All Coursera Quiz Answers

Module quiz: Identity protection and governance Quiz Answers

In this article i am gone to share Coursera Course: Identity Protection and Governance by Microsoft | Week 1 Quiz | Module quiz: Identity protection and governance Quiz Answers with you..

Enrol Link:ย  Identity Protection and Governance


Module quiz: Identity protection and governance Quiz Answers

Question 1)
Your organization wants to protect against identity-based risks by using Azure AD Identity Protection. How can it do so effectively?

  • Remediate and use the feedback to configure a policy
  • Configure a policy, investigate by using a report, and remediate
  • Configure an investigation policy and then remediate
  • Configure a report, remediate, and then configure a policy

Question 2)
As a security engineer, you want to analyze risks that describe authentication requests for sign-ins that probably weren’t authorized by users. Which type of risks will you analyze?

  • User risk
  • Authentication risk
  • Registration risk
  • Sign-in risk

Question 3)
Each day, Microsoft collects and analyzes trillions of anonymized signals as part of user sign-in attempts. These signals help to ___________.

  • Build patterns of good user sign-in behavior
  • Implement additional verification steps
  • Customize security measures as per user requirements
  • Secure user credentials

Question 4)
Your organization uses Azure AD for Identity Protection. To enhance security measures, it has recently implemented the multi-factor registration policy in order to _________.

  • Ensure the user goes through an additional verification step
  • Study the user’s standard behavioral patterns
  • Analyze every sign in and give it a risk score
  • Calculate the risk that the user’s identity was compromised

Question 5)
Your organization wants to add an extra layer of protection to protect its users. Toward this, you are implementing Azure AD multifactor authentication to safeguard access to data and applications while maintaining simplicity for users. Which one of its below features will help to enable this purpose?

  • It requires a challenging sign-in process
  • It delivers strong authentication through difficult-to-use authentication methods
  • It provides more security with more complexity
  • It mitigates threats with real-time monitoring and alerts

Question 6)
Imagine that you have implemented Identity Protection in your organization. You are reviewing the Risky users report. For each reported event, which of the following actions can you choose?

  • Delete the risk event
  • Confirm user compromise
  • Block user account
  • Dismiss user account

Question 7)
You work for an organization that uses Azure AD services. As a security engineer, you can use Conditional Access to enable which of the actions listed below?

Which options can you use to provide your users with a more convenient and secure authentication method?

  • Require multifactor authentication
  • Designate privileged user accounts
  • Dismiss risky user accounts
  • Block or grant access from specific time of day

Question 8)
You are about to embark on a new technology project. You want to ensure that youโ€™re engaging the right stakeholders and that stakeholder roles in the project are well understood. Which of the following steps will help you do so? Select all that apply.

  • Plan alternatives
  • Plan communication
  • Plan rollback
  • Plan a pilot
  • Plan testing
  • Plan feedback

Question 9)
You work for an organization that relies heavily on cloud-based services and mobile computing. Hence it uses the Zero Trust model, which is based on the principle of โ€œnever trust, always verify.โ€ Which of the following options illustrates this principle?

  • Identity and device health verification immediately after granting access
  • All components validated and proven trustworthy
  • Maximum blast radius and segment access
  • Unlimited lateral movement

Question 10)
As you have learned, identity management approaches have evolved over time. Enabling steps to a passwordless world are indicative of which approach?

  • Traditional identity approaches
  • Optimal identity approaches
  • Advanced identity approaches
  • Modern identity approaches