Which one of the following should not be stored in Azure Key Vault? What are the differences between these items? Select one.

AZ-500 Part 2

Quiz
•
Professional Development
•
Professional Development
•
Hard

CloudThat Technologies
Used 18+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Key management
Secret management
Certificate management
Identity management
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of these statements best describes Azure Key Vault's authentication and authorization process? Select one.
Applications authenticate to a vault with the username and password of the lead developer and have full access to all secrets in the vault.
Applications and users authenticate to a vault with their Azure Active Directory identities and are authorized to perform actions on all secrets in the vault.
Applications authenticate to a vault with the username and password of a user that signs in to the web app, and is granted access to secrets owned by that user.
Applications and users authenticate to a vault with a Microsoft account and are authorized to access specific secrets
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
There are two types of Managed Service Identities you can create, one is System-assigned which is second type?
Application-assigned
Database-assigned
VM-assigned
User-assigned
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You are configuring Secure transfer required. Your Compliance office wants to more about this feature. You provide all the following information, except? Select one.
Requests to storage can be HTTPS or HTTP.
Requests to storage must be SMB with encryption
Azure storage doesn't support HTTPS for custom domain names
By default, new storage accounts have secure transfer required enabled.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Your SQL database administrator has recently read about SQL injection attacks. They ask you what can be done to minimize the risk of this type of attack. You suggest implementing which of the following features?
Advanced Threat Protection
Data Discovery and Classification
Dynamic Data Masking
Transparent Data Encryption
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You can query Log Analytics workspace with which of the following? Select one.
Embedded SQL
Graph API
Kusto Query Language
Contextual Query Language
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You want to be notified when any virtual machine in the production resource group is deleted. What should you configure? Select one.
Log alert
Metric alert
Activity log alert
Application alert
Create a free account and access millions of resources
Similar Resources on Quizizz
15 questions
Azure Test

Quiz
•
Professional Development
9 questions
#2 BMP Italy: May´s take-aways

Quiz
•
Professional Development
10 questions
Konser 4

Quiz
•
Professional Development
10 questions
AZ-104

Quiz
•
Professional Development
13 questions
AZ-900

Quiz
•
Professional Development
10 questions
Network Security 2

Quiz
•
Professional Development
15 questions
Labsit AZ900 - 2º Simulado

Quiz
•
Professional Development
9 questions
Evaluación | Temas Azure

Quiz
•
Professional Development
Popular Resources on Quizizz
15 questions
Multiplication Facts

Quiz
•
4th Grade
25 questions
SS Combined Advisory Quiz

Quiz
•
6th - 8th Grade
40 questions
Week 4 Student In Class Practice Set

Quiz
•
9th - 12th Grade
40 questions
SOL: ILE DNA Tech, Gen, Evol 2025

Quiz
•
9th - 12th Grade
20 questions
NC Universities (R2H)

Quiz
•
9th - 12th Grade
15 questions
June Review Quiz

Quiz
•
Professional Development
20 questions
Congruent and Similar Triangles

Quiz
•
8th Grade
25 questions
Triangle Inequalities

Quiz
•
10th - 12th Grade