
AZ-500 Final quiz GSI
Authored by CloudThat Technologies
Information Technology (IT)
Professional Development
Used 3+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
24 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
2 mins • 1 pt
You are a security engineer for a company that uses Azure Storage accounts to store sensitive data. You need to ensure that data is encrypted at rest and in transit. Which of the following actions should you take? (Choose two)
Enable Azure Storage Service Encryption (SSE)
Use Azure Disk Encryption
Enable HTTPS for the storage account
Use Azure Key Vault to manage encryption keys
2.
MULTIPLE SELECT QUESTION
2 mins • 1 pt
Your organization wants to implement Azure AD Privileged Identity Management (PIM) to manage and monitor privileged roles. Which of the following features does PIM provide? (Choose three)
Just-in-time privileged access
Multi-factor authentication enforcement
Automatic role assignment
Access reviews
3.
MULTIPLE SELECT QUESTION
2 mins • 1 pt
You need to configure Azure Firewall to control outbound traffic from your virtual network to the internet. Which of the following steps should you take? (Choose two)
Create a route table and associate it with the subnet
Configure network rules in Azure Firewall
Enable DDoS protection
Configure application rules in Azure Firewall
4.
MULTIPLE SELECT QUESTION
2 mins • 1 pt
Your company wants to use Azure Security Center to improve its security posture. Which of the following features does Azure Security Center provide? (Choose three)
Security recommendations
Just-in-time VM access
Automated threat response
Network performance monitoring
5.
MULTIPLE SELECT QUESTION
2 mins • 1 pt
You are responsible for managing secrets and certificates in Azure Key Vault. Which of the following actions can you perform with Azure Key Vault? (Choose two)
Generate encryption keys
Monitor network traffic
Store secrets
Manage virtual networks
6.
MULTIPLE SELECT QUESTION
2 mins • 1 pt
Your organization is concerned about potential DDoS attacks on its web applications. Which of the following steps should you take to configure Azure DDoS Protection? (Choose two)
Enable DDoS Protection Standard
Configure WAF policies
Enable Azure Firewall
Configure DDoS Protection plans
7.
MULTIPLE SELECT QUESTION
2 mins • 1 pt
You need to implement conditional access policies to secure access to your company's resources. Which of the following conditions can you configure in a conditional access policy? (Choose three)
User risk
Device compliance
Network location
Application type
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?