Question 1
Which Azure service provides centralized security posture management and threat protection recommendations across Azure resources?
Question 2
Which of the following statements is correct about the firewall?
Question 3
Which type of malware disguises itself as legitimate software?
Question 4
In Microsoft Active Directory, which attack techniques specifically target Kerberos authentication?
Question 5
Which practices together best illustrate a defense in depth approach for a web application?
Question 6
What is the main goal of phishing?
Question 7
Which are examples of applying the principle of least privilege to human service identities?
Question 8
What is the most secure way to allow an Azure VM to access an Azure Key Vault secret without storing credentials on the VM?
Question 9
What are effective controls for reducing the impact of ransomware in enterprise environments?
Question 10
Which Azure service is a cloud-native SIEM and SOAR solution?
Question 11
The private communication of individuals and organizations is protected online by cryptography. Existing public-key cryptography (also known as asymmetric cryptography) is based on the difficulty of factoring and the difficulty of calculating elliptic curve discrete logarithms. It is expected that in the near furture these two problems will be readily and efficiently solved by what type of computing power?
Question 12
What is the primary purpose of a Security Information and Event Management (SIEM) system?
Question 13
Microsoft's ongoing commitment to help organizations stay ahead of evolving cybersecurity threats and prepare for the era of Post-Quantum Cryptography algorithms are made generally available with the release of which Windows Server version?
Question 14
What is a “Brute-Force Attack”?
Question 15
In AWS, which service records API calls for auditing?
Question 16
The TLS/SSL protocols secure an individual connection between a client and a server, at what layer of the OSI (Open Systems Interconnection) model are TLS/SSL situated?
Question 17
What does the Zero Trust security model assume?
Question 18
Which steps form a solid foundation for incident detection and response in an enterprise?
Question 19
You need to ensure Azure Storage accounts are not publicly accessible over the internet. Which control best enforces this at scale?
Question 20
Which AWS service provides centralized logging of API calls for auditing and compliance?