Search Header Logo

Azure Security and Management Quiz

Authored by Margaret Sitati

Computers

Professional Development

Used 1+ times

Azure Security and Management Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You plan on deploying anti-malware solution to your LOB application VM via security extension. Is it possible to add the anti-malware security extension on top of the built-in Windows Defender anti-malware solution running locally on the VM?

TRUE

FALSE

Answer explanation

True is correct as it is possible to add the Azure VM Antimalware extension. It is to be noted that Windows Server 2016 OS has Windows Defender built-in by default which protects against malware. However, if you run the Azure VM Antimalware extension on top of Windows Defender, the extension will apply any optional configuration policies to be used by Windows Defender and that the extension will not deploy any additional antimalware services. https://docs.microsoft.com/en-us/azure/security/azure-security-antimalware

2.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following core features are available when you deploy Microsoft anti-malware for Azure applications. Select all that apply.

Real-time protection

Malware remediation

Exclusions

Anti-malware engine and platform updates

Answer explanation

All of the above are correct. When deploying Microsoft antimalware for Azure applications, some of the features are: real-time protection, malware remediation, exclusion of files, processes and drives, and automatic updates to the antimalware engine and platform. https://docs.microsoft.com/en-us/azure/security/azure-security-antimalware

3.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following is supported to create custom RBAC roles? Select all that apply.

Azure PowerShell

Azure CLI

Rest API

CMD

Answer explanation

Azure PowerShell, CLI and Rest API is correct and can be used to create custom RBAC roles in Azure. CMD is incorrect as this is not supported. https://docs.microsoft.com/en-us/azure/role-based-access-control/custom-roles

4.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

You need to provide RBAC access to a third party to manage a 'LOB-VM'. The third party should be able to restart the VM, however not be able to shut down the VM. When using Azure CLI, how should this be defined? Select all that apply.

Action: Microsoft.compute/virtualmachines/restart/action

Action: Microsoft.compute/virtualmachines/start/action

NotActions:Microsoft.compute/virtualmachines/start/action

NotAction:Microsoft.compute/virtualmachines/shutdown/action

Answer explanation

Option 1 is correct as you need to define the allowed action as restart. Option 4 is correct as you need to define the action which is not allowed, in this case it is shutdown. Option 2 is incorrect as you do not want the third party to start the VM as this is not a requirement. Option 3 is incorrect as you should make use of the shutdown parameter instead of start as you want to prohibit the shutdown of the VM, not the starting of the VM. https://docs.microsoft.com/en-us/azure/role-based-access-control/custom-roles-cli https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations

5.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following can be associated to a Network Security Group (NSG)? Select all that apply.

Subnet

Resource Group

Network Interface Card (NIC)

Virtual Network (VNet)

Answer explanation

The correct answers are:

  • A. Subnet

  • C. Network Interface Card (NIC)

Network Security Groups (NSGs) can be associated with subnets and individual network interfaces to control inbound and outbound network traffic.

  • Subnets: When associated with a subnet, the NSG rules apply to all resources within that subnet.

  • Network Interfaces: When associated with a specific network interface, the NSG rules apply only to that particular interface.

Therefore, options A and C are the correct choices.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or False: you can create custom service tags when making use of Network Security Groups?

TRUE

FALSE

Answer explanation

False is correct, you cannot create your own service tag or specify which IP’s are included within a tag.https://docs.microsoft.com/en-us/azure/virtual-network/security-overview#service-tags

7.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

What are two types of data store used by Azure Monitor?

Logs

Metrics

Event Hubs

Blobs

Queues

Answer explanation

Azure monitor stores data in Logs and Metrics data stores. The other answers are examples of Azure storage products. See: https://docs.microsoft.com/en-us/azure/azure-monitor/platform/data-platform

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?