Azure Security and Management Quiz

Azure Security and Management Quiz

Professional Development

30 Qs

quiz-placeholder

Similar activities

A+ - 16B - Compare Wireless Security Protocols

A+ - 16B - Compare Wireless Security Protocols

Professional Development

25 Qs

A+ - 16A - Explain Attacks, Threats, and Vulnerabilities

A+ - 16A - Explain Attacks, Threats, and Vulnerabilities

Professional Development

28 Qs

Net+ 009 Day 7 Network Security Quiz for Students

Net+ 009 Day 7 Network Security Quiz for Students

Professional Development

29 Qs

CS Quiz Test 2

CS Quiz Test 2

Professional Development

25 Qs

Azure Quiz 2b

Azure Quiz 2b

Professional Development

29 Qs

Flapo SRE Quizzzz

Flapo SRE Quizzzz

Professional Development

27 Qs

AZ-900 Exam Q&A Series

AZ-900 Exam Q&A Series

11th Grade - Professional Development

33 Qs

CompTIA Security+ Certification Exam SY0-701 Practice Test 2

CompTIA Security+ Certification Exam SY0-701 Practice Test 2

Professional Development

25 Qs

Azure Security and Management Quiz

Azure Security and Management Quiz

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Margaret Sitati

Used 1+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You plan on deploying anti-malware solution to your LOB application VM via security extension. Is it possible to add the anti-malware security extension on top of the built-in Windows Defender anti-malware solution running locally on the VM?

TRUE

FALSE

Answer explanation

True is correct as it is possible to add the Azure VM Antimalware extension. It is to be noted that Windows Server 2016 OS has Windows Defender built-in by default which protects against malware. However, if you run the Azure VM Antimalware extension on top of Windows Defender, the extension will apply any optional configuration policies to be used by Windows Defender and that the extension will not deploy any additional antimalware services. https://docs.microsoft.com/en-us/azure/security/azure-security-antimalware

2.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following core features are available when you deploy Microsoft anti-malware for Azure applications. Select all that apply.

Real-time protection

Malware remediation

Exclusions

Anti-malware engine and platform updates

Answer explanation

All of the above are correct. When deploying Microsoft antimalware for Azure applications, some of the features are: real-time protection, malware remediation, exclusion of files, processes and drives, and automatic updates to the antimalware engine and platform. https://docs.microsoft.com/en-us/azure/security/azure-security-antimalware

3.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following is supported to create custom RBAC roles? Select all that apply.

Azure PowerShell

Azure CLI

Rest API

CMD

Answer explanation

Azure PowerShell, CLI and Rest API is correct and can be used to create custom RBAC roles in Azure. CMD is incorrect as this is not supported. https://docs.microsoft.com/en-us/azure/role-based-access-control/custom-roles

4.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

You need to provide RBAC access to a third party to manage a 'LOB-VM'. The third party should be able to restart the VM, however not be able to shut down the VM. When using Azure CLI, how should this be defined? Select all that apply.

Action: Microsoft.compute/virtualmachines/restart/action

Action: Microsoft.compute/virtualmachines/start/action

NotActions:Microsoft.compute/virtualmachines/start/action

NotAction:Microsoft.compute/virtualmachines/shutdown/action

Answer explanation

Option 1 is correct as you need to define the allowed action as restart. Option 4 is correct as you need to define the action which is not allowed, in this case it is shutdown. Option 2 is incorrect as you do not want the third party to start the VM as this is not a requirement. Option 3 is incorrect as you should make use of the shutdown parameter instead of start as you want to prohibit the shutdown of the VM, not the starting of the VM. https://docs.microsoft.com/en-us/azure/role-based-access-control/custom-roles-cli https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations

5.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following can be associated to a Network Security Group (NSG)? Select all that apply.

Subnet

Resource Group

Network Interface Card (NIC)

Virtual Network (VNet)

Answer explanation

The correct answers are:

  • A. Subnet

  • C. Network Interface Card (NIC)

Network Security Groups (NSGs) can be associated with subnets and individual network interfaces to control inbound and outbound network traffic.

  • Subnets: When associated with a subnet, the NSG rules apply to all resources within that subnet.

  • Network Interfaces: When associated with a specific network interface, the NSG rules apply only to that particular interface.

Therefore, options A and C are the correct choices.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or False: you can create custom service tags when making use of Network Security Groups?

TRUE

FALSE

Answer explanation

False is correct, you cannot create your own service tag or specify which IP’s are included within a tag.https://docs.microsoft.com/en-us/azure/virtual-network/security-overview#service-tags

7.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

What are two types of data store used by Azure Monitor?

Logs

Metrics

Event Hubs

Blobs

Queues

Answer explanation

Azure monitor stores data in Logs and Metrics data stores. The other answers are examples of Azure storage products. See: https://docs.microsoft.com/en-us/azure/azure-monitor/platform/data-platform

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?