Questions
As we conclude, here is a list of questions for you to test your knowledge regarding this chapter's material. You will find the answers in the Assessments section of the Appendix:
- In the cloud in general, identities are...
A. More exposed to attacks
B. Less exposed to attacks
C. Equally exposed to attacks
- We can control password settings with…
A. Azure AD protection
B. Account protection
C. Password protection
- The best way to increase account security is to use...
A. More complex passwords
B. More frequent password changes
C. Multi-Factor authentication (MFA)
D. Passwordless sign-in methods
- You can control actions that require MFA.
A. Yes
B. No
C. Only for some actions
- Which report is not available in risk detection?
A. Users with leaked credentials
B. Impossible travel
C. Infected users
D. Infected devices
- With roles in Privileged Identity Management...