AZ-500 Module-3 TCS

AZ-500 Module-3 TCS

Professional Development

10 Qs

quiz-placeholder

Similar activities

MS900 - Module 4 - Full Quiz

MS900 - Module 4 - Full Quiz

Professional Development

15 Qs

PL-200 Learning Path 2 - Manage Security

PL-200 Learning Path 2 - Manage Security

Professional Development

7 Qs

CloudFest 2021 Quiz

CloudFest 2021 Quiz

Professional Development

15 Qs

MC_AzureSqlDatabaseFundamentals_Session2_2

MC_AzureSqlDatabaseFundamentals_Session2_2

Professional Development

15 Qs

Introduction

Introduction

Professional Development

10 Qs

M365Ahmedabad

M365Ahmedabad

Professional Development

10 Qs

AZ-900 Module 1

AZ-900 Module 1

1st Grade - Professional Development

14 Qs

Entra ID

Entra ID

Professional Development

9 Qs

AZ-500 Module-3 TCS

AZ-500 Module-3 TCS

Assessment

Quiz

Computers

Professional Development

Easy

Created by

CloudThat Technologies

Used 6+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which feature is essential for monitoring the security of Azure Container Instances (ACIs)?

Azure Monitor

Ignoring all security alerts

Disabling diagnostic logs

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What enables secure remote access to Azure VMs without exposing them to the public internet?

Azure Bastion

Direct access using public IP addresses

Unrestricted access through any internet connection

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What encryption method is recommended for securing data at rest on Azure VMs?

Manual encryption methods implemented at the application layer

Azure Disk Encryption using BitLocker or dm-crypt

Using plain text files for sensitive data storage

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What best practice secures access to Azure Container Registry (ACR)?

Public access with no authentication

Using a single, shared administrator account for all users

Integration with Microsoft Entra ID and RBAC

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How is network isolation achieved in Azure Kubernetes Service (AKS)?

Through unrestricted ingress and egress rules

By disabling network policies

Using network policies to control ingress and egress traffic

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is the purpose of Bring Your Own Key (BYOK) in Azure Key Vault?

To transfer a key from Azure Key Vault to an on-premises Hardware Security Module (HSM)

To securely transfer a key from an on-premises Hardware Security Module (HSM) outside Azure, into the HSM backing Azure Key Vault

To generate a new key in Azure Key Vault for use in an on-premises HSM

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of using Azure Key Vault to manage storage account access keys?

To limit access to the data stored in the storage account

To generate new access keys for each storage account

To manage and rotate existing access keys securely

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?