Topic 4 Flashcards
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
- Authorization is used to identify the level of access to a resource
- Authentication is proving that users are who they say they are
- Authentication identifies whether you can read and write to a file
- Authorization is used to identify the level of access to a resource → Yes
- Authentication is proving that users are who they say they are → Yes
- Authentication identifies whether you can read and write to a file → No
What is a function of Conditional Access session controls?
A. enforcing device compliance
B. enforcing client app compliance
C. enable limited experiences, such as blocking download of sensitive information
D. prompting multi-factor authentication (MFA)
C. enable limited experiences, such as blocking download of sensitive information
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
- Azure AD Identity Protection can add users to groups based on the user’s risk level
- Azure AD Identity Protection can detect whether user credentials were leaked to the public
- Azure AD Identity Protection can be used to invoke Multi-Factor Authentication based on a user’s risk level
- Azure AD Identity Protection can add users to groups based on the user’s risk level → No
- Azure AD Identity Protection can detect whether user credentials were leaked to the public → Yes
- Azure AD Identity Protection can be used to invoke Multi-Factor Authentication based on a user’s risk level → Yes
What can you use to ensure that all the users in a specific group must use multi-factor authentication (MFA) to sign to Azure Active Directory (Azure AD)?
A. Azure Policy
B. a communication compliance policy
C. a Conditional Access policy
D. a user risk policy
C. a Conditional Access policy
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
- You can create a hybrid identity in an on-premises Active Directory that syncs to Azure AD
- User accounts created in Azure AD sync automatically to an on-premises Active Directory
- When using a hybrid model, authentication can either be done by Azure AD or by another identity provider
- You can create a hybrid identity in an on-premises Active Directory that syncs to Azure AD → Yes
- User accounts created in Azure AD sync automatically to an on-premises Active Directory → No
- When using a hybrid model, authentication can either be done by Azure AD or by another identity provider → Yes
Which three authentication methods can Azure AD users use to reset their password?
A. mobile app notification
B. text message to a phone
C. security questions
D. certificate
E. picture password
A. mobile app notification
B. text message to a phone
C. security questions
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
- Azure AD B2C enables external users to sign in by using their preferred social or enterprise account identities
- External Azure AD B2V users are managed in the same directory as users in the Azure AD organization
- Custom branding can be applied to Azure AD B2C authentication
- Azure AD B2C enables external users to sign in by using their preferred social or enterprise account identities → Yes
- External Azure AD B2V users are managed in the same directory as users in the Azure AD organization → No
- Custom branding can be applied to Azure AD B2C authentication → Yes
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
- Software tokens are an example of passwordless authentication
- Windows Hello is an example of passwordless authentication
- FIDO2 security keys are an example of passwordless authentication
- Software tokens are an example of passwordless authentication → No
- Windows Hello is an example of passwordless authentication → Yes
- FIDO2 security keys are an example of passwordless authentication → Yes
Which security feature is available in the free mode of Microsoft Defender for Cloud?
A. threat protection alerts
B. just-in-time (JIT) VM access to Azure virtual machines
C. vulnerability scanning of virtual machines
D. secure score
D. secure score
Microsoft 365 Endpoint data loss prevention (Endpoint DLP) can be used on which operating systems?
A. Windows 10 and newer only
B. Windows 10 and newer and Android only
C. Windows 10 and newer and iOS only
D. Windows 10 and newer, Android, and iOS
A. Windows 10 and newer only
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
- Microsoft Defender for Cloud can detect vulnerabilities and threats for Azure Storage
- Cloud Security Posture Management (CSPM) is available for all Azure subscriptions
- Microsoft Defender for Cloud can evaluate the security of workloads deployed to Azure or on-premises
- Microsoft Defender for Cloud can detect vulnerabilities and threats for Azure Storage → Yes
- Cloud Security Posture Management (CSPM) is available for all Azure subscriptions → Yes
- Microsoft Defender for Cloud can evaluate the security of workloads deployed to Azure or on-premises → Yes
Select the answer that correctly completes the sentence.
- Azure Active Directory (Azure AD) Password Protection
- Azure Bastion
- Azure Information Protection (AIP)
- Azure Key Vault
↘
is a cloud service for storing application secrets.
Azure Key Vault
Select the answer that correctly completes the sentence.
- Microsoft Defender for Cloud
- Azure Monitor
- Azure Security Benchmark
- Microsoft Secure Score
↘
provides cloud workload protection for Azure and hybrid cloud resources.
Microsoft Defender for Cloud
What is the maximum number of resources that Azure DDoS Protection Standard can protect without additional costs?
A. 50
B. 100
C. 500
D. 1000
B. 100
What are two reasons to deploy multiple virtual networks instead of using just one virtual network?
A. to meet governance policies
B. to connect multiple types of resources
C. to separate the resources for budgeting
D. to isolate the resources
A. to meet governance policies
D. to isolate the resources
Select the answer that correctly completes the sentence.
Microsoft Sentinel provides quick insights into data by using
↘
- Azure Logic Apps
- Azure Monitor workbook templates
- Azure Resource Graph Explorer
- playbooks
Azure Monitor workbook templates
You have an Azure subscription that contains multiple resources.
You need to assess compliance and enforce standards for the existing resources.
What should you use?
A. Azure Blueprints
B. the Anomaly Detector service
C. Microsoft Sentinel
D. Azure Policy
D. Azure Policy
Which Microsoft Defender for Cloud metric displays the overall security health of an Azure subscription?
A. secure score
B. resource health
C. completed controls
D. the status of recommendations
A. secure score
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
- You can use information barriers with Microsoft Exchange
- You can use information barriers with Microsoft SharePoint
- You can use information barriers with Microsoft Teams
- You can use information barriers with Microsoft Exchange → No
- You can use information barriers with Microsoft SharePoint → Yes
- You can use information barriers with Microsoft Teams → Yes
Select the answer that correctly completes the sentence.
Insider risk management is configured from the
↘
- Microsoft 365 admin center
- Microsoft 365 compliance center (Microsoft Purview)
- Microsoft 365 Defender portal
- Microsoft Defender for Cloud Apps portal
Microsoft 365 compliance center (Microsoft Purview)
You need to ensure repeatability when creating new resources in an Azure subscription.
What should you use?
A. Microsoft Sentinel
B. Azure Policy
C. Azure Batch
D. Azure Blueprints
D. Azure Blueprints
What is a characteristic of a sensitivity label in Microsoft 365?
A. encrypted
B. restricted to predefined categories
C. persistent
C. persistent
-Same Q as 109-
Match the Microsoft Purview Insider Risk Management workflow step to the appropriate task.
-Steps-
- Action
- Investigate
- Triage
-Answer Area-
- Review and filter alerts
- Create cases in the Case dashboard
- Send a reminder of corporate policies to users
Triage → Review and filter alerts
Investigate → Create cases in the Case dashboard
Action → Send a reminder of corporate policies to users
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
- Microsoft Purview provides sensitive data classification
- Microsoft Sentinel is a data lifecycle management solution
- Microsoft Purview can only discover data that is stored in Azure
- Microsoft Purview provides sensitive data classification → Yes
- Microsoft Sentinel is a data lifecycle management solution → No
- Microsoft Purview can only discover data that is stored in Azure → No