7: Implement secure Azure solutions
22 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What types of containers does Azure Key Vault service support?

  • Vaults and software containers
  • Software and hardware containers
  • HSM pools and software keys
  • Vaults and managed HSM pools (correct)

What does the Premium tier of Azure Key Vault include?

  • Management of public and private keys
  • Hardware security module(HSM)-protected keys (correct)
  • Software keys only
  • SSL/TLS certificates

What kind of information can be securely stored in Azure Key Vault?

  • User profiles and preferences
  • Public and private keys
  • Tokens, passwords, certificates, API keys, and other secrets (correct)
  • Application code and scripts

How does centralizing storage of application secrets in Azure Key Vault benefit applications?

<p>It allows control of their distribution and secure access using URIs (C)</p> Signup and view all the answers

What is used for authentication when accessing a key vault?

<p>Microsoft Entra ID (A)</p> Signup and view all the answers

When is Azure RBAC used in relation to key vaults?

<p>Dealing with the management of the vaults (D)</p> Signup and view all the answers

How can Azure Key Vault logs be managed?

<p>Logs can be secured by restricting access and deleted when no longer needed (D)</p> Signup and view all the answers

What does the Azure Key Vault Premium tier provide for hardware protection?

<p>Hardware security modules (HSMs) (C)</p> Signup and view all the answers

How is authentication done for accessing a key vault?

<p>Via Microsoft Entra ID (B)</p> Signup and view all the answers

When is Azure RBAC used in relation to key vaults?

<p>For management of the vaults (D)</p> Signup and view all the answers

How can Azure Key Vaults be configured to simplify administration of application secrets?

<p>By ensuring security information follows a life cycle and is highly available (C)</p> Signup and view all the answers

What is used to hardware-protect Azure Key Vaults in the Premium tier?

<p>Hardware security modules (HSMs) (C)</p> Signup and view all the answers

What is a secret in the context of Azure Key Vault?

<p>API keys, passwords, or certificates (A)</p> Signup and view all the answers

How many ways are there to authenticate to Azure Key Vault?

<p>Three (D)</p> Signup and view all the answers

What does Azure Key Vault enforce to protect data in transit?

<p>Transport Layer Security (TLS) protocol (A)</p> Signup and view all the answers

What does Perfect Forward Secrecy (PFS) protect connections with?

<p>Unique keys (D)</p> Signup and view all the answers

What encryption key lengths are used for connections to Azure Key Vault?

<p>RSA-based 2,048-bit (B)</p> Signup and view all the answers

What is the main purpose of Azure Key Vault?

<p>Securely storing and accessing secrets (A)</p> Signup and view all the answers

What is a vault in the context of Azure Key Vault?

<p>Logical group of secrets (A)</p> Signup and view all the answers

What is the recommended practice for using Azure Key Vault with different environments?

<p>Create a separate vault for each application in each environment (C)</p> Signup and view all the answers

How should access to Azure Key Vaults be controlled?

<p>Allow only authorized applications and users (C)</p> Signup and view all the answers

What is the recommended action for guarding against force deletion of a secret in Azure Key Vault?

<p>Turn on soft-delete and purge protection (C)</p> Signup and view all the answers

More Like This

7: Implement managed identities
19 questions
7 Dimensions of ABA Flashcards
14 questions
7 Functional Groups Flashcards
37 questions
Use Quizgecko on...
Browser
Browser