Topic 1 Flashcards

1
Q

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

  • All Azure Active Directory (Azure AD) license editions include the same features
  • You can manage an Azure Active Directory (Azure AD) tenant by using the Azure portal
  • You must deploy Azure virtual machines to host an Azure Active Directory (Azure AD) tenant
A
  • All Azure Active Directory (Azure AD) license editions include the same features → No
  • You can manage an Azure Active Directory (Azure AD) tenant by using the Azure portal → Yes
  • You must deploy Azure virtual machines to host an Azure Active Directory (Azure AD) tenant → No
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Select the answer that correctly completes the sentence.

  • Azure Blueprints
  • Azure Policy
  • The Microsoft Cloud Adoption Framework for Azure
  • A resource lock

    provides best practices from Microsoft employees, partners, and customers, including tools and guidance to assist in an Azure deployment.
A

The Microsoft Cloud Adoption Framework for Azure

provides best practices from Microsoft employees, partners, and customers, including tools and guidance to assist in an Azure deployment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Select the answer that correctly completes the sentence.

  • Customer Lockbox
  • Data loss prevention (DLP)
  • eDiscovery
  • A resource lock

    is used to identify, hold, and export electronic information that might be used in an investigation.
A

eDiscovery

is used to identify, hold, and export electronic information that might be used in an investigation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Select the answer that correctly completes the sentence.

You can manage Microsoft Intune by using the

- Azure Active Directory admin center
- Microsoft 365 compliance center
- Microsoft 365 Defender portal
- Microsoft Endpoint Manager admin center

A

You can manage Microsoft Intune by using the

Microsoft Endpoint Manager admin center

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Select the answer that correctly completes the sentence.

Federation is used to establish ______ between organizations.

- multi-factor authentication (MFA)
- a trust relationship
- user account synchronization
- a VPN connection

A

a trust relationship

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

  • Applying system updates increases an organization’s secure score in Microsoft Defender for Cloud
  • The secure score in Microsoft Defender for Cloud can evaluate resources across multiple Azure subscriptions
  • Enabling multi-factor authentication (MFA) increases an organization’s secure score in Microsoft Defender for Cloud
A
  • Applying system updates increases an organization’s secure score in Microsoft Defender for Cloud → Yes
  • The secure score in Microsoft Defender for Cloud can evaluate resources across multiple Azure subscriptions → Yes
  • Enabling multi-factor authentication (MFA) increases an organization’s secure score in Microsoft Defender for Cloud → Yes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which score measures an organization’s progress in completing actions that help reduce risks associated to data protection and regulatory standards?

A. Microsoft Secure Score
B. Productivity Score
C. Secure score in Azure Security Center
D. Compliance score

A

D. Compliance score

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What do you use to provide real-time integration between Azure Sentinel and another security source?

A. Azure AD Connect
B. a Log Analytics workspace
C. Azure Information Protection
D. a connector

A

D. a connector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which Microsoft portal provides information about how Microsoft cloud services comply with regulatory standard, such as International Organization for
Standardization (ISO)?

A. the Microsoft Endpoint Manager admin center
B. Azure Cost Management + Billing
C. Microsoft Service Trust Portal
D. the Azure Active Directory admin center

A

C. Microsoft Service Trust Portal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In the shared responsibility model for an Azure deployment, what is Microsoft solely responsible for managing?

A. the management of mobile devices
B. the permissions for the user data stored in Azure
C. the creation and management of user accounts
D. the management of the physical hardware

A

D. the management of the physical hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

  • Verify explicitly is one of the guiding principles of Zero Trust
  • Assume breach is one of the guiding principles of Zero Trust
  • The Zero Trust security model assumes that a firewall secures the internal network from external threats
A
  • Verify explicitly is one of the guiding principles of Zero Trust → Yes
  • Assume breach is one of the guiding principles of Zero Trust → Yes
  • The Zero Trust security model assumes that a firewall secures the internal network from external threats → No
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

  • Control is a key privacy principle of Microsoft
  • Transparency is a key privacy principle of Microsoft
  • Shared responsibility is a key privacy principle of Microsoft
A
  • Control is a key privacy principle of Microsoft → Yes
  • Transparency is a key privacy principle of Microsoft → Yes
  • Shared responsibility is a key privacy principle of Microsoft → No
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Select the answer that correctly completes the sentence.

  • Archiving
  • Compressing
  • Deduplicating
  • Encrypting

    a file makes the data in the file readable and usable to viewers that have the appropriate key.
A

Encrypting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

  • Digitally signing a document requires a private key
  • Verifying the authenticity of a digitally signed document requires the public key of the signer
  • Verifying the authenticity of a digitally signed document requires the private key of the signer
A
  • Digitally signing a document requires a private key → Yes
  • Verifying the authenticity of a digitally signed document requires the public key of the signer → Yes
  • Verifying the authenticity of a digitally signed document requires the private key of the signer → No
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Select the answer that correctly completes the sentence.

When users sign in to the Azure portal, they are first

- assigned permissions
- authenticated
- authorized
- resolved

A

authenticated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Select the answer that correctly completes the sentence.

  • Authentication
  • Authorization
  • Federation
  • Single sign-on (SSO)

    is the process of identifying whether a signed-in user can access a specific resource.
A

Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Select the answer that correctly completes the sentence.

  • Active Directory Domain Services (AD DS)
  • Active Directory forest trusts
  • Azure Active Directory (Azure AD) business-to-business (B2B)
  • Azure Active Directory business-to-consumer B2C (Azure AD B2C)

    enables collaboration with business partners from external organizations such as suppliers, partners, and vendors. External users appear as guest users in the directory.
A

Azure Active Directory (Azure AD) business-to-business (B2B)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

In the Microsoft Cloud Adoption Framework for Azure, which two phases are addressed before the Ready phase?

A. Plan
B. Manage
C. Adopt
D. Govern
E. Define Strategy

A

A. Plan
E. Define Strategy

19
Q

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

  • In software as a service (SaaS), applying service packs to applications is the responsibility of the organization
  • In infrastructure as a service (IaaS), managing the physical network is the responsibility of the cloud provider
  • In all Azure cloud deployment types, managing the security of information and data is the responsibility of the organization
A
  • In software as a service (SaaS), applying service packs to applications is the responsibility of the organization → No
  • In infrastructure as a service (IaaS), managing the physical network is the responsibility of the cloud provider → Yes
  • In all Azure cloud deployment types, managing the security of information and data is the responsibility of the organization → Yes
20
Q

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

  • Azure AD Connect can be used to implement hybrid identity
  • Hybrid identity requires the implementation of two Microsoft 365 tenants
  • Authentication of hybrid identifies requires the synchronization of Active Directory Domain Services (AD DS) and Azure Active Directory (Azure AD)
A
  • Azure AD Connect can be used to implement hybrid identity → Yes
  • Hybrid identity requires the implementation of two Microsoft 365 tenants → No
  • Authentication of hybrid identifies requires the synchronization of Active Directory Domain Services (AD DS) and Azure Active Directory (Azure AD) → Yes
21
Q

Select the answer that correctly completes the sentence.

  • Azure Application Insights
  • Azure Network Watcher
  • Log Analytics workspaces
  • Security baselines for Azure

    provides benchmark recommendations and guidance for protecting Azure services
A

Security baselines for Azure

22
Q

What is an example of encryption at rest?

A. encrypting communications by using a site-to-site VPN
B. encrypting a virtual machine disk
C. accessing a website by using an encrypted HTTPS connection
D. sending an encrypted email

A

B. encrypting a virtual machine disk

23
Q

Which three statements accurately describe the guiding principles of Zero Trust?

A. Define the perimeter by physical locations.
B. Use identity as the primary security boundary.
C. Always verify the permissions of a user explicitly.
D. Always assume that the user system can be breached.
E. Use the network as the primary security boundary.

A

B. Use identity as the primary security boundary.
C. Always verify the permissions of a user explicitly.
D. Always assume that the user system can be breached.

24
Q

Which service should you use to view your Azure secure score? To answer, select the appropriate service in the answer area.

  • Alerts
  • Application Insights
  • Subscriptions
  • Policy
  • Azure AD Connect Health
  • Security Center
  • Advisor
  • Monitor
A

Security Center

25
You are evaluating the compliance score in Compliance Manager. Match the compliance score action subcategories to the appropriate actions. Action Subcategories - Corrective - Detective - Preventative Answer Area - Encrypt data at rest - Perform a system access audit - Make configuration changes in response to a security incident
- Preventative → Encrypt data at rest - Detective → Perform a system access audit - Corrective → Make configuration changes in response to a security incident
26
Select the answer that correctly completes the sentence. Compliance Manager can be directly accessed from the ↘ - Microsoft 365 admin center - Microsoft 365 Defender portal - Microsoft 365 Compliance Center (Microsoft Purview) - Microsoft Support portal
Microsoft 365 Compliance Center (Microsoft Purview)
27
For each of the following statements, select Yes if the statement is true. Otherwise, select No. - Enabling multi-factor authentication (MFA) increases the Microsoft Secure Score - A higher Microsoft Secure Score means a lower identified risk level in the Microsoft 365 - Microsoft Secure Score measures progress in completing actions based on controls that include key regulations and standards for data protection and governance
- Enabling multi-factor authentication (MFA) increases the Microsoft Secure Score → Yes - A higher Microsoft Secure Score means a lower identified risk level in the Microsoft 365 → Yes - Microsoft Secure Score measures progress in completing actions based on controls that include key regulations and standards for data protection and governance → No
28
What can you use to provide a user with a two-hour window to complete an administrative task in Azure? A. Azure Active Directory (Azure AD) Privileged Identity Management (PIM) B. Azure Multi-Factor Authentication (MFA) C. Azure Active Directory (Azure AD) Identity Protection D. conditional access policies
A. Azure Active Directory (Azure AD) Privileged Identity Management (PIM)
29
In a hybrid identity model, what can you use to sync identities between Active Directory Domain Services (AD DS) and Azure Active Directory (Azure AD)? A. Active Directory Federation Services (AD FS) B. Microsoft Sentinel C. Azure AD Connect D. Azure AD Privileged Identity Management (PIM)
C. Azure AD Connect
30
For each of the following statements, select Yes if the statement is true. Otherwise, select No. - You can create custom roles in Azure Active Directory (Azure AD) - Global administrator is a role in Azure Active Directory (Azure AD) - An Azure Active Directory (Azure AD) user can be assigned only one role
- You can create custom roles in Azure Active Directory (Azure AD) → Yes - Global administrator is a role in Azure Active Directory (Azure AD) → Yes - An Azure Active Directory (Azure AD) user can be assigned only one role → No
31
For each of the following statements, select Yes if the statement is true. Otherwise, select No. - Azure Active Directory (Azure AD) is deployed to an on-premises environment - Azure Active Directory (Azure AD) is provided as part of a Microsoft 365 subscription - Azure Active Directory (Azure AD) is an identity and access management service
- Azure Active Directory (Azure AD) is deployed to an on-premises environment → No - Azure Active Directory (Azure AD) is provided as part of a Microsoft 365 subscription → Yes - Azure Active Directory (Azure AD) is an identity and access management service → Yes
32
Select the answer that correctly completes the sentence. With Windows Hello for Business, a user's biometric data used for authentication ↘ - is stored on an external device. - is stored on a local device only. - is stored in Azure Active Directory (Azure AD). - is replicated to all the devices designated by the user.
With Windows Hello for Business, a user's biometric data used for authentication ↘ is stored on a local device only.
33
What is the purpose of Azure Active Directory (Azure AD) Password Protection? A. to control how often users must change their passwords B. to identify devices to which users can sign in without using multi-factor authentication (MFA) C. to encrypt a password by using globally recognized encryption standards D. to prevent users from using specific words in their passwords
D. to prevent users from using specific words in their passwords
34
Which Azure Active Directory (Azure AD) feature can you use to evaluate group membership and automatically remove users that no longer require membership in a group? A. access reviews B. managed identities C. conditional access policies D. Azure AD Identity Protection
A. access reviews
35
Select the answer that correctly completes the sentence. - Multi-factor authentication (MFA) - Pass-through authentication - Password writeback - Single sign-on (SSO) ↘ requires additional verification, such as a verification code sent to a mobile phone.
Multi-factor authentication (MFA) ↘ requires additional verification, such as a verification code sent to a mobile phone.
36
For each of the following statements, select Yes if the statement is true. Otherwise, select No. - Conditional access policies can use the device state as a signal - Conditional access policies apply before first-factor authentication is complete - Conditional access policies can trigger multi-factor authentication (MFA) if a user attempts to access a specific application
- Conditional access policies can use the device state as a signal → Yes - Conditional access policies apply before first-factor authentication is complete → No - Conditional access policies can trigger multi-factor authentication (MFA) if a user attempts to access a specific application → Yes
37
Select the answer that correctly completes the sentence. - Microsoft Defender for Cloud Apps - Microsoft Defender for Endpoint - Microsoft Defender for Identity - Microsoft Defender for Office 365 ↘ is a cloud-based solution that leverages on-premises Active Directory signals to identify, detect, and investigate advanced threats.
Microsoft Defender for Identity
38
Select the answer that correctly completes the sentence. Microsoft Defender for Identity can identify advanced threats from ________ signals. ↘ - Azure Active Directory (Azure AD) - Azure AD Connect - on-premises Active Directory Domain Services (AD DS)
on-premises Active Directory Domain Services (AD DS)
39
Select the answer that correctly completes the sentence. Azure Active Directory (Azure AD) is _________ used for authentication and authorization. ↘ - an extended detection and response (XDR) system - an identity provider - a management group - a security information and event management (SIEM) system
an identity provider
40
Which Azure Active Directory (Azure AD) feature can you use to provide just-in-time (JIT) access to manage Azure resources? A. conditional access policies B. Azure AD Identity Protection C. Azure AD Privileged Identity Management (PIM) D. authentication method policies
C. Azure AD Privileged Identity Management (PIM)
41
Which three authentication methods can be used by Azure Multi-Factor Authentication (MFA)? Each correct answer presents a complete solution. A. text message (SMS) B. Microsoft Authenticator app C. email verification D. phone call E. security question
A. text message (SMS) B. Microsoft Authenticator app D. phone call
42
Which Microsoft 365 feature can you use to restrict communication and the sharing of information between members of two departments at your organization? A. sensitivity label policies B. Customer Lockbox C. information barriers D. Privileged Access Management (PAM)
C. information barriers
43
-è uscita da poco- For each of the following statements, select Yes if the statement is true. Otherwise, select No. - Conditional access policies always enforce the use of multi-factor authentication (MFA) - Conditional access policies can be used to block access to an application based on the location of the user - Conditional access policies only affect users who have Azure Active Directory (Azure AD)-joined devices
- Conditional access policies always enforce the use of multi-factor authentication (MFA) → No - Conditional access policies can be used to block access to an application based on the location of the user → Yes - Conditional access policies only affect users who have Azure Active Directory (Azure AD)-joined devices → No
44
For each of the following statements, select Yes if the statement is true. Otherwise, select No. - Conditional access policies can be applied to global administrators - Conditional access policies are evaluated before a user is authenticated - Conditional access policies can use a device platform, such as Android or iOS, as a signal
- Conditional access policies can be applied to global administrators → Yes - Conditional access policies are evaluated before a user is authenticated → No - Conditional access policies can use a device platform, such as Android or iOS, as a signal → Yes