Compliance

Compliance

Professional Development

20 Qs

quiz-placeholder

Similar activities

machineLearning Test

machineLearning Test

Professional Development

20 Qs

Web Application Security Testing-PostTest

Web Application Security Testing-PostTest

Professional Development

18 Qs

ITSM Process

ITSM Process

Professional Development

20 Qs

BOP-1

BOP-1

University - Professional Development

15 Qs

Window Server 2016 (70-742)

Window Server 2016 (70-742)

University - Professional Development

20 Qs

From Binary To Denary Conversion - IGCSE

From Binary To Denary Conversion - IGCSE

7th Grade - Professional Development

20 Qs

Sairam Andro Workshop

Sairam Andro Workshop

Professional Development

18 Qs

Quiz on C++_1

Quiz on C++_1

Professional Development

20 Qs

Compliance

Compliance

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Beena Rai

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following are principles of the Zero Trust model?

Select all that apply.

Verify explicitly

Block access

Least privileged access

Assume breach

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The shared responsibility model identifies which security tasks are handled by the cloud provider, and which are handled by you, the customer. The responsibilities vary depending on where the workload is hosted. Which approach places more responsibility on the cloud provider?

Select the correct option.

On-premises datacenter

Infrastructure as a service (IaaS)

Software as a service (SaaS)

Platform as a service (PaaS)

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Consider the shared responsibility model―in which approach does the customer own the security tasks related with information and data, devices, and accounts and identities?

Select the correct option.

On-premises datacenter

Infrastructure as a service (IaaS) and platform as a service (PaaS)

Software as a service (SaaS)

All the above (correct answer)

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The HTTPS protocol is an example of which type of encryption?

Select the correct option.

Encryption in transit

Encryption at rest

No encryption

Hashing

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term used to describe the process for verifying the identity of an object, service, or person?

Select the correct option.

Authorization

Authentication

Auditing

Administration

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are the external identity types supported by Microsoft Entra?

Select all that apply.

B2B

B2C

Device identity

Application identity

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following verification methods can be used with Microsoft Entra multifactor authentication?

Select all that apply.

Microsoft Authenticator app

SMS

Voice call

Security questions

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?