Search Header Logo

AZ-500 Final quiz GSI

Authored by CloudThat Technologies

Information Technology (IT)

Professional Development

Used 3+ times

AZ-500 Final quiz GSI
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

24 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

You are a security engineer for a company that uses Azure Storage accounts to store sensitive data. You need to ensure that data is encrypted at rest and in transit. Which of the following actions should you take? (Choose two)

Enable Azure Storage Service Encryption (SSE)

Use Azure Disk Encryption

Enable HTTPS for the storage account

Use Azure Key Vault to manage encryption keys

2.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

Your organization wants to implement Azure AD Privileged Identity Management (PIM) to manage and monitor privileged roles. Which of the following features does PIM provide? (Choose three)

Just-in-time privileged access

Multi-factor authentication enforcement

Automatic role assignment

Access reviews

3.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

You need to configure Azure Firewall to control outbound traffic from your virtual network to the internet. Which of the following steps should you take? (Choose two)

Create a route table and associate it with the subnet

Configure network rules in Azure Firewall

Enable DDoS protection

Configure application rules in Azure Firewall

4.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

Your company wants to use Azure Security Center to improve its security posture. Which of the following features does Azure Security Center provide? (Choose three)

Security recommendations

Just-in-time VM access

Automated threat response

Network performance monitoring

5.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

You are responsible for managing secrets and certificates in Azure Key Vault. Which of the following actions can you perform with Azure Key Vault? (Choose two)

Generate encryption keys

Monitor network traffic

Store secrets

Manage virtual networks

6.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

Your organization is concerned about potential DDoS attacks on its web applications. Which of the following steps should you take to configure Azure DDoS Protection? (Choose two)

Enable DDoS Protection Standard

Configure WAF policies

Enable Azure Firewall

Configure DDoS Protection plans

7.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

You need to implement conditional access policies to secure access to your company's resources. Which of the following conditions can you configure in a conditional access policy? (Choose three)

User risk

Device compliance

Network location

Application type

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?