Search Header Logo

Azure 251-275

Authored by Michael Caponpon

Professional Development

Professional Development

Azure 251-275
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Choose the letter of the correct answer.

A

B

C

D

Answer explanation

"Azure Security Center" is the answer, and it has been renamed to Microsoft Defender for Cloud.

You can use Microsoft Defender for Cloud's just-in-time (JIT) access to protect your Azure virtual machines (VMs) from unauthorized network access. Many times firewalls contain allow rules that leave your VMs vulnerable to attack. JIT lets you allow access to your VMs only when the access is needed, on the ports needed, and for the period of time needed.

2.

FILL IN THE BLANKS QUESTION

1 min • 1 pt

Media Image

Select if the statement is YES. Otherwise, select NO.

(a)  

Answer explanation

Box 1 - Yes
Box 2 - No
“You can associate zero, or one, network security group to each virtual network subnet and network interface in a virtual machine. The same network security group can be associated to as many subnets and network interfaces as you choose.”
Note: It clearly says it must be either a subnet (not a virtual network) or a NIC.
Box 3 - Yes

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You have an Azure environment that contains 10 virtual networks and 100 virtual machines.
You need to limit the amount of inbound traffic to all the Azure virtual networks.
What should you create?

one application security group (ASG)

10 virtual network gateways

10 Azure ExpressRoute circuits

one Azure firewall

Answer explanation

You can restrict traffic to multiple virtual networks with a single Azure firewall.
Azure Firewall is a managed, cloud-based network security service that protects your Azure Virtual Network resources. It's a fully stateful firewall as a service with built-in high availability and unrestricted cloud scalability.
You can centrally create, enforce, and log application and network connectivity policies across subscriptions and virtual networks. Azure Firewall uses a static public IP address for your virtual network resources allowing outside firewalls to identify traffic originating from your virtual network.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This question requires that you evaluate the underlined text to determine if it is correct.
"Azure Key Vault is used to store secrets for Azure Active Directory (Azure AD) user accounts."
Instructions: Review the underlined text. If it makes the statement correct, select `No change is needed`.

If the statement is incorrect, select the answer choice that makes the statement correct.

No change is needed

Azure Active Directory (Azure AD) administrative accounts

Personally Identifiable Information (PII)

server applications

Answer explanation

Centralizing storage of application secrets in Azure Key Vault allows you to control their distribution. Key Vault greatly reduces the chances that secrets may be accidentally leaked. When application developers use Key Vault, they no longer need to store security information in their application. Not having to store security information in applications eliminates the need to make this information part of the code. For example, an application may need to connect to a database. Instead of storing the connection string in the app's code, you can store it securely in Key Vault.
Your applications can securely access the information they need by using URIs. These URIs allow the applications to retrieve specific versions of a secret. There's no need to write custom code to protect any of the secret information stored in Key Vault.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your company plans to automate the deployment of servers to Azure.
Your manager is concerned that you may expose administrative credentials during the deployment.
You need to recommend an Azure solution that encrypts the administrative credentials during the deployment.
What should you include in the recommendation?

Azure Key Vault

Azure Information Protection

Azure Security Center

Azure Multi-Factor Authentication (MFA)

Answer explanation

Azure Key Vault is a secure store for storage various types of sensitive information. In this question, we would store the administrative credentials in the Key Vault.
With this solution, there is no need to store the administrative credentials as plain text in the deployment scripts.
All information stored in the Key Vault is encrypted. Azure Key Vault can be used to Securely store and tightly control access to tokens, passwords, certificates, API keys, and other secrets.
Secrets and keys are safeguarded by Azure, using industry-standard algorithms, key lengths, and hardware security modules (HSMs). The HSMs used are Federal Information Processing Standards (FIPS) 140-2 Level 2 validated.
Access to a key vault requires proper authentication and authorization before a caller (user or application) can get access. Authentication establishes the identity of the caller, while authorization determines the operations that they are allowed to perform.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You plan to deploy several Azure virtual machines.
You need to control the ports that devices on the Internet can use to access the virtual machines.
What should you use?

a network security group (NSG)

an Azure Active Directory (Azure AD) role

an Azure Active Directory group

an Azure key vault

Answer explanation

A network security group works like a firewall. You can attach a network security group to a virtual network and/or individual subnets within the virtual network.
You can also attach a network security group to a network interface assigned to a virtual machine. You can use multiple network security groups within a virtual network to restrict traffic between resources such as virtual machines and subnets.
You can filter network traffic to and from Azure resources in an Azure virtual network with a network security group. A network security group contains security rules that allow or deny inbound network traffic to, or outbound network traffic from, several types of Azure resources.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Choose the letter of the correct answer.

A

B

C

D

Answer explanation

When you create a virtual machine, the default setting is to create a Network Security Group attached to the network interface assigned to a virtual machine.
A network security group works like a firewall. You can attach a network security group to a virtual network and/or individual subnets within the virtual network.
You can also attach a network security group to a network interface assigned to a virtual machine. You can use multiple network security groups within a virtual network to restrict traffic between resources such as virtual machines and subnets.
You can filter network traffic to and from Azure resources in an Azure virtual network with a network security group. A network security group contains security rules that allow or deny inbound network traffic to, or outbound network traffic from, several types of Azure resources.
In this question, we need to add a rule to the network security group to allow the connection to the virtual machine on port 8080.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?