MCQs on Security and Compliance | Azure Disk Storage

Enhance your knowledge with these 30 MCQs on Security and Compliance for Azure Disk Storage. Explore disk encryption options, Role-based Access Control (RBAC), and how to monitor and audit disk activities securely.


MCQs on Security and Compliance | Azure Disk Storage

Disk Encryption Options (Encryption-at-Rest, BitLocker)

  1. What does “encryption-at-rest” refer to in the context of Azure Disk Storage?
    • a) Encryption applied when data is transmitted
    • b) Encryption of data while stored on disk
    • c) Encryption during user login
    • d) Encryption for application-level data
  2. Which of the following is a disk encryption option provided by Azure for data at rest?
    • a) BitLocker
    • b) SSL/TLS
    • c) AES-256
    • d) RSA
  3. How does BitLocker protect data on Azure disks?
    • a) By encrypting data in transit
    • b) By encrypting the entire disk volume
    • c) By preventing access to unauthorized users
    • d) By compressing disk data
  4. What is the key benefit of using encryption-at-rest in Azure Disk Storage?
    • a) It accelerates data processing
    • b) It prevents unauthorized access to data while stored
    • c) It improves application performance
    • d) It reduces network traffic
  5. Which Azure service automatically encrypts disks by default?
    • a) Azure Blob Storage
    • b) Azure Virtual Machines (VMs)
    • c) Azure Disk Storage
    • d) Azure App Services
  6. What encryption standard does Azure use for disk encryption-at-rest?
    • a) AES-128
    • b) AES-256
    • c) RSA
    • d) SHA-256
  7. What is the purpose of Azure-managed keys in disk encryption?
    • a) They help in reducing costs associated with encryption
    • b) They automatically manage encryption keys for Azure services
    • c) They offer higher encryption standards than customer-managed keys
    • d) They are used to store backups of encrypted data
  8. In Azure Disk Storage, who has control over the encryption keys when using customer-managed keys?
    • a) Azure administrators
    • b) The disk owner or organization’s security team
    • c) Microsoft
    • d) The customer’s network team
  9. Which Azure feature enables encryption of disks using customer-managed keys?
    • a) Azure Key Vault
    • b) Azure Active Directory
    • c) Azure Monitor
    • d) Azure Security Center
  10. Which type of data is protected by BitLocker in Azure?
    • a) Only application data
    • b) Only operating system data
    • c) All data on the disk, including operating system and user data
    • d) Network traffic

Role-Based Access Control (RBAC) for Disks

  1. What is Role-Based Access Control (RBAC) in Azure used for?
  • a) To assign network access to Azure services
  • b) To manage access to Azure resources based on roles
  • c) To configure encryption settings for disks
  • d) To monitor disk usage and health
  1. Which of the following is a default RBAC role in Azure for managing disk resources?
  • a) Contributor
  • b) Virtual Machine User
  • c) Storage Blob Data Owner
  • d) Owner
  1. What type of Azure RBAC role allows a user to assign disk encryption policies?
  • a) Owner
  • b) Security Admin
  • c) Contributor
  • d) Reader
  1. Which Azure RBAC role provides permissions to view disk resources but not modify them?
  • a) Contributor
  • b) Reader
  • c) Owner
  • d) Storage Blob Data Contributor
  1. How can you use RBAC to enhance disk security in Azure?
  • a) By assigning different roles to users based on the level of access needed
  • b) By encrypting disks with stronger encryption algorithms
  • c) By disabling public access to disks
  • d) By increasing the storage capacity
  1. What is a key advantage of using RBAC for disk access management in Azure?
  • a) It ensures encryption compliance for all users
  • b) It limits the number of disks in use
  • c) It allows fine-grained access control to disk resources
  • d) It speeds up disk provisioning
  1. What is the role of the “Owner” in Azure RBAC with respect to disks?
  • a) They can create and modify disks but cannot delete them
  • b) They have full access to manage, assign, and configure disks
  • c) They can only monitor disk performance
  • d) They can assign roles to other users
  1. What happens when you assign the “Reader” RBAC role to a user for disk resources?
  • a) They can edit disk settings
  • b) They can view but not modify disk configurations
  • c) They can deploy new disks
  • d) They can delete disks
  1. In Azure RBAC, what does the “Contributor” role allow a user to do with disks?
  • a) Only view disk configurations
  • b) Create, modify, and delete disks but not manage access
  • c) Assign roles to other users
  • d) Encrypt disks using customer-managed keys
  1. Which of the following actions would require the “Owner” role in Azure RBAC?
  • a) Viewing disk properties
  • b) Encrypting disk data using BitLocker
  • c) Assigning RBAC roles to other users for disk access
  • d) Monitoring disk performance metrics

Disk Auditing and Monitoring

  1. What does Azure Disk Auditing provide for monitoring disk activity?
  • a) Access to detailed logs of disk operations
  • b) Automatic backup creation
  • c) Real-time disk performance data
  • d) Alerts for storage limits
  1. Which service in Azure helps you monitor disk performance and health?
  • a) Azure Monitor
  • b) Azure Security Center
  • c) Azure Disk Analytics
  • d) Azure Key Vault
  1. What can you track with Azure Disk Auditing?
  • a) Disk usage trends over time
  • b) Access and modification of disk resources
  • c) Disk encryption keys
  • d) Virtual Machine configurations
  1. How does Azure Security Center contribute to disk security?
  • a) By providing a secure storage environment for all disks
  • b) By auditing disk activity and suggesting security improvements
  • c) By providing real-time encryption updates
  • d) By increasing disk performance
  1. What type of activity does Azure Monitor primarily track regarding disks?
  • a) Only disk encryption events
  • b) CPU usage associated with disk activity
  • c) Read/write operations, latency, and disk capacity
  • d) User login history
  1. What is the role of Azure Activity Log in disk auditing?
  • a) It tracks changes made to disk configurations and access
  • b) It monitors disk health and performance
  • c) It encrypts disks automatically
  • d) It provides disk backup functionality
  1. Which Azure tool allows setting up alerts based on disk performance?
  • a) Azure Resource Manager
  • b) Azure Alerts
  • c) Azure Activity Logs
  • d) Azure Storage Explorer
  1. What type of alerts can you set up in Azure Monitor for disk resources?
  • a) Alerts for cost overruns
  • b) Alerts for disk health and performance issues
  • c) Alerts for user access violations
  • d) Alerts for network congestion
  1. Which of the following can you monitor using Azure Disk Analytics?
  • a) Disk space usage
  • b) User login activity
  • c) Disk encryption status
  • d) Resource provisioning times
  1. Why is auditing disk activity important in a cloud environment like Azure?
  • a) To improve disk performance
  • b) To ensure security and compliance with regulations
  • c) To reduce the cost of storage
  • d) To optimize virtual machine usage

Answer Key

QnoAnswer
1b) Encryption of data while stored on disk
2a) BitLocker
3b) By encrypting the entire disk volume
4b) It prevents unauthorized access to data while stored
5c) Azure Disk Storage
6b) AES-256
7b) They automatically manage encryption keys for Azure services
8b) The disk owner or organization’s security team
9a) Azure Key Vault
10c) All data on the disk, including operating system and user data
11b) To manage access to Azure resources based on roles
12a) Contributor
13a) Owner
14b) Reader
15a) By assigning different roles to users based on the level of access needed
16c) It allows fine-grained access control to disk resources
17b) They have full access to manage, assign, and configure disks
18b) They can view but not modify disk configurations
19b) Create, modify, and delete disks but not manage access
20c) Assigning roles to other users
21a) Access to detailed logs of disk operations
22a) Azure Monitor
23b) Access and modification of disk resources
24b) By auditing disk activity and suggesting security improvements
25c) Read/write operations, latency, and disk capacity
26a) It tracks changes made to disk configurations and access
27b) Azure Alerts
28b) Alerts for disk health and performance issues
29a) Disk space usage
30b) To ensure security and compliance with regulations

Use a Blank Sheet, Note your Answers and Finally tally with our answer at last. Give Yourself Score.

X
error: Content is protected !!
Scroll to Top