Questions

  1. Everything in Azure is redundant and has how many copies?
    1. One
    2. Two
    3. Three
  2. Most data breaches are caused by...
    1. Brute-force attacks
    2. Leaked credentials
    3. Viruses
  3. MFA stands for...
    1. Multi-factor authentication
    2. Multi-factor authorization
    3. Multi-factor activation
  4. MFA can be configured to use:
    1. Phone calls
    2. Text messages
    3. A mobile app
    4. All of the above
  5. Azure Firewall is...
    1. Infrastructure as a Service
    2. Firewall as a Service
    3. Both
  6. Azure resources can be encrypted using...
    1. An Azure-provided key
    2. A custom key
    3. Both
  1. To use custom keys, we must use...
    1. Azure Security Center
    2. Azure Key Vault
    3. Both
  2. Azure Security Center provides...
    1. Security management
    2. Advanced threat protection
    3. Both
  3. Azure Security Center can be used to protect...

Get Hands-On Cloud Administration in Azure now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.