AZ-500 Final quiz GSI

AZ-500 Final quiz GSI

Professional Development

24 Qs

quiz-placeholder

Similar activities

Chapter 6: Designing a Vulnerability Management Program

Chapter 6: Designing a Vulnerability Management Program

Professional Development

20 Qs

IT Security and Infrastructure Quiz

IT Security and Infrastructure Quiz

Professional Development

21 Qs

Chapter-1- Introduction to Web Development

Chapter-1- Introduction to Web Development

Professional Development

25 Qs

Tableau Quiz

Tableau Quiz

Professional Development

28 Qs

SAA-C03 Sim. 28 Questões Semana 2 - AWS Solutions Arch Associate

SAA-C03 Sim. 28 Questões Semana 2 - AWS Solutions Arch Associate

Professional Development

28 Qs

Mastering PowerBI Concepts

Mastering PowerBI Concepts

Professional Development

20 Qs

STS 101 - Short PRETEST Activity

STS 101 - Short PRETEST Activity

Professional Development

20 Qs

Women-in-Tek 2025 Assessment

Women-in-Tek 2025 Assessment

Professional Development

20 Qs

AZ-500 Final quiz GSI

AZ-500 Final quiz GSI

Assessment

Quiz

Information Technology (IT)

Professional Development

Hard

Created by

CloudThat Technologies

Used 3+ times

FREE Resource

24 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

You are a security engineer for a company that uses Azure Storage accounts to store sensitive data. You need to ensure that data is encrypted at rest and in transit. Which of the following actions should you take? (Choose two)

Enable Azure Storage Service Encryption (SSE)

Use Azure Disk Encryption

Enable HTTPS for the storage account

Use Azure Key Vault to manage encryption keys

2.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

Your organization wants to implement Azure AD Privileged Identity Management (PIM) to manage and monitor privileged roles. Which of the following features does PIM provide? (Choose three)

Just-in-time privileged access

Multi-factor authentication enforcement

Automatic role assignment

Access reviews

3.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

You need to configure Azure Firewall to control outbound traffic from your virtual network to the internet. Which of the following steps should you take? (Choose two)

Create a route table and associate it with the subnet

Configure network rules in Azure Firewall

Enable DDoS protection

Configure application rules in Azure Firewall

4.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

Your company wants to use Azure Security Center to improve its security posture. Which of the following features does Azure Security Center provide? (Choose three)

Security recommendations

Just-in-time VM access

Automated threat response

Network performance monitoring

5.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

You are responsible for managing secrets and certificates in Azure Key Vault. Which of the following actions can you perform with Azure Key Vault? (Choose two)

Generate encryption keys

Monitor network traffic

Store secrets

Manage virtual networks

6.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

Your organization is concerned about potential DDoS attacks on its web applications. Which of the following steps should you take to configure Azure DDoS Protection? (Choose two)

Enable DDoS Protection Standard

Configure WAF policies

Enable Azure Firewall

Configure DDoS Protection plans

7.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

You need to implement conditional access policies to secure access to your company's resources. Which of the following conditions can you configure in a conditional access policy? (Choose three)

User risk

Device compliance

Network location

Application type

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?