training content: physical security, identity and access, perimeter, network, compute, application, and data. Refer to the training content for some examples of the types of security measures that can be applied to each.
4.
OPEN ENDED QUESTION
3 mins • 1 pt
The CIA triangle is a way to think about security trade-offs. Identify what each letter stands for and describe what they refer to.
Evaluate responses using AI:
OFF
Answer explanation
Should include the terms confidentiality, integrity, and availability. Refer to the training content for a description of what is referred to by each of these three components
5.
OPEN ENDED QUESTION
3 mins • 1 pt
Identity has become the new security perimeter. Describe what is meant by this and the drivers that have led to a shift from a traditional perimeter-based security model to establishing identity as the new security perimeter?
Evaluate responses using AI:
OFF
Answer explanation
Should include a statement that defines an identity and the drivers that have led to this concept. This should include the acceleration in number of people working from home; SaaS applications that are hosted outside of the corporate network; the use of personal devices to access corporate resources; the use of unmanaged devices by partners and customers who may need to access your corporate resources; proliferation of IoT devices―and more.
6.
OPEN ENDED QUESTION
3 mins • 1 pt
Describe the different identity types supported by Microsoft Entra and when you would use them.
Evaluate responses using AI:
OFF
Answer explanation
Should include the following identity types: user, service principal, managed identity, and device. When describing the user identity type, the response should include the different external identities supported by Microsoft Entra (B2B and B2C). The response should reference the point that a service principal is like an identity for an application. For a managed identity, there should be reference to system-assigned and user-assigned and some of the differences. For a device identity type, there should be reference to the multiple options for getting devices into Microsoft Entra.
7.
OPEN ENDED QUESTION
3 mins • 1 pt
You friends just started a small business and are using a free tier of Microsoft Entra ID. They want to increase security but don’t know where to start and are on a very limited budget. They know that you just received your Microsoft Security, Compliance, and Identity Fundamentals certification, so they reach out for some guidance. What would you suggest and why?
Evaluate responses using AI:
OFF
Answer explanation
Should include a statement about security defaults in Microsoft Entra, and some of its features, including enforcing multifactor authentication registration for all users. Additionally, the answer should state that security defaults are available as part of the free tier of Microsoft Entra.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
12 questions
Cycle 4: Session 8 Review.
Quiz
•
Professional Development
14 questions
Day 1 - Basics of Java
Quiz
•
Professional Development
10 questions
Latihan Microsoft Word by Kisron
Quiz
•
Professional Development
20 questions
PRE TEST (B) - Product Link & TELEMATICS
Quiz
•
University - Professi...
14 questions
Web Basic
Quiz
•
Professional Development
20 questions
6.0 Security - CompTIA IT Fundamentals (ITF+) Security Quiz #1
Quiz
•
Professional Development
10 questions
AWS Practitioner - 10
Quiz
•
Professional Development
20 questions
class 8
Quiz
•
Professional Development
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
54 questions
Analyzing Line Graphs & Tables
Quiz
•
4th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
Discover more resources for Computers
20 questions
Black History Month Trivia Game #1
Quiz
•
Professional Development
100 questions
Screening Test Customer Service
Quiz
•
Professional Development
20 questions
90s Cartoons
Quiz
•
Professional Development
10 questions
Reading a ruler in Inches
Quiz
•
4th Grade - Professio...
16 questions
Parallel, Perpendicular, and Intersecting Lines
Quiz
•
KG - Professional Dev...
12 questions
Valentines Day Trivia
Quiz
•
Professional Development