This browser is no longer supported.
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.
Choose the best response for each of the questions.
Which feature is essential for monitoring the security of Azure Container Instances (ACIs)?
Azure Monitor
Ignoring all security alerts
Disabling diagnostic logs
What enables secure remote access to Azure VMs without exposing them to the public internet?
Unrestricted access through any internet connection
Azure Bastion
Direct access using public IP addresses
What best practice secures access to Azure Container Registry (ACR)?
Integration with Microsoft Entra ID and RBAC
Using a single, shared administrator account for all users
Public access with no authentication
What encryption method is recommended for securing data at rest on Azure VMs?
Using plain text files for sensitive data storage
Azure Disk Encryption using BitLocker or dm-crypt
Manual encryption methods implemented at the application layer
How is network isolation achieved in Azure Kubernetes Service (AKS)?
By disabling network policies
Through unrestricted ingress and egress rules
Using network policies to control ingress and egress traffic
You must answer all questions before checking your work.
Was this page helpful?