- Everything in Azure is redundant and has how many copies?
- One
- Two
- Three
- Most data breaches are caused by...
- Brute-force attacks
- Leaked credentials
- Viruses
- MFA stands for...
- Multi-factor authentication
- Multi-factor authorization
- Multi-factor activation
- MFA can be configured to use:
- Phone calls
- Text messages
- A mobile app
- All of the above
- Azure Firewall is...
- Infrastructure as a Service
- Firewall as a Service
- Both
- Azure resources can be encrypted using...
- An Azure-provided key
- A custom key
- Both
- To use custom keys, we must use...
- Azure Security Center
- Azure Key Vault
- Both
- Azure Security Center provides...
- Security management
- Advanced threat protection
- Both
- Azure Security Center can be used to protect...
- Azure resources
- On-premises resources
- Both
- Just-in-Time access provides...
- Control over management access for our VMs
- Live monitoring of access to VMs
- Both
..................Content has been hidden....................
You can't read the all page of ebook, please click
here login for view all page.