
Revision

Quiz
•
Computers
•
Professional Development
•
Hard

Beena Rai
FREE Resource
15 questions
Show all answers
1.
OPEN ENDED QUESTION
3 mins • 1 pt
A client wants to implement a Zero Trust security strategy that’s based on the three key principles: verify explicitly, least privilege access, and assume breach. As they consider their strategy, what elements/pillars should they account for to provide an end-to-end Zero Trust security strategy. What are examples of the types of security considerations they should contemplate for each element/pillar?
Evaluate responses using AI:
OFF
Answer explanation
Should include the six pillars: identities, devices, applications, data, infrastructure, and networks. Refer to the content to see explicit examples for each. This topic will be revisited in subsequent learning paths/modules as you further explore identity, security, and compliance
2.
OPEN ENDED QUESTION
3 mins • 1 pt
The shared responsibility identifies which security tasks are handled by the cloud provider, and which ones are dealt with by you, the customer. The responsibilities vary depending on where the workload is hosted. For each approach to hosting (on-premises datacenter, IaaS, PaaS, and SaaS) describe the types of security responsibilities that would be owned by the customer versus those of the cloud provider
Evaluate responses using AI:
OFF
Answer explanation
The responses should show that, as the customer moves from on-premises to IaaS to PaaS to SaaS, more of the responsibility shifts to the cloud provider. Importantly, the answer should also reflect that, regardless of which hosting is used, the customer always owns information and data, devices, and accounts and identities.
3.
OPEN ENDED QUESTION
3 mins • 1 pt
Defense in depth uses a layered approach to security, rather than relying on a single perimeter. What are examples of security layers and the security measures that can be taken for each layer described?
Evaluate responses using AI:
OFF
Answer explanation
Should include the layers from the training content: physical security, identity and access, perimeter, network, compute, application, and data. Refer to the training content for some examples of the types of security measures that can be applied to each.
4.
OPEN ENDED QUESTION
3 mins • 1 pt
The CIA triangle is a way to think about security trade-offs. Identify what each letter stands for and describe what they refer to.
Evaluate responses using AI:
OFF
Answer explanation
Should include the terms confidentiality, integrity, and availability. Refer to the training content for a description of what is referred to by each of these three components
5.
OPEN ENDED QUESTION
3 mins • 1 pt
Identity has become the new security perimeter. Describe what is meant by this and the drivers that have led to a shift from a traditional perimeter-based security model to establishing identity as the new security perimeter?
Evaluate responses using AI:
OFF
Answer explanation
Should include a statement that defines an identity and the drivers that have led to this concept. This should include the acceleration in number of people working from home; SaaS applications that are hosted outside of the corporate network; the use of personal devices to access corporate resources; the use of unmanaged devices by partners and customers who may need to access your corporate resources; proliferation of IoT devices―and more.
6.
OPEN ENDED QUESTION
3 mins • 1 pt
Describe the different identity types supported by Microsoft Entra and when you would use them.
Evaluate responses using AI:
OFF
Answer explanation
Should include the following identity types: user, service principal, managed identity, and device. When describing the user identity type, the response should include the different external identities supported by Microsoft Entra (B2B and B2C). The response should reference the point that a service principal is like an identity for an application. For a managed identity, there should be reference to system-assigned and user-assigned and some of the differences. For a device identity type, there should be reference to the multiple options for getting devices into Microsoft Entra.
7.
OPEN ENDED QUESTION
3 mins • 1 pt
You friends just started a small business and are using a free tier of Microsoft Entra ID. They want to increase security but don’t know where to start and are on a very limited budget. They know that you just received your Microsoft Security, Compliance, and Identity Fundamentals certification, so they reach out for some guidance. What would you suggest and why?
Evaluate responses using AI:
OFF
Answer explanation
Should include a statement about security defaults in Microsoft Entra, and some of its features, including enforcing multifactor authentication registration for all users. Additionally, the answer should state that security defaults are available as part of the free tier of Microsoft Entra.
Create a free account and access millions of resources
Similar Resources on Wayground
12 questions
Quiz sobre Serviços de Rede do Azure

Quiz
•
Professional Development
15 questions
Quiz BSDP Petugas IT Batch 2

Quiz
•
Professional Development
20 questions
MS-102 ADMINISTRATOR MICROSOFT 365

Quiz
•
Professional Development
12 questions
Microsoft Edge Review

Quiz
•
Professional Development
10 questions
IT ENGLISH: Research Project Topics - MS Visual Studio

Quiz
•
Professional Development
15 questions
Google Drive

Quiz
•
Professional Development
15 questions
CAMBRIDGE - A Level - IT - Network Security

Quiz
•
12th Grade - Professi...
20 questions
Compliance

Quiz
•
Professional Development
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
10 questions
UPDATED FOREST Kindness 9-22

Lesson
•
9th - 12th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
20 questions
US Constitution Quiz

Quiz
•
11th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade