Revision

Revision

Professional Development

15 Qs

quiz-placeholder

Similar activities

Microsoft Edge Review

Microsoft Edge Review

Professional Development

12 Qs

IT ENGLISH: Research Project Topics - MS Visual Studio

IT ENGLISH: Research Project Topics - MS Visual Studio

Professional Development

10 Qs

Google Drive

Google Drive

Professional Development

15 Qs

CAMBRIDGE - A Level - IT - Network Security

CAMBRIDGE - A Level - IT - Network Security

12th Grade - Professional Development

15 Qs

INFORMÁTICA: Quem sabe mais?

INFORMÁTICA: Quem sabe mais?

KG - Professional Development

15 Qs

Compliance

Compliance

Professional Development

20 Qs

Quiz sobre Serviços de Rede do Azure

Quiz sobre Serviços de Rede do Azure

Professional Development

12 Qs

MS-102 ADMINISTRATOR MICROSOFT 365

MS-102 ADMINISTRATOR MICROSOFT 365

Professional Development

20 Qs

Revision

Revision

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Beena Rai

FREE Resource

15 questions

Show all answers

1.

OPEN ENDED QUESTION

3 mins • 1 pt

A client wants to implement a Zero Trust security strategy that’s based on the three key principles: verify explicitly, least privilege access, and assume breach. As they consider their strategy, what elements/pillars should they account for to provide an end-to-end Zero Trust security strategy. What are examples of the types of security considerations they should contemplate for each element/pillar?

Evaluate responses using AI:

OFF

Answer explanation

Should include the six pillars: identities, devices, applications, data, infrastructure, and networks. Refer to the content to see explicit examples for each. This topic will be revisited in subsequent learning paths/modules as you further explore identity, security, and compliance

2.

OPEN ENDED QUESTION

3 mins • 1 pt

The shared responsibility identifies which security tasks are handled by the cloud provider, and which ones are dealt with by you, the customer. The responsibilities vary depending on where the workload is hosted. For each approach to hosting (on-premises datacenter, IaaS, PaaS, and SaaS) describe the types of security responsibilities that would be owned by the customer versus those of the cloud provider

Evaluate responses using AI:

OFF

Answer explanation

The responses should show that, as the customer moves from on-premises to IaaS to PaaS to SaaS, more of the responsibility shifts to the cloud provider. Importantly, the answer should also reflect that, regardless of which hosting is used, the customer always owns information and data, devices, and accounts and identities.

3.

OPEN ENDED QUESTION

3 mins • 1 pt

Defense in depth uses a layered approach to security, rather than relying on a single perimeter. What are examples of security layers and the security measures that can be taken for each layer described?

Evaluate responses using AI:

OFF

Answer explanation

Should include the layers from the training content: physical security, identity and access, perimeter, network, compute, application, and data. Refer to the training content for some examples of the types of security measures that can be applied to each.

4.

OPEN ENDED QUESTION

3 mins • 1 pt

The CIA triangle is a way to think about security trade-offs. Identify what each letter stands for and describe what they refer to.

Evaluate responses using AI:

OFF

Answer explanation

Should include the terms confidentiality, integrity, and availability. Refer to the training content for a description of what is referred to by each of these three components

5.

OPEN ENDED QUESTION

3 mins • 1 pt

Identity has become the new security perimeter. Describe what is meant by this and the drivers that have led to a shift from a traditional perimeter-based security model to establishing identity as the new security perimeter?

Evaluate responses using AI:

OFF

Answer explanation

Should include a statement that defines an identity and the drivers that have led to this concept. This should include the acceleration in number of people working from home; SaaS applications that are hosted outside of the corporate network; the use of personal devices to access corporate resources; the use of unmanaged devices by partners and customers who may need to access your corporate resources; proliferation of IoT devices―and more.

6.

OPEN ENDED QUESTION

3 mins • 1 pt

Describe the different identity types supported by Microsoft Entra and when you would use them.

Evaluate responses using AI:

OFF

Answer explanation

Should include the following identity types: user, service principal, managed identity, and device. When describing the user identity type, the response should include the different external identities supported by Microsoft Entra (B2B and B2C). The response should reference the point that a service principal is like an identity for an application. For a managed identity, there should be reference to system-assigned and user-assigned and some of the differences. For a device identity type, there should be reference to the multiple options for getting devices into Microsoft Entra.

7.

OPEN ENDED QUESTION

3 mins • 1 pt

You friends just started a small business and are using a free tier of Microsoft Entra ID. They want to increase security but don’t know where to start and are on a very limited budget. They know that you just received your Microsoft Security, Compliance, and Identity Fundamentals certification, so they reach out for some guidance. What would you suggest and why?

Evaluate responses using AI:

OFF

Answer explanation

Should include a statement about security defaults in Microsoft Entra, and some of its features, including enforcing multifactor authentication registration for all users. Additionally, the answer should state that security defaults are available as part of the free tier of Microsoft Entra.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?