You have an Azure SQL database that contains sensitive information. You need to ensure that when sensitive information is queried by operators, the data is not fully displayed. What should you enable for the database? 1     Always Encrypted       dynamic data masking       symmetric key encryption       Transparent Data Encryption (TDE)

Oracle 12c: SQL
3rd Edition
ISBN:9781305251038
Author:Joan Casteel
Publisher:Joan Casteel
Chapter7: User Creation And Management
Section: Chapter Questions
Problem 3MC
icon
Related questions
Question

8.

You have an Azure SQL database that contains sensitive information.

You need to ensure that when sensitive information is queried by operators, the data is not fully displayed.

What should you enable for the database?

1

 

  Always Encrypted

 
 

  dynamic data masking

 
 

  symmetric key encryption

 
 

  Transparent Data Encryption (TDE)

 

9.

You have an Azure SQL Database server named Server1 that contains a database named DB1.

You create an auditing policy for DB1.

After a few weeks, you create five more databases in Server1. You then create a new auditing policy for Server1.

You notice that auditing entries for DB1 are duplicated.

You need to ensure that auditing entries for all existing and future databases are not duplicated.

What should you do?

1

 

  Configure the policy used in DB1 with the same settings as the policy on Server1.

 
 

  Configure the policy used on Server1 with the same settings as the policy in DB1.

 
 

 Create a policy for each of the five new databases.

 
 

  Disable auditing for DB1.

 

10.

You have a data connector for Microsoft Sentinel.

You need to configure the connector to collect logs from Conditional Access in Azure AD.

Which log should you connect to Microsoft Sentinel?

1

 

  activity logs

 
 

  audit logs

 
 

  provisioning logs

 
 

  sign-in logs

 

 

Save assessment

11.

You have an Azure subscription.

You need to recommend a solution that uses crawling technology of Microsoft to discover and actively scan assets within an online infrastructure. The solution must also discover new connections over time.

What should you include in the recommendation?

1

 

  a Microsoft Defender for Cloud custom initiative

 
 

  Microsoft Defender External Attack Surface Management (EASM)

 
 

  Microsoft Defender for Servers

 
 

  the Microsoft cloud security benchmark (MCSB)

 

12.

You are implementing a Microsoft Defender for SQL vulnerability assessments.

Where are the scan results stored?

1

 

  an Azure Monitor workspace

 
 

  an Azure Storage account

 
 

  Azure SQL Database

 
 

  Microsoft Sentinel

 

13.

You have an Azure subscription.

You need to implement UK OFFICIAL and UK NHS standards for the subscription.

Which Microsoft Defender for Cloud setting should you use?

1

 

  Recommendations

 
 

  Regulatory compliance

 
 

  Security Posture

 
 

  Workload protections

 

14.

You have an Azure subscription that contains two Azure Key Vault resources.

You need to ensure that all the secrets in any key vault in the subscription meet the following requirements:

Secrets can be active for up to 365 days.
Secrets must have an expiration date set.
Secrets must have a content type set.
The solution must minimize administrative effort.

What should you do?

1

 

 Create custom policies for Key Vault secrets and link an initiative to the Key Vault resources.

 
 

  Create custom policies for Key Vault secrets and link an initiative to the subscription.

 
 

  Use built-in policies and link an initiative to the Key Vault resources.

 
 

  Use built-in policies and link an initiative to the subscription.

 

15.

You have a storage account that contains multiple containers, blobs, queues, and tables.

You need to create a key to allow an application to access only data from a given table in the storage account.

Which authentication method should you use for the application?

1

 

  SAS

 
 

  shared

 
 

  service SAS

 
 

  user delegation SAS 

 

 

Expert Solution
steps

Step by step

Solved in 4 steps

Blurred answer
Knowledge Booster
Windows
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Oracle 12c: SQL
Oracle 12c: SQL
Computer Science
ISBN:
9781305251038
Author:
Joan Casteel
Publisher:
Cengage Learning
A+ Guide To It Technical Support
A+ Guide To It Technical Support
Computer Science
ISBN:
9780357108291
Author:
ANDREWS, Jean.
Publisher:
Cengage,
LINUX+ AND LPIC-1 GDE.TO LINUX CERTIF.
LINUX+ AND LPIC-1 GDE.TO LINUX CERTIF.
Computer Science
ISBN:
9781337569798
Author:
ECKERT
Publisher:
CENGAGE L