Module 3 - Review Quiz Flashcards

1
Q

In MS 365 platform, which service allows organizations to store user information and attributes?

Microsoft 365 Groups
Azure Active Directory
Windows Configuration Designer
Group Policy

A

Azure Active Directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An organiztaion has deployed Microsoft 365 applications to all employees. Consider the shared responsibility model, who is responsible for the accounts and identities relating to these employees?

The Organization
The user of the Account
Microsoft, the SaaS Provider
There’s Shared Responsbility between an organization and Microsoft

A

The Organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following measures might an organization implement as part of the Defense in-Depth Security methodoloy?

Multi-factor Authentication for all users.
Ensuring physical Security around Network perimeter.
Locating all its servers in a single physical location.
Ensuring there’s no segmenetation of your corporate Network.

A

Multi-factor Authentication for all users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The human resources organization wants to ensure that stored employee data is encrypted. Which security mechanism would they use?

Encryption in Transit
Encryption at Rest
Multi-factor Authenitcation
Hashing

A

Encryption at Rest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following best describes the concept of data sovereignty?

Trust no one, Verify everything.

There are regulations that govern the physical locations where data can be stored and how and when it can be transferred, processed, or accessed internationally.

Data, particularly personal data, is subject to the laws and regulations of the country/region in which it is physically collected, held, and/or processed.

A

Data, particularly personal data, is subject to the laws and regulations of the country/region in which it is physically collected, held, and/or processed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In which two ways does Microsoft 365 encrypt data?

In utero
At bay
At rest
In transit

A

At rest
In transit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

_________________ is the NEW Security perimeter?

Managed devices.
Identity
Muli-factor Authentication
SaaS

A

Identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Administration, Authentication, Authorization, and Auditing are the key factors of __________________________?

Security and Compliance
Azure Active Directory
Identity Infrastructure
IaaS

A

Identity Infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In modern Authentication, all Services - identity management, Authorization, including Authentication Services, are provided by ________________________?

A central identity provider.
Azure Active Directory
Internet Service Provider (ISP)
Azure Identity

A

A central identity provider.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Setting up Single-Sign-On (SSO) between multiple identity providers is called?

Republic
Domain Services
Federation
Cloud App Security Broker

A

Federation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

You are making a purchase from an online vendor. You are required to login using your Facebook, Google, or Apple account. This is an example of what practice?

Federation
Single-Sign-On
Azure Active Directory
Active Directory

A

Federation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which relationship allows federated services to access resources?

Trust Relationship
Shared Access Relationship
Claim Relationship

A

Trust Relationship

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Authentication is the process of doing what?

Enabling Federated Services
The process of tracking user behavior.
Verifying that a user or device is who they say they are.

A

Verifying that a user or device is who they say they are.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which two key areas does Microsoft Defender cover?

Threat Protection Policies
Service Health
Windows Defender Application Guard
Reports

A

Threat Protection Policies
Reports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the two features are exclusively part of Microsoft Defender for Office 365 Plan 2?

Attack Simulator
Proactively Hunt for Threats with Advanced Hunting
Safe Links
Anti-Phishing Protection

A

Attack Simulator
Proactively Hunt for Threats with Advanced Hunting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Microsoft Defender for Endpoint embeds technology built into Windows 10 and MSFT Cloud Services?

True
False

A

True

17
Q

Micrsoft Defender for Endpoint includes Microsoft Secure Score for Devices and other Microsoft Solutions including Intune and Microsoft Defender for Cloud?

True
False

A

True

18
Q

Microsoft Defender for Identity is a Cloud-Based Security Solution that uses on-premises Active Directory data?

True
False

A

True

19
Q

Which tool monitors and analyzes user activities, creates a behavioral baseline for each user and then using built-in intelligence identifies anomalies for suspicious activities, compromised users or insider threats?

MS Activity Report ID
VIVA Insights
Defender for Identity
Windows Defender Application Guard

A

Defender for Identity

20
Q

A lead admin for an organization is looking to protect against malicious threats posed by email messages, links, and collaboration tools. Which solution from Microsoft 365 Defender suite is best suited for this purpose?

Microsoft Defender for Identity
Microsoft Defender Advanced Threat Protection
Microsoft Defender for Office 365
Microsoft Defender for Endpoint

A

Microsoft Defender for Office 365

21
Q

A Cloud Access Security Broker (CASB) provides protection across 4 areas/pillars: Visibility to detect all cloud services, Data Security, Threat Protection, and Compliance. These pillars represent the basis of the Cloud App Security framework upon which Microsoft Defender for Cloud Apps is built. Which pillar is responsible for identifying and controlling sensitive information?

Threat Protection
Data Security
Compliance Center

A

Data Security

22
Q

Admins in the organization are using the Microsoft 365 Defender portal every day. They want to quickly get an understanding of the organization’s current security posture. Which capability in the Microsoft 365 Defender portal will they use?

Reports
Secure Score
Policies

A

Reports

23
Q

What Microsoft Software allows for synchronization of on-premise identity provider with Azure Active Directory?

Syncrhonized Identity
MS Cloud Authentication
Azure Active Directory Connect

A

Azure Active Directory Connect

24
Q

Personal data and the residency of the data is monitored in Microsoft 365 by which tool?

Microsoft Priva
Microsoft Insights
Microsoft Defender Advanced Threat Protection
Windows Defender Application Guard

A

Microsoft Priva

25
Q

When browsing Microsoft compliance documentation in the Service Trust Portal, you have found several documents that are specific to your industry. What is the best way of ensuring you keep up to date with the latest updates?

Print each document so you can easily refer them.
Download each document.
Save the document to MyLibrary
Save them to OneDrive

A

Save the document to MyLibrary

26
Q

Microsoft’s approach to privacy is built on six principles: Three of the principles are strong legal protectiohn for privacy, no content-based targeting, and benefits to the customer from any data we collect. Identitfy the three other principles that are part of Microsoft’s approach to privacy?

Customer Control, Transparency, and Zero Trust
Shared Responsibility, Transparency, and Security
Shared Responsibility, Transparency, and Zero Trust
Customer Control, Transparency, and Security

A

Customer Control, Transparency, and Security

27
Q

________________________________ security principles are an understanding that threats can come from inside or outside an organization’s Network?

User
Network
Implied Trust
Zero-Trust

A

Zero-Trust

28
Q

Which identity model is not connected to any on-premises directory or external authentication system?

Federated Identity
On-premises Identity
Cloud Identity
Hybrid Identity

A

Cloud Identity

29
Q

You are the security administrator for your organization. You are concerned that users may become targets of phishing attacks and you want to help secure their identities in the event that user passwords become compromises. Which product, feature, or service should you configure?

Conditional Access
Access Reviews
Azure Active Directory Connect
MFA

A

MFA (Multi-factor Authentication)

30
Q

The Chief Information Security Office (CISO) for your organization has requested Security training for all users as part of the risk and compliance audit. Part of this security training involves running phishing campaigns against the users. What Microsoft 365 Service or feature can be used to accomplish this task?

Microsoft 365 Defender Attack Simulator
Microsoft Priva
Microsoft 365 Phishing Simulator
Microsoft Secure Score

A

Microsoft 365 Defender Attack Simulator

31
Q

Your organization wants to enable users to use their own devices (BYOD) to access corporate data resources. Users have expressed privacy concerns with the device enrollment process. What feature or service can you implement to manage the data without requiring device enrollment?

BitLocker
Mobile Device Management (MDM)
Windows Defender Application Guard
Mobile Application Management (MAM)

A

Mobile Application Management (MAM)

32
Q

The Office 365 attack simulator is part of the ________________________?

Microsoft 365 E5
Office 365 E5
Office 365 E3
Microsoft 365 E3

A

Microsoft 365 E5

33
Q

Data residency answers which of the following questions?

Where is my data stored?
What encryption is used to protect my data?
Who has access to my data?
Which security standards are applied to my data?

A

Where is my data stored?

34
Q

Which Microsoft 365 tool can organizations use to track their progress against industry compliance standards?

GDPR Accelerator
Compliance Manager
Service Trust Portal
Compliance Dashboard

A

Compliance Manager

35
Q

_________________________ is the tool that allows you to track improvement actions to improve your security posture?

Microsoft Defender Advanced Threat Protection
Windows Defender Application Guard
Advanced Audit
Secure Score

A

Secure Score