7: Implement secure Azure solutions
22 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What types of containers does Azure Key Vault service support?

  • Vaults and software containers
  • Software and hardware containers
  • HSM pools and software keys
  • Vaults and managed HSM pools (correct)
  • What does the Premium tier of Azure Key Vault include?

  • Management of public and private keys
  • Hardware security module(HSM)-protected keys (correct)
  • Software keys only
  • SSL/TLS certificates
  • What kind of information can be securely stored in Azure Key Vault?

  • User profiles and preferences
  • Public and private keys
  • Tokens, passwords, certificates, API keys, and other secrets (correct)
  • Application code and scripts
  • How does centralizing storage of application secrets in Azure Key Vault benefit applications?

    <p>It allows control of their distribution and secure access using URIs</p> Signup and view all the answers

    What is used for authentication when accessing a key vault?

    <p>Microsoft Entra ID</p> Signup and view all the answers

    When is Azure RBAC used in relation to key vaults?

    <p>Dealing with the management of the vaults</p> Signup and view all the answers

    How can Azure Key Vault logs be managed?

    <p>Logs can be secured by restricting access and deleted when no longer needed</p> Signup and view all the answers

    What does the Azure Key Vault Premium tier provide for hardware protection?

    <p>Hardware security modules (HSMs)</p> Signup and view all the answers

    How is authentication done for accessing a key vault?

    <p>Via Microsoft Entra ID</p> Signup and view all the answers

    When is Azure RBAC used in relation to key vaults?

    <p>For management of the vaults</p> Signup and view all the answers

    How can Azure Key Vaults be configured to simplify administration of application secrets?

    <p>By ensuring security information follows a life cycle and is highly available</p> Signup and view all the answers

    What is used to hardware-protect Azure Key Vaults in the Premium tier?

    <p>Hardware security modules (HSMs)</p> Signup and view all the answers

    What is a secret in the context of Azure Key Vault?

    <p>API keys, passwords, or certificates</p> Signup and view all the answers

    How many ways are there to authenticate to Azure Key Vault?

    <p>Three</p> Signup and view all the answers

    What does Azure Key Vault enforce to protect data in transit?

    <p>Transport Layer Security (TLS) protocol</p> Signup and view all the answers

    What does Perfect Forward Secrecy (PFS) protect connections with?

    <p>Unique keys</p> Signup and view all the answers

    What encryption key lengths are used for connections to Azure Key Vault?

    <p>RSA-based 2,048-bit</p> Signup and view all the answers

    What is the main purpose of Azure Key Vault?

    <p>Securely storing and accessing secrets</p> Signup and view all the answers

    What is a vault in the context of Azure Key Vault?

    <p>Logical group of secrets</p> Signup and view all the answers

    What is the recommended practice for using Azure Key Vault with different environments?

    <p>Create a separate vault for each application in each environment</p> Signup and view all the answers

    How should access to Azure Key Vaults be controlled?

    <p>Allow only authorized applications and users</p> Signup and view all the answers

    What is the recommended action for guarding against force deletion of a secret in Azure Key Vault?

    <p>Turn on soft-delete and purge protection</p> Signup and view all the answers

    More Like This

    7: Implement managed identities
    19 questions
    7 Dimensions of ABA Flashcards
    14 questions
    7 Level CDC 2S071 Edit Code 8 Flashcards
    20 questions
    Use Quizgecko on...
    Browser
    Browser