
AZ-500
Authored by SARATH PR
Computers
Professional Development
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
5 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following options can be used when configuring multifactor authentication in Azure?
Block a user if stolen password is suspected.
Configure IP addresses outside the company intranet that should be blocked.
Configure a one-time bypass to allow a user to authenticate a single time without performing MFA.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the primary purpose of Azure Network Security Groups (NSGs)?
Managing user access to Azure resources
Safeguarding data within virtual machines
Filtering inbound and outbound traffic to and from Azure resources
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which security technology is commonly used to establish secure communication between a user's device and a corporate network?
Intrusion Detection System (IDS)
Virtual Local Area Network (VLAN)
Virtual Private Network (VPN)
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the purpose of Microsoft Defender for Cloud?
To manage cloud billing and usage
To protect cloud resources from threats
To create virtual networks in Azure
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How can you customize detection rules in Microsoft Sentinel?
By predicting stock market trends
By identifying potential security incidents
By automating virtual machine deployments
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?