All Coursera Quiz Answers

Module quiz: Enable and manage Microsoft Defender for Cloud Quiz Answers

In this article i am gone to share Coursera Course: Manage Security Operations by Microsoft | Week 2 Quiz  | Module quiz: Enable and manage Microsoft Defender for Cloud Quiz Answers with you..

Enrol Link:  Manage Security Operations


Module quiz: Enable and manage Microsoft Defender for Cloud Quiz Answers

Question 1)
You are a security professional working on a software development project. You want to adopt strong security practices immediately and ensure robust defense against potential attacks. Which capability of Defender for Cloud will help you achieve these goals?

  • Safeguarding code management environments and pipelines.
  • Gaining insights into the security posture of your development environment.
  • Protecting the code, infrastructure, and runtime levels.
  • Enhancing DevOps security across multiple pipelines.

Question 2)
In your organization, you have multiple levels at which you can enable Microsoft Defender for various services. Based on the information provided, which service can be enabled at both the subscription and resource levels?

  • Microsoft Defender for SQL
  • Microsoft Defender for Servers
  • Microsoft Defender for Storage accounts
  • Microsoft Defender for open-source relational databases

Question 3)
You are responsible for deploying Defender for Servers to protect your organization’s resources. You want to ensure a smooth deployment process and understand the key stages involved. Let’s test your knowledge with the following question:
Question: Which stage of the Defender for Servers deployment process involves setting up a connector, configuring auto-provisioning settings, and deploying the necessary agents and extensions?

  • Enable Defender for Servers
  • Protect AWS/GCP machines
  • Protect on-premises servers
  • Start protecting resources

Question 4)
You are responsible for ensuring the security of your cloud solutions on Azure. As part of this responsibility, you must monitor the security baseline and its recommendations for Windows Virtual Machines. The security baseline follows the guidelines provided in the Azure Security Benchmark version 1.0. It groups the content based on the security controls defined by the benchmark and the applicable guidance for Windows Virtual Machines.
You must choose the right tool to monitor the security baseline and its recommendations. Which of the following options would you select?

  • Microsoft Defender for Cloud
  • Azure Policy definitions
  • Azure Security Benchmark
  • Windows Virtual Machines

Question 5)
You are responsible for managing the security of your organization’s cloud infrastructure. You must enable Microsoft Defender for various resources as part of your role. Let’s test your knowledge about enabling Microsoft Defender for different components in the Azure ecosystem. Where can you enable Microsoft Defender for Storage accounts? Select the correct option for the given scenario.

  • Both at the subscription and resource levels
  • Microsoft Defender cannot be enabled at the subscription level.
  • Microsoft Defender cannot be enabled at the resource level
  • Microsoft Defender cannot be enabled for Storage accounts

Question 6)
You are using the Secure score pane in Azure to review security recommendations for your resources. Some recommendations can be fixed directly from the dashboard, while others require additional steps on the resource. What can you expect when selecting a recommendation from the secure score pane in Azure?

  • You will be directed to a screen where you can migrate virtual machines to new Azure Resource Manager resources for the respective recommendation.
  • You will receive a list of affected resources that need updates and a Windows Update Services (WSUS) solution to address the issue.
  • You will receive a detailed explanation of the security risk associated with the recommendation but no specific steps for remediation.
  • You will receive a comprehensive list of steps to remediate the issue for recommendations requiring manual intervention manually.

Question 7)
Nora, a Security Engineer at a medium-scale enterprise that uses cloud services for its operations, is responsible for ensuring the security of the company’s cloud resources. The organization has recently encountered several brute-force attacks, which have resulted in a significant leak of critical confidential information. Which of the following actions should Nora take to protect against such attacks? Select all that apply.

  • Implement IT hygiene.
  • Use multifactor authentication.
  • Enable the public IP address.
  • Increase the number of login attempts.
  • Implement a Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA).

Question 8)
Anita, a security engineer at a cloud-based enterprise, recently detected a brute force attack on some virtual machines (VMs). She has decided to disable the public IP address to reduce the chances of another attack. Which of the following will be a suitably secure connection method?

  • Keeping Remote Desktop open for unrestricted access.
  • Using a private IP address.
  • Keeping the Secure Shell (SSH) port open for unrestricted access.
  • Using Azure ExpressRoute.

Question 9)
When you are enabling just-in-time (JIT) virtual machine (VM) access, you need to have the enhanced security features of ____________.

  • Azure Event Hubs
  • Azure DevOps
  • Microsoft Azure Management
  • Microsoft Defender for Cloud

Question 10)
Computer systems that interact ________ with users are considered endpoint systems.

  • Virtually
  • Indirectly
  • Directly
  • Remotely