You plan on deploying anti-malware solution to your LOB application VM via security extension. Is it possible to add the anti-malware security extension on top of the built-in Windows Defender anti-malware solution running locally on the VM?

Azure Security and Management Quiz

Quiz
•
Computers
•
Professional Development
•
Hard
Margaret Sitati
Used 1+ times
FREE Resource
30 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
TRUE
FALSE
Answer explanation
True is correct as it is possible to add the Azure VM Antimalware extension. It is to be noted that Windows Server 2016 OS has Windows Defender built-in by default which protects against malware. However, if you run the Azure VM Antimalware extension on top of Windows Defender, the extension will apply any optional configuration policies to be used by Windows Defender and that the extension will not deploy any additional antimalware services. https://docs.microsoft.com/en-us/azure/security/azure-security-antimalware
2.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Which of the following core features are available when you deploy Microsoft anti-malware for Azure applications. Select all that apply.
Real-time protection
Malware remediation
Exclusions
Anti-malware engine and platform updates
Answer explanation
All of the above are correct. When deploying Microsoft antimalware for Azure applications, some of the features are: real-time protection, malware remediation, exclusion of files, processes and drives, and automatic updates to the antimalware engine and platform. https://docs.microsoft.com/en-us/azure/security/azure-security-antimalware
3.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Which of the following is supported to create custom RBAC roles? Select all that apply.
Azure PowerShell
Azure CLI
Rest API
CMD
Answer explanation
Azure PowerShell, CLI and Rest API is correct and can be used to create custom RBAC roles in Azure. CMD is incorrect as this is not supported. https://docs.microsoft.com/en-us/azure/role-based-access-control/custom-roles
4.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
You need to provide RBAC access to a third party to manage a 'LOB-VM'. The third party should be able to restart the VM, however not be able to shut down the VM. When using Azure CLI, how should this be defined? Select all that apply.
Action: Microsoft.compute/virtualmachines/restart/action
Action: Microsoft.compute/virtualmachines/start/action
NotActions:Microsoft.compute/virtualmachines/start/action
NotAction:Microsoft.compute/virtualmachines/shutdown/action
Answer explanation
Option 1 is correct as you need to define the allowed action as restart. Option 4 is correct as you need to define the action which is not allowed, in this case it is shutdown. Option 2 is incorrect as you do not want the third party to start the VM as this is not a requirement. Option 3 is incorrect as you should make use of the shutdown parameter instead of start as you want to prohibit the shutdown of the VM, not the starting of the VM. https://docs.microsoft.com/en-us/azure/role-based-access-control/custom-roles-cli https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations
5.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Which of the following can be associated to a Network Security Group (NSG)? Select all that apply.
Subnet
Resource Group
Network Interface Card (NIC)
Virtual Network (VNet)
Answer explanation
The correct answers are:
A. Subnet
C. Network Interface Card (NIC)
Network Security Groups (NSGs) can be associated with subnets and individual network interfaces to control inbound and outbound network traffic.
Subnets: When associated with a subnet, the NSG rules apply to all resources within that subnet.
Network Interfaces: When associated with a specific network interface, the NSG rules apply only to that particular interface.
Therefore, options A and C are the correct choices.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
True or False: you can create custom service tags when making use of Network Security Groups?
TRUE
FALSE
Answer explanation
False is correct, you cannot create your own service tag or specify which IP’s are included within a tag.https://docs.microsoft.com/en-us/azure/virtual-network/security-overview#service-tags
7.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
What are two types of data store used by Azure Monitor?
Logs
Metrics
Event Hubs
Blobs
Queues
Answer explanation
Azure monitor stores data in Logs and Metrics data stores. The other answers are examples of Azure storage products. See: https://docs.microsoft.com/en-us/azure/azure-monitor/platform/data-platform
Create a free account and access millions of resources
Similar Resources on Quizizz
29 questions
1.1 and 1.2 Quiz Cyber

Quiz
•
Professional Development
31 questions
04 - Segurança

Quiz
•
Professional Development
29 questions
A+ 1102 Day 4b ITSA 2.2 Compare wireless sec protocols and Auth

Quiz
•
Professional Development
29 questions
COMPTIA ITF

Quiz
•
1st Grade - Professio...
35 questions
A+ 1102 Day 4a ITSA 2.1 Summarize security measures

Quiz
•
Professional Development
25 questions
CompTIA Security+ Certification Exam SY0-701 Practice Test 1

Quiz
•
Professional Development
30 questions
Sec+ Day 2 Cryptographic Solutions and Identity Management Quiz

Quiz
•
Professional Development
30 questions
AZ-900 - Azure Fundamentals (Module 2)

Quiz
•
Professional Development
Popular Resources on Quizizz
15 questions
Multiplication Facts

Quiz
•
4th Grade
20 questions
Math Review - Grade 6

Quiz
•
6th Grade
20 questions
math review

Quiz
•
4th Grade
5 questions
capitalization in sentences

Quiz
•
5th - 8th Grade
10 questions
Juneteenth History and Significance

Interactive video
•
5th - 8th Grade
15 questions
Adding and Subtracting Fractions

Quiz
•
5th Grade
10 questions
R2H Day One Internship Expectation Review Guidelines

Quiz
•
Professional Development
12 questions
Dividing Fractions

Quiz
•
6th Grade