ICC1 - Ada AZ-900 - Azure Fundamentals quiz 5

ICC1 - Ada AZ-900 - Azure Fundamentals quiz 5

University

8 Qs

quiz-placeholder

Similar activities

Understanding Cybersecurity

Understanding Cybersecurity

5th Grade - Professional Development

10 Qs

ITBP301_Chapter 08

ITBP301_Chapter 08

University

10 Qs

CN3303 Lecture 3 Business Risk and Continuity

CN3303 Lecture 3 Business Risk and Continuity

University

10 Qs

Pop Quiz for Topic 2.1 Show Security Policy & 2.2 Show Security

Pop Quiz for Topic 2.1 Show Security Policy & 2.2 Show Security

University

10 Qs

Cybersecurity Quiz (NeoCyber Discord)

Cybersecurity Quiz (NeoCyber Discord)

9th Grade - University

12 Qs

Managing User Accounts

Managing User Accounts

9th Grade - University

10 Qs

Cloud Computing

Cloud Computing

University - Professional Development

10 Qs

Cloud Computing

Cloud Computing

University

10 Qs

ICC1 - Ada AZ-900 - Azure Fundamentals quiz 5

ICC1 - Ada AZ-900 - Azure Fundamentals quiz 5

Assessment

Quiz

Computers

University

Easy

Created by

Steve Rich

Used 5+ times

FREE Resource

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which Microsoft Entra tool can vary the credentials needed to log in based on signals, such as where the user is located?

Conditional Access

Guest Access

Passwordless

Answer explanation

Conditional Access is a tool that Microsoft Entra ID uses to allow (or deny) access to resources based on identity signals. Conditional Access might challenge you for a second authentication factor if your sign-in signals are unusual or from an unexpected location.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which security model assumes the worst-case security scenario, and protects resources accordingly?

Zero Trust

Defense-in-depth

Role-based access control

Answer explanation

Zero Trust is a security model that assumes the worst case scenario and protects resources with that expectation.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user is simultaneously assigned multiple roles that use role-based access control. What are their actual permissions? The role permissions are: Role 1 - read || Role 2 - write || Role 3 - read and write.

Read only

Write only

Read and write

Answer explanation

Role-based access control, using an allow model, grants all of the permissions assigned in all of the assigned roles.

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A company uses a cloud platform for its customer relationship management (CRM) system. The CRM stores sensitive customer data, and the company needs to ensure that only authorized employees can access this data and perform specific actions within the system.

Encryption

Authorisation

Auditing

Authentication

Answer explanation

Authorisation (Correct Answer): This determines what actions a user can perform within the system. Even after successful authentication, only authorized users with the appropriate permissions should be able to access specific customer data or perform actions like editing or deleting records.

Authentication verifies a user's identity through credentials like username and password. It ensures only valid users can log in to the CRM system.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your company is implementing Microsoft Entra for Single Sign-On (SSO) across its cloud applications. Different departments utilize various Microsoft 365 services and cloud-based productivity tools.

Entra eliminates the need for user passwords entirely

Entra allows users to manage all application passwords from a central location

Entra simplifies user access by authenticating users once for all authorized cloud applications.

Entra encrypts user data at rest within all connected cloud applications.

Answer explanation

This is the core benefit of SSO. Users authenticate once with Entra, and then access all authorized applications without further login prompts.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following statements BEST defines Role-Based Access Control (RBAC)?

A security model that grants access permissions based on a user's location.

A system where users manage their own access controls to resources.

A method that assigns permissions to users based on their job functions and responsibilities.

A security approach that relies solely on strong user passwords for access control.

Answer explanation

RBAC groups users into roles with predefined permissions. Users inherit the access controls associated with their assigned roles. This simplifies administration and ensures access aligns with job duties.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following statements BEST defines the concept of defense in depth in cybersecurity?

A security approach that relies on a single, very strong perimeter security measure.

Implementing multiple layers of security controls to mitigate various cyber threats.

Focusing security efforts solely on preventing unauthorized access to systems.

Regularly patching software vulnerabilities to address security risks.

Answer explanation

This concept advocates for layered security controls. If one layer is breached, others can help mitigate the attack. Firewalls, intrusion detection, data encryption, and access controls are all examples of defense in depth strategies.

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Microsoft Defender for Cloud is a security solution for cloud resources.

Which of the following functionalities is NOT a core capability of Microsoft Defender for Cloud?

Vulnerability scanning for security weaknesses in cloud workloads.

Patch management for deploying security updates to cloud resources.

Cost optimization recommendations for cloud security services.

Sandboxing for testing potentially malicious files in a controlled environment.

Answer explanation

Vulnerability scanning: Defender for Cloud identifies potential security weaknesses in your cloud resources, allowing for mitigation.

Patch management: The solution can automate security update deployment for your cloud resources.

Cost optimization recommendations (Incorrect): While not a core functionality, Defender for Cloud can offer recommendations for optimizing security costs based on your resource usage.

Sandboxing: Defender for Cloud provides sandboxing capabilities to test suspicious files in a safe environment before they reach production systems.