Questions

  1. Everything in Azure is redundant and has how many copies?
    1. One
    2. Two
    3. Three
  2. Most data breaches are caused by...
    1. Brute-force attacks
    2. Leaked credentials
    3. Viruses
  3. MFA stands for...
    1. Multi-factor authentication
    2. Multi-factor authorization
    3. Multi-factor activation
  4. MFA can be configured to use:
    1. Phone calls
    2. Text messages
    3. A mobile app
    4. All of the above
  5. Azure Firewall is...
    1. Infrastructure as a Service
    2. Firewall as a Service
    3. Both
  6. Azure resources can be encrypted using...
    1. An Azure-provided key
    2. A custom key
    3. Both
  1. To use custom keys, we must use...
    1. Azure Security Center
    2. Azure Key Vault
    3. Both
  2. Azure Security Center provides...
    1. Security management
    2. Advanced threat protection
    3. Both
  3. Azure Security Center can be used to protect...
    1. Azure resources
    2. On-premises resources
    3. Both
  4. Just-in-Time access provides...
    1. Control over management access for our VMs
    2. Live monitoring of access to VMs
    3. Both
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset