Virtualization & Storage
Database Security & Performance
Identity & Access in Azure
Key Management & Secrets
Application & Data Protection
100

This VMware feature allows a virtual machine to directly access a SAN LUN for high-performance workloads.

What is Raw Device Mapping (RDM)?

100

To protect against man-in-the-middle attacks, this Amazon Redshift parameter must be enabled.

What is require_ssl?

100

Azure AD Privileged Identity Management ensures consistency in these assignments across subscriptions.

What are role assignments?

100

his Azure service securely stores and manages cryptographic keys, secrets, and certificate

What is Azure Key Vault?

100

Azure Information Protection (AIP) uses these to classify and protect documents and emails.

What are labels?

200

This secure deletion method works by destroying encryption keys, making encrypted data unreadable.

What is Crypto-Shredding?

200

Google Cloud SQL ensures high availability by deploying databases across these.

What are multiple zones/regions?

200

This Azure security feature locks down access to VMs by requiring requests before opening ports.

What is Just-In-Time (JIT) VM Access?

200

Azure Key Vault supports controlling access to secrets using this identity service.

What is Azure Active Directory?

200

AIP protects sensitive documents by combining these two controls.

What are encryption and access policies?

300

Google Cloud Storage bucket names must follow this rule regarding letter case.

What is all lowercase letters only?

300

o boost MySQL performance in GCP, you can do this to persistent SSDs without downtime.

What is resize the SSD disk?

300

PIM helps enforce least privilege by requiring this for elevated role use.

What is just-in-time activation/approval?

300

Key Vault centralizes management to reduce reliance on this insecure practice.

What is hardcoding credentials/secrets?

300

Azure Application Gateway distributes traffic to backend VMs based on these.

What are HTTP request attributes?

400

This Azure service tier is best for rarely accessed medical imaging data like MRIs and X-rays.

What is Azure Archive Storage?

400

Redshift connections encrypted with SSL ensure protection of data during this state.

What is data in transit?

400

Azure JIT VM Access rules are created here to block or allow traffic.

What are Azure Firewalls or NSGs?

400

Keys managed in Azure Key Vault can be configured to meet this compliance requirement.

What is FIPS 140-2 compliance?

400

AIP allows admins to revoke this even after a document has been shared externally.

What is access to the document?

500

Azure JIT VM Access improves security by controlling this type of inbound activity.

What is inbound traffic to VMs?

500

This GCP feature improves MySQL responsiveness by dynamically adjusting storage throughput.

What is persistent disk resizing/tuning?

500

Azure PIM adds this type of authentication layer before role activation.

What is multi-factor authentication (MFA)?

500

Azure Key Vault allows the secure lifecycle management of secrets through this feature.

What are access policies with rotation/expiration?

500

Application Gateway provides this security benefit by acting as a web traffic load balancer.

What is enhanced availability and protection against traffic-based attacks?