Select the answer that correctly completes the sentence.
Applications registered in Azure Active Directory (Azure AD) are associated automatically to a
↓
- guest account
- managed identity
- service principal
- user account
service principal
Which three authentication methods does Windows Hello for Business support?
A. fingerprint
B. facial recognition
C. PIN
D. email verification
E. security question
A. fingerprint
B. facial recognition
C. PIN
Select the answer that correctly completes the sentence.
When you enable security defaults in Azure Directory (Azure AD), ________ will be enabled for all Azure AD users.
↓
- Azure AD Identity Protection
- Azure AD Privileged Identity Management (PIM)
- multi-factor authentication (MFA)
multi-factor authentication (MFA)
You have an Azure subscription.
You need to implement approval-based, time-bound role activation.
What should you use?
A. Windows Hello for Business
B. Azure Active Directory (Azure AD) Identity Protection
C. access reviews in Azure Active Directory (Azure AD)
D. Azure Active Directory (Azure AD) Privileged Identity Management (PIM)
D. Azure Active Directory (Azure AD) Privileged Identity Management (PIM)
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
When security defaults are enabled for an Azure Active Directory (Azure AD) tenant, which two requirements are enforced?
A. All users must authenticate from a registered device.
B. Administrators must always use Azure Multi-Factor Authentication (MFA).
C. Azure Multi-Factor Authentication (MFA) registration is required for all users.
D. All users must authenticate by using passwordless sign-in.
E. All users must authenticate by using Windows Hello.
B. Administrators must always use Azure Multi-Factor Authentication (MFA).
C. Azure Multi-Factor Authentication (MFA) registration is required for all users.
Which type of identity is created when you register an application with Active Directory (Azure AD)?
A. a user account
B. a user-assigned managed identity
C. a system-assigned managed identity
D. a service principal
D. a service principal
Which three tasks can be performed by using Azure Active Directory (Azure AD) Identity Protection?
A. Configure external access for partner organizations.
B. Export risk detection to third-party utilities.
C. Automate the detection and remediation of identity based-risks.
D. Investigate risks that relate to user authentication.
E. Create and automatically assign sensitivity labels to data.
C. Automate the detection and remediation of identity based-risks.
D. Investigate risks that relate to user authentication.
B. Export risk detection to third-party utilities.
Select the answer that correctly completes the sentence.
When using multi-factor authentication (MFA), a password is considered something you
↓
- are
- have
- know
- share
know
Password = know
Device / code / key = have
Biometric = you are
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Select the answer that correctly completes the sentence.
An Azure resource can use a system-assigned _________ to access Azure services.
↓
- Azure Active Directory (Azure AD) joined device
- managed identity
- service principal
- user identity
managed identity
Select the answer that correctly completes the sentence.
You can use _____ in the Microsoft 365 Defender portal to identify devices that are affected by an alert.
↓
- classifications
- incidents
- policies
- Secure score
incidents
What are two capabilities of Microsoft Defender for Endpoint?
A. automated investigation and remediation
B. transport encryption
C. shadow IT detection
D. attack surface reduction
A. automated investigation and remediation
D. attack surface reduction
Match the Azure networking service to the appropriate description.
Services
- Azure Bastion
- Azure Firewall
- Network security group (NGS)
Answer Area
- Provides Network Address Translation (NAT) services
- Provides secure and seamless Remote Desktop connectivity to Azure virtual machines
- Provides traffic filtering that can be applied to specific network interfaces on a virtual network
Select the answer that correctly completes the sentence.
Azure Sentinel
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Select the answer that correctly completes the sentence.
Incidents
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
What feature in Microsoft Defender for Endpoint provides the first line of defense against cyberthreats by reducing the attack surface?
A. automated remediation
B. automated investigation
C. advanced hunting
D. network protection
network protection
Select the answer that correctly completes the sentence.
In Microsoft Sentinel, you can automate common tasks by using
↓
- deep investigation tools
- hunting search-and-query tools
- playbooks
- workbooks
playbooks
Which two types of resources can be protected by using Azure Firewall?
A. Azure virtual machines
B. Azure Active Directory (Azure AD) users
C. Microsoft Exchange Online inboxes
D. Azure virtual networks
E. Microsoft SharePoint Online sites
A. Azure virtual machines
D. Azure virtual networks
You plan to implement a security strategy and place multiple layers of defense throughout a network infrastructure.
Which security methodology does this represent?
A. threat modeling
B. identity as the security perimeter
C. defense in depth
D. the shared responsibility model
defense in depth