Reference no: EM133268165
Assignment:
Question 1. Which of the following best describes how an Azure consumer can synchronize an on-premises directory with a cloud directory to implement centralized identity management?
- Using Azure AD Conditional Access
- Using password hash synchronization
- Using Azure AD Privileged Identity Management
- Using Azure AD Connect
Question 2. Which of the following levels of virtualization makes the virtual devices independent of the physical computer hardware and creates a massive pool of storage areas for different virtual machines running on the hardware?
- Server virtualization
- Storage device virtualization
- Fabric virtualization
- File system virtualization
Question 3. In which of the following AWS shared responsibility models does the AWS service provider take the most responsibility?
- Container services
- Abstract services
- Relational database services
- Infrastructure services
Question 4. Identify the virtualization approach in which the guest OS is not aware that it is running in a virtualized environment and sends commands to the virtual machine manager (VMM) to interact with the computer hardware.
- Para virtualization
- OS-assisted virtualization
- Full virtualization
- Hardware-assisted virtualization
Question 5. Which of the following cloud computing service provides services such as penetration testing, authentication, intrusion detection, and anti-malware?
Question 6. Which of the following best describes how a GCP user can access all service accounts in a project?
- Using user-managed keys
- Using a service-account user role
- Using a primitive role
- Using GCP-managed keys
Question 7. At which of the following levels of resource hierarchy are granted Google Cloud IAM policies inherited by all resources?
- Folder level
- Project level
- Resource level
- Organization level
Question 8. In which of the following types of virtualization approach, the guest OS adopts the functionality of para virtualization and uses the VMM for binary translation to different types of hardware resources?
- Full virtualization
- OS-assisted virtualization
- Hardware-assisted virtualization
- Hybrid virtualization
Question 9. Which of the following best describes how a user can make programmatic requests to AWS?
- Using a managed policy
- Using access levels
- Using least privileges
- Using an access key
Question 10. Identify the type of cloud computing service that offers authentication services to the subscribed enterprises and is managed by a third-party vendor to provide identity and access management services.