Topic 1 Flashcards
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
- All Azure Active Directory (Azure AD) license editions include the same features
- You can manage an Azure Active Directory (Azure AD) tenant by using the Azure portal
- You must deploy Azure virtual machines to host an Azure Active Directory (Azure AD) tenant
- All Azure Active Directory (Azure AD) license editions include the same features → No
- You can manage an Azure Active Directory (Azure AD) tenant by using the Azure portal → Yes
- You must deploy Azure virtual machines to host an Azure Active Directory (Azure AD) tenant → No
Select the answer that correctly completes the sentence.
- Azure Blueprints
- Azure Policy
- The Microsoft Cloud Adoption Framework for Azure
- A resource lock
↘
provides best practices from Microsoft employees, partners, and customers, including tools and guidance to assist in an Azure deployment.
The Microsoft Cloud Adoption Framework for Azure
↘
provides best practices from Microsoft employees, partners, and customers, including tools and guidance to assist in an Azure deployment.
Select the answer that correctly completes the sentence.
- Customer Lockbox
- Data loss prevention (DLP)
- eDiscovery
- A resource lock
↘
is used to identify, hold, and export electronic information that might be used in an investigation.
eDiscovery
↘
is used to identify, hold, and export electronic information that might be used in an investigation.
Select the answer that correctly completes the sentence.
You can manage Microsoft Intune by using the
↘
- Azure Active Directory admin center
- Microsoft 365 compliance center
- Microsoft 365 Defender portal
- Microsoft Endpoint Manager admin center
You can manage Microsoft Intune by using the
↘
Microsoft Endpoint Manager admin center
Select the answer that correctly completes the sentence.
Federation is used to establish ______ between organizations.
↘
- multi-factor authentication (MFA)
- a trust relationship
- user account synchronization
- a VPN connection
a trust relationship
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
- Applying system updates increases an organization’s secure score in Microsoft Defender for Cloud
- The secure score in Microsoft Defender for Cloud can evaluate resources across multiple Azure subscriptions
- Enabling multi-factor authentication (MFA) increases an organization’s secure score in Microsoft Defender for Cloud
- Applying system updates increases an organization’s secure score in Microsoft Defender for Cloud → Yes
- The secure score in Microsoft Defender for Cloud can evaluate resources across multiple Azure subscriptions → Yes
- Enabling multi-factor authentication (MFA) increases an organization’s secure score in Microsoft Defender for Cloud → Yes
Which score measures an organization’s progress in completing actions that help reduce risks associated to data protection and regulatory standards?
A. Microsoft Secure Score
B. Productivity Score
C. Secure score in Azure Security Center
D. Compliance score
D. Compliance score
What do you use to provide real-time integration between Azure Sentinel and another security source?
A. Azure AD Connect
B. a Log Analytics workspace
C. Azure Information Protection
D. a connector
D. a connector
Which Microsoft portal provides information about how Microsoft cloud services comply with regulatory standard, such as International Organization for
Standardization (ISO)?
A. the Microsoft Endpoint Manager admin center
B. Azure Cost Management + Billing
C. Microsoft Service Trust Portal
D. the Azure Active Directory admin center
C. Microsoft Service Trust Portal
In the shared responsibility model for an Azure deployment, what is Microsoft solely responsible for managing?
A. the management of mobile devices
B. the permissions for the user data stored in Azure
C. the creation and management of user accounts
D. the management of the physical hardware
D. the management of the physical hardware
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
- Verify explicitly is one of the guiding principles of Zero Trust
- Assume breach is one of the guiding principles of Zero Trust
- The Zero Trust security model assumes that a firewall secures the internal network from external threats
- Verify explicitly is one of the guiding principles of Zero Trust → Yes
- Assume breach is one of the guiding principles of Zero Trust → Yes
- The Zero Trust security model assumes that a firewall secures the internal network from external threats → No
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
- Control is a key privacy principle of Microsoft
- Transparency is a key privacy principle of Microsoft
- Shared responsibility is a key privacy principle of Microsoft
- Control is a key privacy principle of Microsoft → Yes
- Transparency is a key privacy principle of Microsoft → Yes
- Shared responsibility is a key privacy principle of Microsoft → No
Select the answer that correctly completes the sentence.
- Archiving
- Compressing
- Deduplicating
- Encrypting
↘
a file makes the data in the file readable and usable to viewers that have the appropriate key.
Encrypting
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
- Digitally signing a document requires a private key
- Verifying the authenticity of a digitally signed document requires the public key of the signer
- Verifying the authenticity of a digitally signed document requires the private key of the signer
- Digitally signing a document requires a private key → Yes
- Verifying the authenticity of a digitally signed document requires the public key of the signer → Yes
- Verifying the authenticity of a digitally signed document requires the private key of the signer → No
Select the answer that correctly completes the sentence.
When users sign in to the Azure portal, they are first
↘
- assigned permissions
- authenticated
- authorized
- resolved
authenticated
Select the answer that correctly completes the sentence.
- Authentication
- Authorization
- Federation
- Single sign-on (SSO)
↘
is the process of identifying whether a signed-in user can access a specific resource.
Authorization
Select the answer that correctly completes the sentence.
- Active Directory Domain Services (AD DS)
- Active Directory forest trusts
- Azure Active Directory (Azure AD) business-to-business (B2B)
- Azure Active Directory business-to-consumer B2C (Azure AD B2C)
↘
enables collaboration with business partners from external organizations such as suppliers, partners, and vendors. External users appear as guest users in the directory.
Azure Active Directory (Azure AD) business-to-business (B2B)
In the Microsoft Cloud Adoption Framework for Azure, which two phases are addressed before the Ready phase?
A. Plan
B. Manage
C. Adopt
D. Govern
E. Define Strategy
A. Plan
E. Define Strategy
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
- In software as a service (SaaS), applying service packs to applications is the responsibility of the organization
- In infrastructure as a service (IaaS), managing the physical network is the responsibility of the cloud provider
- In all Azure cloud deployment types, managing the security of information and data is the responsibility of the organization
- In software as a service (SaaS), applying service packs to applications is the responsibility of the organization → No
- In infrastructure as a service (IaaS), managing the physical network is the responsibility of the cloud provider → Yes
- In all Azure cloud deployment types, managing the security of information and data is the responsibility of the organization → Yes
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
- Azure AD Connect can be used to implement hybrid identity
- Hybrid identity requires the implementation of two Microsoft 365 tenants
- Authentication of hybrid identifies requires the synchronization of Active Directory Domain Services (AD DS) and Azure Active Directory (Azure AD)
- Azure AD Connect can be used to implement hybrid identity → Yes
- Hybrid identity requires the implementation of two Microsoft 365 tenants → No
- Authentication of hybrid identifies requires the synchronization of Active Directory Domain Services (AD DS) and Azure Active Directory (Azure AD) → Yes
Select the answer that correctly completes the sentence.
- Azure Application Insights
- Azure Network Watcher
- Log Analytics workspaces
- Security baselines for Azure
↘
provides benchmark recommendations and guidance for protecting Azure services
Security baselines for Azure
What is an example of encryption at rest?
A. encrypting communications by using a site-to-site VPN
B. encrypting a virtual machine disk
C. accessing a website by using an encrypted HTTPS connection
D. sending an encrypted email
B. encrypting a virtual machine disk
Which three statements accurately describe the guiding principles of Zero Trust?
A. Define the perimeter by physical locations.
B. Use identity as the primary security boundary.
C. Always verify the permissions of a user explicitly.
D. Always assume that the user system can be breached.
E. Use the network as the primary security boundary.
B. Use identity as the primary security boundary.
C. Always verify the permissions of a user explicitly.
D. Always assume that the user system can be breached.
Which service should you use to view your Azure secure score? To answer, select the appropriate service in the answer area.
- Alerts
- Application Insights
- Subscriptions
- Policy
- Azure AD Connect Health
- Security Center
- Advisor
- Monitor
Security Center