Azure Security
Microsoft Azure , top cloud platform, is chosen by 95% of Fortune 500 companies for its robust, flexible infrastructure supporting diverse languages and open-source technologies. Azure’s exceptional security, backed by substantial investments, is a key factor for enterprises entrusting sensitive data to the cloud. While Microsoft provides cutting-edge infrastructure, collaboration with customers is crucial for safeguarding assets. Understanding Azure security’s key aspects and leveraging Microsoft’s tools is vital for users fortifying their workloads and data in the cloud.
Take this assessment to check how good you are with Azure Security.
Click the Rewards tab for eligibility requirements.
Read the FAQs tab carefully for Instructions before beginning the assessment.
NYXPoints are used to generate the Leaderboard (coming soon). They are awarded for achieving a certain score.
- 200 nyxpoints for a passing score of 80% or more
- 300 nyxpoints for a perfect score of 100%
- Didn’t pass? You still get 30 nyxpoints for attempting the assesment
IMPORTANT instructions for taking the Assessment
- The timer starts when you click Start Assessment
- DO NOT refresh/reload the page or use the back button to navigate away from the page.
- Navigating away from the assessment page DOES NOT stop/pause the timer and the will restart the assessment when you come back to it. The answers are NOT saved.
General
- There are NO pre-requisites to take this assessment. Take this assessment even if you are completely new to Linux.
- The assessment is completely FREE.
- Preferably take it in a closed book mode.
- DO NOT copy/paste, share or upload questions elsewhere.
Eligible Rewards
300 NyxCoins*
* NyxCoins vary on score
Assessment Summary
0 of 30 Questions completed
Questions:
Information
You have already completed the assessment before. Hence you can not start it again.
Assessment is loading…
You must sign in or sign up to start the assessment.
You must first complete the following:
Results
Results
0 of 30 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 30
1. Question
What does Azure Key Vault provide for managing keys?
CorrectIncorrect -
Question 2 of 30
2. Question
Azure Active Directory B2B Collaboration enable ____________.
CorrectIncorrect -
Question 3 of 30
3. Question
What is the purpose of Azure Network Security Groups (NSG)?
CorrectIncorrect -
Question 4 of 30
4. Question
What is the primary function of Application Insights?
CorrectIncorrect -
Question 5 of 30
5. Question
What does Azure role-based access control (Azure RBAC) enable you to do?
CorrectIncorrect -
Question 6 of 30
6. Question
What are the two major advantages of Web Server Diagnostics for App Service web apps?
CorrectIncorrect -
Question 7 of 30
7. Question
What is the purpose of implementing a Defence-in-depth strategy?
CorrectIncorrect -
Question 8 of 30
8. Question
The Web Application Firewall (WAF) in Azure Application Gateway protects against ______________.
CorrectIncorrect -
Question 9 of 30
9. Question
What does Azure Confidential Computing provide?
CorrectIncorrect -
Question 10 of 30
10. Question
Which layer of defense is responsible for securing access to virtual machines?
CorrectIncorrect -
Question 11 of 30
11. Question
What does Azure Disk Encryption do for Linux and Windows VMs?
CorrectIncorrect -
Question 12 of 30
12. Question
How does Azure Monitor contribute to security?
CorrectIncorrect -
Question 13 of 30
13. Question
What does Integrated identity management (hybrid identity) allow you to do?
CorrectIncorrect -
Question 14 of 30
14. Question
Which Azure service provides threat protection for cloud workloads running in Azure?
CorrectIncorrect -
Question 15 of 30
15. Question
What does SQL VM TDE stand for?
CorrectIncorrect -
Question 16 of 30
16. Question
How does Azure Disk Encryption secure virtual machine disks?
CorrectIncorrect -
Question 17 of 30
17. Question
Which Azure feature isolates network traffic in your deployments from other Azure customers?
CorrectIncorrect -
Question 18 of 30
18. Question
Which feature of Azure Application Gateway protects web applications against common web vulnerabilities?
CorrectIncorrect -
Question 19 of 30
19. Question
What is the purpose of Forced Tunnelling in Azure network security?
CorrectIncorrect -
Question 20 of 30
20. Question
What is the primary goal of network access control in Azure?
CorrectIncorrect -
Question 21 of 30
21. Question
What does Azure Private Link allow you to do?
CorrectIncorrect -
Question 22 of 30
22. Question
Which measure is essential to prevent Remote Desktop Protocol (RDP) access from the internet?
CorrectIncorrect -
Question 23 of 30
23. Question
You are concerned about overall security in your Azure environment, not just data at rest. Which Azure feature can help you monitor, assess, and remediate security issues across your resources?
CorrectIncorrect -
Question 24 of 30
24. Question
You are a data administrator responsible for managing data in an Azure environment. You need to ensure compliance with data sovereignty regulations. What does data sovereignty refer to?
CorrectIncorrect -
Question 25 of 30
25. Question
What is the role of the Database Encryption Key (DEK) in Transparent Data Encryption (TDE)?
CorrectIncorrect -
Question 26 of 30
26. Question
What could be a potential issue if the Azure Management app ID is excluded in the Apps section of the MFA CA policy?
CorrectIncorrect -
Question 27 of 30
27. Question
What is the primary focus of the Microsoft Security Response Centre (MSRC) in terms of security monitoring?
CorrectIncorrect -
Question 28 of 30
28. Question
What additional responsibilities come with using Infrastructure as a Service (IaaS) services in Azure?
CorrectIncorrect -
Question 29 of 30
29. Question
Which Azure services have additional default encryptions in place, apart from the default encryption for Azure storage?
CorrectIncorrect -
Question 30 of 30
30. Question
For your Azure databases, you need to implement encryption to protect data at rest. Which combination of features should you use?
CorrectIncorrect