AZ-500 Module-3 TCS

AZ-500 Module-3 TCS

Professional Development

10 Qs

quiz-placeholder

Similar activities

IT ENGLISH: Research Project Topics - Cloud Computing

IT ENGLISH: Research Project Topics - Cloud Computing

Professional Development

10 Qs

#VamoPasCloud

#VamoPasCloud

Professional Development

10 Qs

Azure Data Fundamentals Module 2

Azure Data Fundamentals Module 2

Professional Development

10 Qs

AZ-900T0x_Module 04: Security

AZ-900T0x_Module 04: Security

Professional Development

7 Qs

Mobile Offline Sync - OutSystems

Mobile Offline Sync - OutSystems

Professional Development

10 Qs

AZ-900T0x_Module 05: Identity, governance, privacy, and complain

AZ-900T0x_Module 05: Identity, governance, privacy, and complain

Professional Development

9 Qs

Azure practice quiz 4

Azure practice quiz 4

Professional Development

10 Qs

Identidade

Identidade

Professional Development

10 Qs

AZ-500 Module-3 TCS

AZ-500 Module-3 TCS

Assessment

Quiz

Computers

Professional Development

Easy

Created by

CloudThat Technologies

Used 6+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which feature is essential for monitoring the security of Azure Container Instances (ACIs)?

Azure Monitor

Ignoring all security alerts

Disabling diagnostic logs

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What enables secure remote access to Azure VMs without exposing them to the public internet?

Azure Bastion

Direct access using public IP addresses

Unrestricted access through any internet connection

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What encryption method is recommended for securing data at rest on Azure VMs?

Manual encryption methods implemented at the application layer

Azure Disk Encryption using BitLocker or dm-crypt

Using plain text files for sensitive data storage

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What best practice secures access to Azure Container Registry (ACR)?

Public access with no authentication

Using a single, shared administrator account for all users

Integration with Microsoft Entra ID and RBAC

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How is network isolation achieved in Azure Kubernetes Service (AKS)?

Through unrestricted ingress and egress rules

By disabling network policies

Using network policies to control ingress and egress traffic

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is the purpose of Bring Your Own Key (BYOK) in Azure Key Vault?

To transfer a key from Azure Key Vault to an on-premises Hardware Security Module (HSM)

To securely transfer a key from an on-premises Hardware Security Module (HSM) outside Azure, into the HSM backing Azure Key Vault

To generate a new key in Azure Key Vault for use in an on-premises HSM

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of using Azure Key Vault to manage storage account access keys?

To limit access to the data stored in the storage account

To generate new access keys for each storage account

To manage and rotate existing access keys securely

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?