AZ-104: Microsoft Azure Administrator Full Course - SAS Best Practices

AZ-104: Microsoft Azure Administrator Full Course - SAS Best Practices

Assessment

Interactive Video

Information Technology (IT), Architecture, Social Studies

University

Hard

Created by

Quizizz Content

FREE Resource

The video tutorial discusses shared access signatures (SAS) and their potential risks, such as data compromise if leaked. It provides recommendations for using SAS securely, including using HTTPS, setting expiration times, and limiting permissions. The tutorial emphasizes the importance of data validation and suggests alternatives to SAS for certain operations. It also highlights the use of storage analytics for monitoring SAS usage and security.

Read more

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a potential risk if a shared access signature (SAS) is leaked?

It can be used to access unrelated accounts.

It can be used by anyone who has it, compromising the storage account.

It can only be used once.

It automatically expires immediately.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which protocol should be used to create or distribute a SAS to ensure security?

HTTP

FTP

HTTPS

SMTP

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is it important to set near-term expiration times on ad hoc SAS?

To allow unlimited data uploads.

To reduce the risk if the SAS is compromised.

To ensure the SAS is valid indefinitely.

To avoid the need for HTTPS.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should be considered when setting the start time for a SAS?

It should be left unset to avoid any issues.

It should always be set to the current time.

It should be at least 15 minutes in the past to avoid clock skew issues.

It should be set to the future to ensure validity.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a security best practice when granting access with a SAS?

Grant all possible permissions to avoid future issues.

Provide the minimum required privileges to the user.

Allow read, write, and delete access to all entities.

Set no expiration time for the SAS.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is it important to validate data written using a SAS?

To reduce storage costs.

To allow faster data retrieval.

To ensure the data is encrypted.

To prevent unauthorized or corrupt data from being used.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What can be used to monitor applications using SAS for any unusual activity?

Manual checks

Regular email updates

Third-party software

Storage analytics with logging and metrics