Book Image

Microsoft Azure Security Technologies Certification and Beyond

By : David Okeyode
Book Image

Microsoft Azure Security Technologies Certification and Beyond

By: David Okeyode

Overview of this book

Exam preparation for the AZ-500 means you’ll need to master all aspects of the Azure cloud platform and know how to implement them. With the help of this book, you'll gain both the knowledge and the practical skills to significantly reduce the attack surface of your Azure workloads and protect your organization from constantly evolving threats to public cloud environments like Azure. While exam preparation is one of its focuses, this book isn't just a comprehensive security guide for those looking to take the Azure Security Engineer certification exam, but also a valuable resource for those interested in securing their Azure infrastructure and keeping up with the latest updates. Complete with hands-on tutorials, projects, and self-assessment questions, this easy-to-follow guide builds a solid foundation of Azure security. You’ll not only learn about security technologies in Azure but also be able to configure and manage them. Moreover, you’ll develop a clear understanding of how to identify different attack vectors and mitigate risks. By the end of this book, you'll be well-versed with implementing multi-layered security to protect identities, networks, hosts, containers, databases, and storage in Azure – and more than ready to tackle the AZ-500.
Table of Contents (19 chapters)
1
Section 1: Implement Identity and Access Security for Azure
7
Section 2: Implement Azure Platform Protection
12
Section 3: Secure Storage, Applications, and Data

Questions

As we conclude, here is a list of questions for you to test your knowledge regarding this chapter's material. You will find the answers in the Assessments section of the Appendix:

  1. If a user fails to complete an access review before the end date and the default behavior is configured as "Take recommendations," what will happen if the user has not signed in within the past month?

    a. The user's access will be left unchanged.

    b. The user's access will be revoked and removed.

    c. The user's access will be approved and extended.

    d. The administrator will be presented with an option to revoke the user's access.

  2. If a user is made eligible for a role in PIM, which of the following statements describes what this means?

    a. It means that the user is automatically assigned to the role.

    b. It means that the user can request to be assigned the role by PIM whenever they need it to perform a task.

    c. It means that the user cannot request to be assigned...