AZ-500 Final quiz GSI

AZ-500 Final quiz GSI

Professional Development

24 Qs

quiz-placeholder

Similar activities

Cybersecurity Scenarios and Policies Quiz

Cybersecurity Scenarios and Policies Quiz

Professional Development

25 Qs

CLF-C02 - Sim. 28 Questões Semana 2 - AWS Cloud Pratiticioner

CLF-C02 - Sim. 28 Questões Semana 2 - AWS Cloud Pratiticioner

Professional Development

25 Qs

Software Testing Fundamentals

Software Testing Fundamentals

Professional Development

20 Qs

Assesment ESET (2025)

Assesment ESET (2025)

Professional Development

20 Qs

Máy in, Máy Scan và Máy Photocopy

Máy in, Máy Scan và Máy Photocopy

Professional Development

20 Qs

EDU-NEXT AI

EDU-NEXT AI

Professional Development

20 Qs

CompTIA Security+ Flash Cards (TTP-XSS)

CompTIA Security+ Flash Cards (TTP-XSS)

Professional Development

20 Qs

Networking and Routing Quiz 1

Networking and Routing Quiz 1

Professional Development

23 Qs

AZ-500 Final quiz GSI

AZ-500 Final quiz GSI

Assessment

Quiz

Information Technology (IT)

Professional Development

Practice Problem

Hard

Created by

CloudThat Technologies

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

24 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

You are a security engineer for a company that uses Azure Storage accounts to store sensitive data. You need to ensure that data is encrypted at rest and in transit. Which of the following actions should you take? (Choose two)

Enable Azure Storage Service Encryption (SSE)

Use Azure Disk Encryption

Enable HTTPS for the storage account

Use Azure Key Vault to manage encryption keys

2.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

Your organization wants to implement Azure AD Privileged Identity Management (PIM) to manage and monitor privileged roles. Which of the following features does PIM provide? (Choose three)

Just-in-time privileged access

Multi-factor authentication enforcement

Automatic role assignment

Access reviews

3.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

You need to configure Azure Firewall to control outbound traffic from your virtual network to the internet. Which of the following steps should you take? (Choose two)

Create a route table and associate it with the subnet

Configure network rules in Azure Firewall

Enable DDoS protection

Configure application rules in Azure Firewall

4.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

Your company wants to use Azure Security Center to improve its security posture. Which of the following features does Azure Security Center provide? (Choose three)

Security recommendations

Just-in-time VM access

Automated threat response

Network performance monitoring

5.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

You are responsible for managing secrets and certificates in Azure Key Vault. Which of the following actions can you perform with Azure Key Vault? (Choose two)

Generate encryption keys

Monitor network traffic

Store secrets

Manage virtual networks

6.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

Your organization is concerned about potential DDoS attacks on its web applications. Which of the following steps should you take to configure Azure DDoS Protection? (Choose two)

Enable DDoS Protection Standard

Configure WAF policies

Enable Azure Firewall

Configure DDoS Protection plans

7.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

You need to implement conditional access policies to secure access to your company's resources. Which of the following conditions can you configure in a conditional access policy? (Choose three)

User risk

Device compliance

Network location

Application type

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?