All Coursera Quiz Answers

Module quiz: Database security and monitoring Quiz Answers

In this article i am gone to share Coursera Course: Secure Your Data at Rest by Microsoft | Week 3 Quiz |  Module quiz: Database security and monitoring Quiz Answers with you..

Enrol Link:  Secure Your Data at Rest

 

Module quiz: Database security and monitoring Quiz Answers

Question 1)
As an IT security manager for a financial firm, you’re tasked with improving the security measures for your Azure SQL Databases. You’re focusing on the authentication process and want to simplify user and permission management.
Which type of authentication should you employ?

  • Contained database user authentication
  • Role-Based Access Control (RBAC)
  • SQL authentication
  • Azure Active Directory (Azure AD) authentication

Question 2)
After migrating its user database to Azure SQL, your company wants to ensure its user accounts can access all databases, not just a specific one. The database administrator (DBA) must decide where to create these accounts.
Where can user accounts be created to grant permissions across all databases?

  • User accounts can be created in the Azure Active Directory.
  • User accounts can be created in the master database.
  • User accounts can be created in any secondary database.
  • User accounts can be created in the MySQL authentication plugin.

Question 3)
You are configuring Azure AD authentication for your SQL Database and want to use Azure AD-integrated authentication.
How do you authenticate to the SQL Database using Azure AD-integrated authentication?

  • Enter the Azure AD username and password in the Connect to Server dialog and select Azure Active Directory – Password.
  • Select Azure Active Directory – Integrated in the Authentication box without providing a password.
  • Use the SQL Server Authentication method and provide your Azure AD username and password.
  • Choose Windows Authentication and enter your Azure AD username and password.

Question 4)
EasyShop has implemented server-level IP firewall rules to secure its Azure SQL Database. They want to know what level of access these rules grant to clients.
What level of access do server-level IP firewall rules grant clients in an Azure SQL Database?

  • Access only if the client’s IP address falls within the range specified by the database-level rule.
  • Access to specific secured databases within the SQL Database server.
  • Access to all databases within the same SQL Database server.
  • Access to all Azure-based applications.

Question 5)
Imagine you are a security administrator in a retail organization that uses Azure SQL Database to store and process sensitive customer data. To ensure the safety of your organization’s data, you want the operations occurring on the database to be stored for inspection and analysis.
Which feature of the following will allow you to store and analyze database operations, report on database activity, and detect suspicious events?

  • Vulnerability assessment
  • Azure SQL Database Auditing
  • Microsoft Defender for Identity
  • Data discovery and classification

Question 6)
Consider you a security engineer, and you plan to enable database-level auditing on a specific database and server-level auditing.
What will be the consequences for the auditing process in Azure SQL Database if you enable both?

  • Enabling auditing on the specific database applies the same auditing settings to all other databases on the server.
  • Enabling auditing on both the server and database levels results in the database being audited twice.
  • Enabling auditing on the server level disables auditing on the specific database.
  • Enabling auditing on the database will change the server-level auditing settings.

Question 7)
You are a security administrator in a healthcare organization that recently enabled advanced data security features for its Azure SQL Database. You understand the importance of data security and take the initiative to implement these features.
How can you configure advanced data security features for Azure SQL Database?

  • By enabling advanced data security at the server level
  • By enabling advanced data security at the database level
  • By enabling advanced data security at the subscription level
  • By enabling advanced data security at the table level

Question 8)
Your organization, an e-commerce company, wants to improve its security posture and adhere to regulatory standards. You are tasked with implementing Azure Data Discovery and Classification.
What are the primary benefits that Azure Data Discovery and Classification offers?

  • It reduces storage costs and optimizes resource usage.
  • It allows direct interaction with Azure Storage and Azure SQL Database.
  • It ensures business continuity and disaster recovery.
  • It enhances security, ensures compliance, improves efficiency, and reduces risk.

Question 9)
Steve is a database administrator at a financial institution. His organization uses the Azure SQL Database to store customer information. One day, Joseph receives an alert regarding a critical security breach identified in the database component. He decides to run a vulnerability scan for the Azure SQL Database.
How will the vulnerability assessment scan help him?

  • Generate audit reports
  • Improve database performance
  • Provide visibility into the security state
  • Store the database operations for analysis

Question 10)
Imagine you are a security administrator in a retail organization that uses the Azure SQL Database to store and process sensitive customer data. To ensure the safety of your organization’s data, you want the operations occurring on the database to be stored for inspection and analysis.
Which feature of the following will allow you to store and analyze database operations, report on database activity, and detect suspicious events?

  • Microsoft Defender for Identity
  • Azure SQL Database Auditing
  • Data discovery and classification
  • Vulnerability Assessment