Question 1
Your systems require logon by using smart cards for privileged access. What type of authentication factor this is?
Question 2
What is the primary purpose of a Security Information and Event Management (SIEM) system?
Question 3
Which of the following is a common post-exploitation technique used by attackers to maintain persistence?
Question 4
What is NOT a task of the Certifcate Authority (CA)?
Question 5
What are some of the passwordless authentication options available in Microsoft Entra ID?
Question 6
Which encryption algorithm is considered the most secure for modern TLS implementations?
Question 7
Which of the following is a common indicator of a compromised system?
Question 8
Which of the following is not a type of peer-to-peer cyber-crime?
Question 9
What is the primary purpose of a Security Information and Event Management (SIEM) system?
Question 10
Which type of malware is designed to provide unauthorized access to a computer system?
Question 11
Which protocol is mainly used to secure communications over a VPN?
Question 12
Which protocol is commonly used for secure file transfer over the internet?
Question 13
What is the primary function of Microsoft Sentinel in a security operations environment?
Question 14
What is a commonly used hashing algorithm that produces a 256-bit digest?
Question 15
What is the main advantage of using multi-factor authentication (MFA)?
Question 16
What is the purpose of a network firewall?
Question 17
What is the primary purpose of the Windows Defender Credential Guard?
Question 18
As your organizations Security Operations analyst, you need the Enterprise Administrator to grant you access to the Content search page to conduct searches, and preview and export search results. What role group membership must be assigned in the Microsoft Purview compliance portal to complete these tasks?
Question 19
What is a common way to protect sensitive data at rest?
Question 20
How can you get an at-a-glance overview of the kinds of apps are being used within your organization?