AZ-500 Module-3 TCS

AZ-500 Module-3 TCS

Professional Development

10 Qs

quiz-placeholder

Similar activities

AZ-900 practice quiz 2

AZ-900 practice quiz 2

Professional Development

15 Qs

IT ENGLISH: Research Project Topics - MS Azure vs Windows Server

IT ENGLISH: Research Project Topics - MS Azure vs Windows Server

Professional Development

10 Qs

AZ-900 Modulo 2

AZ-900 Modulo 2

KG - Professional Development

14 Qs

DP-300

DP-300

Professional Development

15 Qs

DP 300 Practice

DP 300 Practice

Professional Development

11 Qs

PL-200

PL-200

Professional Development

11 Qs

AZ-900 Module 1

AZ-900 Module 1

1st Grade - Professional Development

14 Qs

AZ-104_Module-1

AZ-104_Module-1

Professional Development

10 Qs

AZ-500 Module-3 TCS

AZ-500 Module-3 TCS

Assessment

Quiz

Computers

Professional Development

Easy

Created by

CloudThat Technologies

Used 6+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which feature is essential for monitoring the security of Azure Container Instances (ACIs)?

Azure Monitor

Ignoring all security alerts

Disabling diagnostic logs

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What enables secure remote access to Azure VMs without exposing them to the public internet?

Azure Bastion

Direct access using public IP addresses

Unrestricted access through any internet connection

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What encryption method is recommended for securing data at rest on Azure VMs?

Manual encryption methods implemented at the application layer

Azure Disk Encryption using BitLocker or dm-crypt

Using plain text files for sensitive data storage

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What best practice secures access to Azure Container Registry (ACR)?

Public access with no authentication

Using a single, shared administrator account for all users

Integration with Microsoft Entra ID and RBAC

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How is network isolation achieved in Azure Kubernetes Service (AKS)?

Through unrestricted ingress and egress rules

By disabling network policies

Using network policies to control ingress and egress traffic

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is the purpose of Bring Your Own Key (BYOK) in Azure Key Vault?

To transfer a key from Azure Key Vault to an on-premises Hardware Security Module (HSM)

To securely transfer a key from an on-premises Hardware Security Module (HSM) outside Azure, into the HSM backing Azure Key Vault

To generate a new key in Azure Key Vault for use in an on-premises HSM

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of using Azure Key Vault to manage storage account access keys?

To limit access to the data stored in the storage account

To generate new access keys for each storage account

To manage and rotate existing access keys securely

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?