WhizLabs 2 Flashcards
Your company is planning on using Azure AD Identity Protection. Does Azure AD Identity Protection generate sign in risks after the user is authenticated?
A. Yes
B. No
B. No
Explanation:
The entire purpose of Azure AD Identity Protection is to detect risks during the sign in process
So the risk detection is done during the authentication process and not after the authentication process
Your company is planning on making use of conditional access policies within Azure.
You need to ensure that only users with a Windows device can access a specific application.
Can conditional access policies be used to accomplish this requirement?
A. Yes
B. No
A. Yes
Explanation;
Conditional Access i used to control the authentication process and it can assess various signals including the device a user is attempting to access the application
Your company is planning on making use of conditional access.
Can you use conditional access to enable MFA for users that sign in via certain cloud based applications?
A. Yes
B. No
A. Yes
Explanation:
You can use conditional access to enable MFA for users that sign in via certain cloud based applications
Your company wants to start hosting resources on Azure.
When using Azure cloud, would the company be responsible for maintaining the underlying identities that would be assigned access to Azure resources?
A. yes
B. no
A. Yes
Explanation:
Here the maintenance of the underlying identities in Azure would lie with the customer.
Azure provides an option of Azure AD for storing the identities, but the final responsibility of managing the identities lies with the customer
Your company wants to start making use of Azure. They are looking at different security aspects when it comes to using Azure. Which of the following could be used for the following requirement?
Grant access to users for managing various aspects of the Azure AD tenant
A. Azure AD Identity Management
B. Azure Conditional Access
C. Azure AD Roles
D. Azure AD Connect
C. Azure AD Roles
Explanation:
You can assign various roles in Azure AD for users to manage various aspects of Azure AD
Your company wants to start making use of Azure. They are looking at different security aspects when it comes to using Azure.
Which of the following could be used for the following requirement?
Enforce MFA based on the sign in risk
A. Azure AD Identity Protection
B. Azure Conditional Access
C. Azure AD Roles
D. Azure AD Connect
A. Azure AD Identity Protection
Explanation:
In Azure AD Identity Protection, you can configure the Sign in risk policy to allow access and enforce the use of MFA
You have a set of resources in Azure. Can you add multiple delete locks for a resource in Azure?
A. Yes
B. No
A. Yes
You have a set of resources in Azure. Can you add a delete lock to a resource that already has a read only lock?
A. Yes
B. No
B. No
Explanation:
Yes this is possible
You have a set of resources in Azure. Are resource locks inherited by resources when a lock is present at the resource group level?
A. Yes
B. No
A. Yes
Explanation:
A Delete lock is placed at the resource group level. And here is has been inherited by the resources in the resource group
Which of the following is a scalable, cloud native, security information event management and security orchestration automated response solution?
A. Microsoft Sentinel
B. Microsoft Defender for Cloud
C. Azure AD
D. Azure AD Identity Protection
A. Microsoft Sentinel
Explanation:
You can use Microsoft Sentienl as a scalabl, cloud native SIEM and security orchestration automated response solution. Sentinel has the capability to ingest data from a variety of sources and perform threat monitoring of that data
Your company is currently looking at using the Azure Policy service. Can the Azure Policy service be used to check the compliance of existing resources?
A. Yes
B. No
A. Yes
Explanation:
The entire idea of the Azure Policy service is to check whether the existing resource conform to the various policy defintions
Your company is currently looking at using the Azure Policy service. Can the Azure Policy service be used to remediate issues that get detected via its compliance checks?
A. Yes
B. No
B. No
Explanation:
Some of the policies in Azure Policy has a Remediation section. This can be used to remediate issues if the resources are found to be not compliant with the policy
Your company is planning on making use of Azure Blueprints.
Can Azure Blueprints be used to create role assignments for an Azure subscription?
A. Yes
B. No
A. Yes
Explanation:
When you create an Azure Blueprint, you can create multiple artifacts as part of the Blueprint.
One of them is role assignments
Your company is planning on making use of Azure Blueprints. Can Blueprints be used to create Management groups?
A. Yes
B. No
A. Yes
Explanation:
When you create an Azure Blueprint, you can create multiple artifacts as part of the Blueprint
Which of the following provides advanced and intelligent protection of Azure and hybrid resources and workloads?
A. Microsoft Defender for Cloud
B. Azure Policies
C. Azure Blueprints
D. Azure AD
A. Microsoft Defender for Cloud
Explanation:
With Microsoft Defender, you can enable intelligent protection of your resources that are defined in Azure and also your on premises infrastructure