FREE AZ-700 Network Security and Compliance Questions and Answers

0%

Which Azure service is used to protect applications from Distributed Denial of Service (DDoS) attacks?

Correct! Wrong!

Azure DDoS Protection provides protection against DDoS attacks by detecting and mitigating high-volume attacks in real-time, protecting Azure applications and resources. It is automatically enabled for all Azure resources and offers two levels: Basic and Standard.

What principle is implemented when only the minimum permissions needed to perform a task are granted?

Correct! Wrong!

Least Privilege is a security principle where users or systems are granted only the permissions necessary to complete a specific task. This minimizes the risk of unauthorized access or malicious activities by limiting the scope of access.

Which Azure security service allows administrators to set policies for access to Azure resources based on conditions such as user location or device state?

Correct! Wrong!

Conditional Access in Azure Active Directory allows administrators to enforce policies based on conditions such as user location, device compliance, and application sensitivity. This approach helps secure access to resources by evaluating the conditions under which users are granted access.

Which Azure tool allows you to visualize network security group (NSG) rules to understand their effects on network traffic?

Correct! Wrong!

Network Watcher in Azure includes tools such as the NSG Flow Logs and the IP Flow Verify, which help visualize and troubleshoot NSG rules and their impacts on traffic flow within a VNet. It aids in security analysis and troubleshooting network connectivity issues.

In the Zero Trust security model, which of the following is a core concept?

Correct! Wrong!

Zero Trust assumes that no user or system, whether inside or outside the network, should be trusted by default. Every access request is verified as if it originates from an open or untrusted network, enhancing security by applying strict identity verification, least privilege access, and continuous monitoring.