Module 3 - Review Quiz Flashcards
In MS 365 platform, which service allows organizations to store user information and attributes?
Microsoft 365 Groups
Azure Active Directory
Windows Configuration Designer
Group Policy
Azure Active Directory
An organiztaion has deployed Microsoft 365 applications to all employees. Consider the shared responsibility model, who is responsible for the accounts and identities relating to these employees?
The Organization
The user of the Account
Microsoft, the SaaS Provider
There’s Shared Responsbility between an organization and Microsoft
The Organization
Which of the following measures might an organization implement as part of the Defense in-Depth Security methodoloy?
Multi-factor Authentication for all users.
Ensuring physical Security around Network perimeter.
Locating all its servers in a single physical location.
Ensuring there’s no segmenetation of your corporate Network.
Multi-factor Authentication for all users.
The human resources organization wants to ensure that stored employee data is encrypted. Which security mechanism would they use?
Encryption in Transit
Encryption at Rest
Multi-factor Authenitcation
Hashing
Encryption at Rest
Which of the following best describes the concept of data sovereignty?
Trust no one, Verify everything.
There are regulations that govern the physical locations where data can be stored and how and when it can be transferred, processed, or accessed internationally.
Data, particularly personal data, is subject to the laws and regulations of the country/region in which it is physically collected, held, and/or processed.
Data, particularly personal data, is subject to the laws and regulations of the country/region in which it is physically collected, held, and/or processed.
In which two ways does Microsoft 365 encrypt data?
In utero
At bay
At rest
In transit
At rest
In transit
_________________ is the NEW Security perimeter?
Managed devices.
Identity
Muli-factor Authentication
SaaS
Identity
Administration, Authentication, Authorization, and Auditing are the key factors of __________________________?
Security and Compliance
Azure Active Directory
Identity Infrastructure
IaaS
Identity Infrastructure
In modern Authentication, all Services - identity management, Authorization, including Authentication Services, are provided by ________________________?
A central identity provider.
Azure Active Directory
Internet Service Provider (ISP)
Azure Identity
A central identity provider.
Setting up Single-Sign-On (SSO) between multiple identity providers is called?
Republic
Domain Services
Federation
Cloud App Security Broker
Federation
You are making a purchase from an online vendor. You are required to login using your Facebook, Google, or Apple account. This is an example of what practice?
Federation
Single-Sign-On
Azure Active Directory
Active Directory
Federation
Which relationship allows federated services to access resources?
Trust Relationship
Shared Access Relationship
Claim Relationship
Trust Relationship
Authentication is the process of doing what?
Enabling Federated Services
The process of tracking user behavior.
Verifying that a user or device is who they say they are.
Verifying that a user or device is who they say they are.
Which two key areas does Microsoft Defender cover?
Threat Protection Policies
Service Health
Windows Defender Application Guard
Reports
Threat Protection Policies
Reports
Which of the two features are exclusively part of Microsoft Defender for Office 365 Plan 2?
Attack Simulator
Proactively Hunt for Threats with Advanced Hunting
Safe Links
Anti-Phishing Protection
Attack Simulator
Proactively Hunt for Threats with Advanced Hunting