The skill “2.4. Describe Azure Identity, Access, and Security” focuses on the Azure services related to identity and access management, as well as security. These services enable users to manage access to Azure resources and applications, as well as to secure their data and applications in the cloud.
Understanding Azure Identity, Access, and Security services is essential for anyone working with Azure infrastructure and services. These services provide a range of tools and capabilities that enable users to manage access to resources, secure their data, and protect their applications from threats.
0 of 82 Questions completed
Questions:
You have already completed the skill exam before. Hence you can not start it again.
Skill Exam is loading…
You must sign in or sign up to start the skill exam.
You must first complete the following:
0 of 82 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
You can change the Azure AD tenant to which an Azure subscription is associated.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Identities stored in on-premises AD can be synchronized to AAD.
To complete the sentence, select the appropriate option in the answer area.
Your company implements xxxxxxx automatically add a watermark to Microsoft Word documents that contain credit card information.
A company that has numerous divisions is planning to deploy an Azure environment. The company would like each division’s option to pay for the Azure services it utilizes, not be the same. You have been asked to recommend a solution to meet the requirements.
Solution: You recommend that an Azure policy be created for each division.
Does the solution meet the goal?
You sign up for Azure Active Directory (Azure AD) Premium. You need to add a user named admin1@contoso.com as an administrator on all the computers that will be joined to the Azure AD domain.
What should you configure in Azure AD?
Your company plans to automate the deployment of servers to Azure. Your manager is concerned that you may expose administrative credentials during the deployment. You need to recommend an Azure solution that encrypts the administrative credentials during the deployment. What should you include in the recommendation?
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Identities stored in aad, third-party cloud services and on-premises AD can be used to access Azure resources.
To complete the sentence, select the appropriate option in the answer area.
You have an Azure virtual network named VNET1 in a resource group called RG1. You assign the Azure policy definition of Not Allowed Resource type and specify that virtual networks are not an allowed resource type in RG1.
VNET1 xxxx
A company that has numerous divisions is planning to deploy an Azure environment. The company would like each division’s option to pay for the Azure services it utilizes, not be the same. You have been asked to recommend a solution to meet the requirements.
Solution: You recommend that a subscription be created for each division.
Does the solution meet the goal?
Your company has an Azure subscription that contains resources in several regions. You need to ensure that administrators can only create resources in those regions.
What should you use?
Which Azure service should you use to store certificates?
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Azure has built-in authentication and authorization services that provide secure access to Azure resources.
Your company has an Azure subscription that contains resources in several regions. A company policy states that administrators must only be allowed to create additional Azure resources in a region in the country where their office is located. You need to create the Azure resource that must be used to meet the policy requirement.
What should you create?
From Access Control (IAM), you can view which user turned off a specific virtual machine during the last 14 days.
Review the text. If it makes the statement correct, select “No change is needed”. If the statement is incorrect, select the answer choice that makes the statement correct.
Azure policies provide a common platform for deploying objects to a cloud infrastructure and for implementing consistency across the Azure environment.
Instructions: Review the underlined text. If it makes the statement correct, select “No change is needed”. If the statement is incorrect, select the answer choice that makes the statement correct.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Azure firewall will encrypt all the network traffic sent from Azure to the internet.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Azure AD requires the implementation of domain controllers on Azure virtual machines.
From Azure Cloud Shell, you can track your company’s regulatory standards and regulations, such as ISO 27001.
Review the text. If it makes the statement correct, select “No change is needed.” If the statement is incorrect, select the answer choice that makes the statement correct.
Your company implements Azure policies to automatically add a watermark to Microsoft Word documents that contain credit card information.
Review the text. If it makes the statement correct, select “No change is needed”. If the statement is incorrect, select the answer choice that makes the statement correct.
Your company uses management groups to manage resources in your Azure tenant more efficiently. User1 should be able to assign access and assign policies to management groups. You need to determine to which role-based access control (RBAC) role User1 should be added. Your solution should follow the principle of least privilege. To which role should you add User1?
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
A network security group (NSG) will encrypt all the network traffic sent from Azure to the internet.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Azure AD provides authentication services for resources hosted in Azure and Microsoft 365.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
You can create group policies in Azure AD.
From Azure Monitor, you can view which user turned off a specific virtual machine during the last 14 days.
Review the text. If it makes the statement correct, select “No change is needed”. If the statement is incorrect, select the answer choice that makes the statement correct.
You have an Azure Active Directory (Azure AD) tenant named contoso.onmicrosoft.com. The User administrator role is assigned to a user named Admin1. An external partner has a Microsoft account that uses the user1@outlook.com sign-in. Admin1 attempts to invite the external partner to sign in to the Azure AD tenant and receives the following error message:
“Unable to invite user user1@outlook.com” Generic authorization exception.”
You need to ensure that Admin1 can invite the external partner to sign in to the Azure AD tenant.
What should you do?
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Azure VMs that run Windows server 2016 can encrypt network traffic sent to the internet.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Each user account in Azure AD can be assigned only one license.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
You can join Windows 10 devices to Azure AD.
Authorization is the process of verifying a user’s credentials.
Review the text. If it makes the statement correct, select “No change is needed”. If the statement is incorrect, select the answer choice that makes the statement correct.
You have an Azure subscription linked to an Azure Active Directory tenant. The tenant includes a user account named User1. You need to ensure that User1 can assign a policy to the tenant root management group.
What should you do?
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Azure Security Center can monitor Azure Resources and on-Prem resources.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
To implement an Azure MFA solution, you must sync on-premises identities to the cloud.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
You can join Android devices to Azure AD.
An Azure service is available to all Azure customers when it is in public preview.
Review the text. If it makes the statement correct, select “No change is needed”. If the statement is incorrect, select the answer choice that makes the statement correct.
You have an Azure subscription named Subscription1 that contains an Azure virtual machine named VM1. VM1 is in a resource group named RG1. VM1 runs services that will be used to deploy resources to RG1. You need to ensure that a service running on VM1 can manage the resources in RG1 by using the identity of VM1.
What should you do first?
Match the services on the left to the correct descriptions on the right.
Authorization
|
|
Authentication
|
|
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
All Azure Security Center features are free.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Two valid methods for Azure MFA are picture identification and a passport number.
To complete the sentence, select the appropriate option in the answer area.
XXXXXX is the process of verifying a user’s credentials.
You download an Azure Resource Manager template based on an existing virtual machine. The template will be used to deploy 100 virtual machines. You need to modify the template to reference an administrative password. You must prevent the password from being stored in plain text.
What should you create to store the password? (Select two.)
Your company has an Azure Active Directory (Azure AD) subscription. You want to implement an Azure AD conditional access policy. The policy must be configured to require members of the Global Administrators group to use Multi-Factor Authentication and an Azure AD-joined device when they connect to Azure AD from untrusted locations.
Solution: You access the multi-factor authentication page to alter the user settings.
Does the solution meet the goal?
Which defense in depth layer uses distributed denial of service (DDoS) protection?
You need to configure an Azure solution that meets the following requirements:
– Secures websites from attacks
– Generates reports that contain details of attempted attacks
What should you include in the solution?
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Azure MFA can be required for administrative and non-administrative user accounts.
To complete the sentence, select the appropriate option in the answer area.
An Azzure policy initiavite is a xxxxxxx
Your company has an Azure subscription. You enable multi-factor authentication (MFA) for all users. The company’s help desk reports an increase in calls from users who receive MFA requests while they work from the company’s main office. You need to prevent the users from receiving MFA requests when they sign in from the main office.
What should you do?
Your company has an Azure Active Directory (Azure AD) subscription. You want to implement an Azure AD conditional access policy. The policy must be configured to require members of the Global Administrators group to use Multi-Factor Authentication and an Azure AD-joined device when they connect to Azure AD from untrusted locations.
Solution: You access the Azure portal to alter the session control of the Azure AD conditional access policy.
Does the solution meet the goal?
“Select the answer that correctly completes the sentence.
Single sign-on (SSO) is __________ method that enables users to sign in the first time and access various applications and resource by using same password.”
You plan to implement several security services for an Azure environment. You need to identify which Azure services must be used to meet the following security requirements:
– Monitor threats by using sensors
– Enforce Azure Multi-Factor Authentication (MFA) based on a condition
Which Azure service should you identify for each requirement? (To answer, select the appropriate options in the answer area.)
Monitor threats by using sensors:
You need to ensure that when Azure Active Directory (Azure AD) users connect to Azure AD from the Internet by using an anonymous IP address, the users are prompted automatically to change their password.
Which Azure service should you use?
To complete the sentence, select the appropriate option in the answer area.
Xxxxxxx provide organizations with the ability to manage the compliance of Azure resources across multiple subscriptions.
Your company network includes users in multiple directories. You plan to publish a software-as-a-service application named SaasApp1 to Azure Active Directory. You need to ensure that all users can access SaasApp1.
What should you do?
Which Azure Active Directory (Azure AD) feature is used to provide access to resources based on organizational policies?
You plan to implement several security services for an Azure environment. You need to identify which Azure services must be used to meet the following security requirements:
– Monitor threats by using sensors
– Enforce Azure Multi-Factor Authentication (MFA) based on a condition
Which Azure service should you identify for each requirement? (To answer, select the appropriate options in the answer area.)
Enforce Azure MFA based on a condition:
To what should an application connect to retrieve security tokens?
You have been informed by your superiors of the company’s intentions to automate server deployment to Azure. There is, however, some concern that administrative credentials could be uncovered during this process. You are required to make sure that during the deployment, the administrative credentials are encrypted using a suitable Azure solution.
Solution: You recommend the use of Azure Information Protection.
Does the solution meet the goal?
You have an Active Directory forest named contoso.com. You install and configure Azure AD Connect to use password hash synchronization as the single sign-on (SSO) method. Staging mode is enabled. You review the synchronization results and discover that the Synchronization Service Manager does not display any sync jobs. You need to ensure that the synchronization completes successfully.
What should you do?
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
In the public cloud model, only guest users at your company can access the resources in the cloud.
Your Azure environment contains multiple Azure virtual machines. You need to ensure that a virtual machine named VM1 is accessible from the Internet over HTTP.
What is a possible solution?
Your network contains an Active Directory forest. The forest contains 5,000 user accounts. Your company plans to migrate all network resources to Azure and to decommission the on-premises data center. You need to recommend a solution to minimize the impact on users after the planned migration.
What should you recommend?
Your company’s Active Directory forest includes thousands of user accounts. You have been informed that all network resources will be migrated to Azure. Thereafter, the on-premises data center will be retired. You are required to employ a strategy that reduces the effect on users, once the planned migration has been completed.
Solution: You plan to require Azure Multi-Factor Authentication (MFA).
Does the solution meet the goal?
You have an Azure Active Directory (Azure AD) tenant named contoso.onmicrosoft.com that contains 100 user accounts. You purchase 10 Azure AD Premium P2 licenses for the tenant. You need to ensure that 10 users can use all the Azure AD Premium features.
What should you do?
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
In a public cloud model, only guest users at your company can access the resources in the cloud.
To complete the sentence, select the appropriate option in the answer area.
You can enable just-in-time (JIT) VM access by using
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
You can configure the Azure AD activity logs to appear in Azure monitor.
Your company’s Active Directory forest includes thousands of user accounts. You have been informed that all network resources will be migrated to Azure. Thereafter, the on-premises data center will be retired. You are required to employ a strategy that reduces the effect on users, once the planned migration has been completed.
Solution: You plan to sync all the Active Directory user accounts to Azure Active Directory (Azure AD).
Does the solution meet the goal?
You have an Azure Active Directory (Azure AD) domain that contains 5,000 user accounts. You create a new user account named AdminUser1. You need to assign the User administrator administrative role to AdminUser1.
What should you do from the user account properties?
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
An Azure subscription can be associated to multiple Azure Active Directory tenants.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Authorization to access Azure resources can be provided only to Azure Active Directory (AAD) users.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
From Azure monitor, you can monitor resources across multiple Azure subscriptions.
Your company’s Active Directory forest includes thousands of user accounts. You have been informed that all network resources will be migrated to Azure. Thereafter, the on-premises data center will be retired. You are required to employ a strategy that reduces the effect on users, once the planned migration has been completed.
Solution: You plan to enforce password change.
Does the solution meet the goal?
You have an Azure virtual machine named VM1. You plan to encrypt VM1 by using Azure Disk Encryption.
Which Azure resource must you create first?
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
When an Azure subscription expires, the associated Azure AD tenant is deleted automatically.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Identities stored in aad, third-party cloud services and on-premises AD can be used to access Azure resources.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
From Azure Monitor, you can create alerts
You are planning to migrate a company to Azure. Each of the company’s numerous divisions will have an administrator in place to manage the Azure resources used by their respective division. You want to make sure that the Azure deployment you employ allows for Azure to be segmented for the divisions while keeping administrative effort to a minimum.
Solution: You plan to make use of several Azure Active Directory (Azure AD) directories.
Does the solution meet the goal?
A new policy has been implemented in your organization that limits access to resource groups and resource scopes in a detailed, granular way. Various groups and users will be provided access.
What would you choose to use if you want to implement the new policy?
Your company plans to migrate to Azure. The company has several departments. All the Azure resources used by each department will be managed by a department administrator.
What are two possible techniques to segment Azure for the departments? (Select two.)
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Azure has built-in authentication and authorization services that provide secure access to Azure resources.
What can Azure Information Protection encrypt?
A company that has numerous divisions is planning to deploy an Azure environment. The company would like each division’s option to pay for the Azure services it utilizes, not be the same. You have been asked to recommend a solution to meet the requirements.
Solution: You recommend that an Azure role be created for each division.
Does the solution meet the goal?
An organization wants to develop and deploy web apps, for which it subscribes to Azure as a platform. It is desired to keep the expenses to a minimum before the app is finally released. You have to identify the features available in Azure Active Directory (AD) Free edition.
Select options from below that are available in the Azure Active Directory (AD) Free edition.