All Coursera Quiz Answers

Module quiz: Azure Storage and Azure Files Quiz Answers

In this article i am gone to share Coursera Course: Secure Your Data at Rest by Microsoft | Week 2 Quiz |ย  Module quiz: Azure Storage and Azure Files Quiz Answers with you..

Enrol Link:ย  Secure Your Data at Rest

 

Module quiz: Azure Storage and Azure Files Quiz Answers

Question 1)
As an IT admin, you are tasked with implementing a method for authorizing requests to blob data. The company wants to ensure enhanced security and minimum privilege access to Azure Storage accounts.
What is the best method to achieve this requirement?

  • OAuth 2.0 token-only authorization
  • Azure Active Directory (Azure AD) authentication
  • Azure Functions authentication
  • Shared Key authorization

Question 2)
A new hire at your company, John, will be assigned some tasks involving Azure AD authorization for blob data in Azure Storage. His tasks mainly revolve around viewing and listing blob data.
Which Azure built-in role should be assigned to John to perform his tasks effectively?

  • Storage Blob Delegator
  • Storage Blob Data Owner
  • Storage Blob Data Contributor
  • Storage Blob Data Reader

Question 3)
Your client, a healthcare technology provider, is in the process of migrating their data to Azure. They want granular control over encryption and decryption for Blob storage operations.
What key management option should they use in this case?

  • Azure Disk Encryption
  • Shared Access Signature
  • Customer-provided key
  • Microsoft-managed keys

Question 4)
You are developing a cloud-native application that requires a storage solution for large amounts of unstructured data, such as images and log files, with global accessibility.
Which Azure storage service would best meet these requirements?

  • Azure Files
  • Azure Disk Storage
  • Azure Blob Storage
  • Azure Table Storage

Question 5)
John, the IT Manager at TechMed Innovations, has to ensure that all patient health data stored in Azure Blob Storage is retained for a minimum of seven years due to new healthcare industry regulations. The data should not be altered or deleted during this period.
What policy should John implement to ensure the above requirements?

  • Time-based retention policy
  • Legal hold policy
  • Azure Resource Logs
  • Azure Activity Logs

Question 6)
Maria, a Cloud Solutions Architect at TechMed Innovations, learns that the company is involved in a legal case, and she needs to ensure certain blobs remain unchanged as they may serve as crucial evidence.
What policy should Maria implement to cater to these requirements?

  • Time-based retention policy
  • Legal hold policy
  • Azure Activity Logs
  • Azure Resource Logs

Question 7)
You have been tasked with setting up Azure AD Authentication for Azure Files. You’ve completed the setup of Azure AD Domain Services.
What should be your next step?

  • Assign Azure role-based access control (RBAC) roles to users or groups
  • Sync on-premises AD with Azure AD
  • Mount the Azure File Shareโ€ฏ
  • Enable Azure AD Domain Services Authentication for Azure Files in the Azure portal

Question 8)
Your company uses an Azure storage account for storing business-critical data. You must ensure all Azure Storage REST API calls are made over HTTPS.
What happens if someone tries to make an API call over HTTP after enabling the secure transfer required setting?

  • The request will be rejected.
  • The request will be redirected to HTTPS.
  • The request will be processed normally.
  • The request will be partially processed.

Question 9)
You are configuring your Azure Storage Account and want to ensure maximum security. You have a list of security measures to consider.
Which security measure ensures secure delegated access to resources in your storage account without sharing your keys?

  • Azure Disk Encryption
  • Shared Access Signature (SAS)
  • Azure Private Link
  • Azure Active Directory

Question 10)
As part of the security configuration for your Azure Storage, you want to limit network access to trusted networks only and permit trusted Microsoft services to access the storage account.
Which of the following configurations allows you to accomplish this?

  • Setting up firewall rules and permitting trusted Microsoft services to access storage accounts
  • Using blob versioning or immutable blobs
  • Enabling Azure Disk Encryption
  • Enabling Azure Defender