Design and Implement Network Security Flashcards

1
Q

What are Service Tags?

A

Service tags are used to identify groups of public IP addresses for Azure resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are Application Security Groups?

A

Application security groups are a way to tag a set of virtual machines or resources on a virtual network to be used in an NSG rule

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Microsoft Peering?

A

Microsoft peering is used to connect an on-premises network to Azure public resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a service endpoint?

A

A service endpoint is used to connect resources on a virtual network to public Azure resources over the Microsoft backbone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Azure Firewall?

A

Azure Firewall is a network virtual appliance that can inspect and block network traffic entering and leaving a virtual network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is ExpressRoute?

A

ExpressRoute is used to enable high bandwidth and private connections between Azure and on-premises.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Azure Front Door

A

Azure Front Door is used to load balance web app traffic globally.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is an Application Gateway

A

Application Gateway is used to load balance web app traffic regionally.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What Layer do Application Rules access?

A

Application rules are for L7 access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You plan to deploy Azure Front Door Web Application Firewall (WAF).

You need to configure WAF to use a feature that is often updated. The solution must meet the following requirements:

Contains the latest security rules.
Detects the latest threats.
Minimizes false positives.

What should you use?

A

The Microsoft Threat Intelligence Collection is part of managed rules, which are often updated by Microsoft and are part of Azure Front Door Premium. No other options meet the requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Azure Bastion requirements

A

The Bastion host is deployed in the virtual network that contains the AzureBastionSubnet subnet that has a minimum /26 prefix.
The user connects to the Azure portal using any HTML5 browser.
The user selects the virtual machine to connect to.
With a single click, the RDP/SSH session opens in the browser.
No public IP is required on the Azure VM.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Private IP ranges

A

Class A: 10.0. 0.0 to 10.255. 255.255.
Class B: 172.16. 0.0 to 172.31. 255.255.
Class C: 192.168. 0.0 to 192.168. 255.255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

NS-1: Establish network segmentation boundaries

A

Security Principle: Ensure that your virtual network deployment aligns to your enterprise segmentation strategy defined in the GS-2 security control. Any workload that could incur higher risk for the organization should be in isolated virtual networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

NS-2: Secure cloud services with network controls

A

Security Principle: Secure cloud services by establishing a private access point for the resources. You should also disable or restrict access from public network when possible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

NS-3: Deploy firewall at the edge of enterprise network

A

Security Principle: Deploy a firewall to perform advanced filtering on network traffic to and from external networks. You can also use firewalls between internal segments to support a segmentation strategy. If required, use custom routes for your subnet to override the system route when you need to force the network traffic to go through a network appliance for security control purpose.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

NS-4: Deploy intrusion detection/intrusion prevention systems (IDS/IPS)

A

Security Principle: Use network intrusion detection and intrusion prevention systems (IDS/IPS) to inspect the network and payload traffic to or from your workload. Ensure that IDS/IPS is always tuned to provide high-quality alerts to your SIEM solution.

17
Q

NS-5: Deploy DDOS protection

A

Security Principle: Deploy distributed denial of service (DDoS) protection to protect your network and applications from attacks.

18
Q

NS-6: Deploy web application firewall

A

Security Principle: Deploy a web application firewall (WAF) and configure the appropriate rules to protect your web applications and APIs from application-specific attacks.

19
Q

NS-7: Simplify network security configuration

A

Security Principle: When managing a complex network environment, use tools to simplify, centralize and enhance the network security management.

20
Q

NS-8: Detect and disable insecure services and protocols

A

Security Principle: Detect and disable insecure services and protocols at the OS, application, or software package layer. Deploy compensating controls if disabling insecure services and protocols are not possible.

21
Q

NS-9: Connect on-premises or cloud network privately

A

Security Principle: Use private connections for secure communication between different networks, such as cloud service provider datacenters and on-premises infrastructure in a colocation environment.

22
Q

NS-10: Ensure Domain Name System (DNS) security

A

Security Principle: Ensure that Domain Name System (DNS) security configuration protects against known risks:

Use trusted authoritative and recursive DNS services across your cloud environment to ensure the client (such as operating systems and applications) receive the correct resolution result.
Separate the public and private DNS resolution so the DNS resolution process for the private network can be isolated from the public network.
Ensure your DNS security strategy also includes mitigations against common attacks, such as dangling DNS, DNS amplifications attacks, DNS poisoning and spoofing, and so on.

23
Q

Control

A

A control is a high-level description of a feature or activity that needs to be addressed and is not specific to a technology or implementation.

24
Q

Baseline

A

A baseline is the implementation of the control on the individual Azure services. Each organization dictates a benchmark recommendation and corresponding configurations are needed in Azure. Note: Today we have service baselines available only for Azure.

25
Q

Mitigate the threat

A

Provides manual remediation steps for this security alert.

26
Q

Prevent future attacks

A

Provides security recommendations to help reduce the attack surface, increase security posture, and thus prevent future attacks.

27
Q

Trigger automated response

A

Provides the option to trigger a logic app as a response to this security alert.

28
Q
A
29
Q
A