Time limit: 0
Quiz Summary
0 of 10 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Quiz complete. Results are being recorded.
Results
0 of 10 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
-
Unfortunately, you didn’t pass the quiz, but hey, you have unlimited access.😎
Practice makes you perfect! 👊 -
Congratulations! 🥳
You have passed the quiz successfully! You are one step closer to pass the real exam!
We hope to see you again on another certification path.✌️
Good luck with the exam! Stay strong.👊
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 10
1. Question
Sort the layers of security from the last line of defense to the first line of defense, in order to slow down an attack and provide alert telemetry that can be acted upon.
-
Compute
-
Identity and access
-
Networking
-
Physical security
-
Data
-
Perimeter
-
Application
View Answers:
CorrectIncorrect -
-
Question 2 of 10
2. Question
Answer the fill-in-the-blank by typing one of the following options:
Security
Safety
Examine
Diagnose
-
A great place to start when examining the security of your Azure-based solutions is Azure Center.
CorrectIncorrect -
-
Question 3 of 10
3. Question
Two fundamental concepts that need to be understood when talking about identity and access control are authentication and authorization. Match the terms with their meaning.
Sort elements
- Authentication
- Authorization
-
Determines whether users are who they claim to be
-
Determines what users can and cannot access
CorrectIncorrect -
Question 4 of 10
4. Question
Single sign-on (SSO) provides additional security for your identities by requiring two or more elements for full authentication.
CorrectIncorrect -
Question 5 of 10
5. Question
Which statement is not true about Azure role-based access control (Azure RBAC)?
CorrectIncorrect -
Question 6 of 10
6. Question
Which of the following option is a load balancer that includes a Web Application Firewall (WAF) and provides protection from common, known vulnerabilities in websites?
CorrectIncorrect -
Question 7 of 10
7. Question
Which of the following option is a cloud-based solution that helps organizations classify and optionally protect documents and emails by applying labels?
CorrectIncorrect -
Question 8 of 10
8. Question
Answer the fill-in-the-blank by typing one of the following options:
Mitigation
Protection
Detection
Response
-
Azure Advanced Threat is a cloud-based security solution that identifies, detects, and helps you investigate advanced threats, compromised identities, and malicious insider actions directed at your organization.
CorrectIncorrect -
-
Question 9 of 10
9. Question
There has been an attack on your public-facing website, and the application has been overwhelmed from requests and now is unavailable to users. What service should you use to prevent this type of attack?
CorrectIncorrect -
Question 10 of 10
10. Question
Cloud security is a shared responsibility between you and your cloud provider. Which category of cloud services requires the greatest security effort on your part?
CorrectIncorrect