You have an Azure SQL database that contains sensitive information. You need to ensure that when sensitive information is queried by operators, the data is not fully displayed. What should you enable for the database? 1     Always Encrypted       dynamic data masking       symmetric key encryption       Transparent Data Encryption (TDE)

Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
icon
Related questions
Question

8.

You have an Azure SQL database that contains sensitive information.

You need to ensure that when sensitive information is queried by operators, the data is not fully displayed.

What should you enable for the database?

1

 

  Always Encrypted

 
 

  dynamic data masking

 
 

  symmetric key encryption

 
 

  Transparent Data Encryption (TDE)

 

9.

You have an Azure SQL Database server named Server1 that contains a database named DB1.

You create an auditing policy for DB1.

After a few weeks, you create five more databases in Server1. You then create a new auditing policy for Server1.

You notice that auditing entries for DB1 are duplicated.

You need to ensure that auditing entries for all existing and future databases are not duplicated.

What should you do?

1

 

  Configure the policy used in DB1 with the same settings as the policy on Server1.

 
 

  Configure the policy used on Server1 with the same settings as the policy in DB1.

 
 

 Create a policy for each of the five new databases.

 
 

  Disable auditing for DB1.

 

10.

You have a data connector for Microsoft Sentinel.

You need to configure the connector to collect logs from Conditional Access in Azure AD.

Which log should you connect to Microsoft Sentinel?

1

 

  activity logs

 
 

  audit logs

 
 

  provisioning logs

 
 

  sign-in logs

 

 

Save assessment

11.

You have an Azure subscription.

You need to recommend a solution that uses crawling technology of Microsoft to discover and actively scan assets within an online infrastructure. The solution must also discover new connections over time.

What should you include in the recommendation?

1

 

  a Microsoft Defender for Cloud custom initiative

 
 

  Microsoft Defender External Attack Surface Management (EASM)

 
 

  Microsoft Defender for Servers

 
 

  the Microsoft cloud security benchmark (MCSB)

 

12.

You are implementing a Microsoft Defender for SQL vulnerability assessments.

Where are the scan results stored?

1

 

  an Azure Monitor workspace

 
 

  an Azure Storage account

 
 

  Azure SQL Database

 
 

  Microsoft Sentinel

 

13.

You have an Azure subscription.

You need to implement UK OFFICIAL and UK NHS standards for the subscription.

Which Microsoft Defender for Cloud setting should you use?

1

 

  Recommendations

 
 

  Regulatory compliance

 
 

  Security Posture

 
 

  Workload protections

 

14.

You have an Azure subscription that contains two Azure Key Vault resources.

You need to ensure that all the secrets in any key vault in the subscription meet the following requirements:

Secrets can be active for up to 365 days.
Secrets must have an expiration date set.
Secrets must have a content type set.
The solution must minimize administrative effort.

What should you do?

1

 

 Create custom policies for Key Vault secrets and link an initiative to the Key Vault resources.

 
 

  Create custom policies for Key Vault secrets and link an initiative to the subscription.

 
 

  Use built-in policies and link an initiative to the Key Vault resources.

 
 

  Use built-in policies and link an initiative to the subscription.

 

15.

You have a storage account that contains multiple containers, blobs, queues, and tables.

You need to create a key to allow an application to access only data from a given table in the storage account.

Which authentication method should you use for the application?

1

 

  SAS

 
 

  shared

 
 

  service SAS

 
 

  user delegation SAS 

 

 

Expert Solution
steps

Step by step

Solved in 4 steps

Blurred answer
Knowledge Booster
Windows
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
Recommended textbooks for you
Database System Concepts
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education