MS SC 900 Assessment Flashcards

1
Q

What is the minimum edition of Azure AD needed to use Azure AD Privilege Identity Management (PIM)?
Select only one answer.

A. Free
B. Office 365 Apps
C. Azure AD Premium P1
D. Azure AD Premium P2

A

D. Azure AD Premium P2

Explanation:
Azure AD Premium P2 is the only edition that provides PIM support.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

You need to allow external users to use either Microsoft accounts or Google accounts to access an application hosted in Azure.

What is the minimum edition of Azure AD that you can use?
Select only one answer.

A. Free
B. Office 365 Apps
C. Azure AD Premium P1
D. Azure AD Premium P2

A

C. Azure AD Premium P1

Explanation:
Both Azure AD Premium P1 and P2 allow external users, but Azure AD Premium P1 is the minimum edition that allows this. Free and Office 365 apps do not provide external access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An organization is migration to the Microsoft cloud. The plan is to use a hybrid identity model.

What can be used to sync identities between Active Directory Domain Services (AD DS) and Azure AD?
Select only one answer.

A. Active Directory Federation Services (AD FS)
B. Microsoft Sentinel
C. Azure AD Connect
D. Azure AD Privileged Identity Management (PIM)

A

C. Azure AD Connect

Explanation:
Azure AD Connect is designed to meet and accomplish hybrid identity goals. ADFS cannot be used for hybrid identity models. Microsoft Sentinel is not an identity product. PIM is used for managing and monitoring access to important resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which authentication method can use a time-based, one-time password?
Select only one answer.

A. Windows Hello
B. OATH hardware tokens
C. strong passwords
D. password hash synchronization

A

B. OATH hardware tokens

Explanation:
OATH hardware tokens use time-based, one-time passwords. Strong passwords are not one-time passwords. Password hash synchronization syncs hashes across Active Directory and Azure AD. Windows Hello uses a camera or passcode for authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which two additional forms of authentication are available in Azure AD for multi-factor authentication (MFA) from any device? Each correct answer presents a complete solution.

A. the Microsoft Authenticator app
B. voice call
C. face recognition
D. fingerprint recognition

A

A. the Microsoft Authenticator app
B. voice call

Explanation:
The Microsoft Authenticator app and FIDO2 security key are available in Azure AD for MFA from any device. Face and fingerprint recognition are only available for Windows devices with Windows Hello.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are three things that a user can use for Azure AD Multi-Factor Authentication (MFA)? Each correct answer presents a complete solution.

A. something the claimant knows
B. something the claimant has
C. something the claimant is
D. something the claimant can not reuse
E. something the claimant solves

A

A. something the claimant knows
B. something the claimant has
C. something the claimant is

Explanation:
Azure AD MFA works by requiring something you know (such as a password), and something you have (such as a phone), or something you are (biometrics).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which Azure AD feature helps reduce help desk calls and the loss of productivity when a user cannot sign in to their device or an application?

A. Self-service password reset (SSPR)
B. Identity Protection
C. Conditional Access
D. Azure AD Password Protection

A

A. Self-service password reset (SSPR)

Explanation:
SSPR is a feature of Azure AD that allows users to change or reset their password without administrator or help desk involvement. Without enabling SSPR, Identity protection cannot provide the requested solution. Conditional Access brings signals together, to make decisions, and enforce organizational policies but not SSPR. Azure AD Password Protection reduces the risk when users set weak passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which three actions should be performed to enable self-service password reset (SSPR) for a user? Each correct answer presents part of the solution.
Select all answers that apply.

A. Assign an Azure AD license.
B. Enable SSPR for the user.
C. Register an authentication method.
D. Sign up for a Microsoft account.
E. Create a custom banned password list.

A

A. Assign an Azure AD license.
B. Enable SSPR for the user.
C. Register an authentication method.

Explanation:
To use SSPR, users must be assigned an Azure AD license that is enabled for SSPR by an administrator and registered with the authentication methods they want to use. Two or more authentication methods are recommended in case one is unavailable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What can be used to enforce multi-factor authentication (MFA) when users access an application registered in Azure AD?
Select only one answer.

A. password hash synchronization
B. Conditional Access
C. role-based access control (RBAC)
D. a network security group (NSG)

A

B. Conditional Access

Explanation:
Conditional Access can be used to enforce MFA based on a condition (accessing an app). Password hash synchronization enables password sync with Active Directory. RBAC provides authorization, not authentication. NSGs provide rules for network access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which condition can you use in a Conditional Access policy to evaluate the likelihood that a user account was compromised?
Select only one answer.

A. location
B. device State
C. user risk
D. sign-in risk

A

C. user risk

Explanation:
User risk can evaluate the likelihood that a user account was compromised. Sign-in risk can identify whether the sign-in attempt is considered risky, such as attempts to sign-in from compromised IP networks. Device state verifies the device platform. Locations are associated to specific IP networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What should you use in Azure AD to provide users with the ability to perform administrative tasks?
Select only one answer.

A. app registrations
B. external identities
C. groups
D. roles

A

D. roles

Explanation:
Roles in Azure AD have permission to perform certain administrative tasks. You assign these roles to users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the least privileged Azure AD role that can be used to create and manage users and groups?
Select only one answer.

A. Global Administrator
B. Security Administrator
C. User Administrator
D. Teams Administrator

A

C. User Administrator

Explanation:
User Administrator can manage both users and groups. Global Administrator can also manage users and groups, but the role has far too many privileges.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What can you use to receive alerts for potentially compromised user accounts without blocking the users from signing in?
Select only one answer.

A. real-time sign-in risk detection
B. user risk
C. Application Signal
D. cloud apps or actions

A

B. user risk

Explanation:
User risk represents the probability that a given identity or account is compromised. User risk can be configured for high, medium, or low probability. Admins can set up this signal without interrupting user sign-ins.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the difference between Azure AD role-based access control (RBAC) and Azure RBAC?
Select only one answer.

A. Azure AD roles control access to resources such as users, groups, and applications. Azure roles control access to resources, such as virtual machines.
B. Azure AD roles control access to resources, such as virtual machines. Azure roles control access to resources, such as users, groups, and applications.
C. Users with Azure AD roles can make purchases and manage subscriptions. Users with Azure roles have access to all the administrative features in Azure AD.
D. Users with Azure AD roles have access to all the administrative features in Azure AD. Users with Azure roles can make purchases and manage subscriptions.

A

A. Azure AD roles control access to resources such as users, groups, and applications. Azure roles control access to resources, such as virtual machines.

Explanation:
Azure AD built-in and custom roles are a form of RBAC in that Azure AD roles control access to Azure AD resources. This is referred as Azure AD RBAC. In the same way that Azure AD roles can control access to Azure AD resources, so too can Azure roles control access to Azure resources. This is referred to as Azure RBAC. Although the concept of RBAC applies to both Azure AD RBAC and Azure RBAC, what they control is different.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a user risk in Azure AD Identity Protection?
Select only one answer.

A. leaked credentials
B. atypical travel
C. password spray
D. anonymous IP address

A

A. leaked credentials

Explanation:
Leaked credentials is a user risk. Atypical travel, anonymous IP address, and password spray are sign-in risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which security model uses a layered approach to security, providing mechanisms to stop a breach at the perimeter of each layer?
Select only one answer.

A. shared responsibility
B. defense in depth
C. Zero Trust
D. Payment Card Industry Data Security Standards (PCI DSS) compliance

A

B. defense in depth

Explanation:
Defense in depth uses a layered approach to security. Shared responsibility model is about defining the responsibilities of each party (company and vendor). PCI is a compliance regulation, not a security model.

17
Q

Which encryption method uses the same key to encrypt and decrypt data?
Select only one answer.

A. symmetric encryption
B. asymmetric encryption
C. hashing
D. generating a public key

A

A. symmetric encryption

Explanation:
Symmetric encryption uses the same key to encrypt and decrypt the data. Asymmetric encryption uses a public key and private key pair. Hashing uses an algorithm to convert text to a unique fixed-length value called a hash. Public key cryptography is an encryption system that is based on two pairs of keys. Public keys are used to encrypt messages for a receiver.

18
Q

What is a guiding principle of the Zero Trust model?
Select only one answer.

A. verify explicitly
B. advance user access
C. test for breach
D. trust the local network

A

A. verify explicitly

Explanation:
The Zero Trust model has three guiding principles which are verify explicitly, least privilege access, and assume breach.

19
Q

Which pillar of an identity infrastructure is responsible for defining the level of access a user has over the resources on a network?
Select only one answer.

A. administration
B. authentication
C. authorization
D. auditing

A

C. authorization

Explanation:
Authorization is responsible for determining which level of access authenticated users have. Administration is responsible for managing user accounts. Authentication is responsible for identifying who a user is. Auditing is responsible for keeping track of how authentication, authorization, administration, and access to resources occurs.

20
Q

What is a benefit of single sign-on (SSO) compared to other authentication methods?
Select only one answer.

A. Users can access resources in their domain.
B. Users can authenticate once and access resources anywhere.
C. Devices can be shared by multiple users.
D. Devices can only be used by a single user.

A

B. Users can authenticate once and access resources anywhere.

Explanation:
Users can authenticate once and access resources anywhere with SSO. Users accessing resources in their domain uses Basic authentication for a single domain, not SSO. Users are still required to be authenticated to share devices.

21
Q

What are two characteristics of an identity as the primary security perimeter model? Each correct answer presents a complete solution.
Select all answers that apply.

A. Software as a service (SaaS) applications for business-critical workloads can be hosted outside of a corporate network.
B. Only corporate devices can be used to complete corporate tasks.
C. Bring your own device (BYOD) can be used to complete corporate tasks.
D. Software as a service (SaaS) applications for business-critical workloads that might be hosted cannot be hosted outside of a corporate network.

A

A. Software as a service (SaaS) applications for business-critical workloads can be hosted outside of a corporate network.
C. Bring your own device (BYOD) can be used to complete corporate tasks.

Explanation:
SaaS applications for business-critical workloads can be hosted outside of the corporate network and BYOD can be used to complete corporate tasks in the identity as the primary security perimeter model. The other options represent the traditional perimeter-based security model.

22
Q

What is a feature of single sign-on (SSO)?
Select only one answer.

A. enables a user to sign in once, and then not have to sign in again
B. leverages individual identity providers
C. uses one credential to access multiple applications or resources
D. eliminates the need for password resets due centralized directory

A

C. uses one credential to access multiple applications or resources

Explanation:
SSO allows a user to sign in with a single credential and have access to multiple applications and resources. It does not ensure that a user will not have to sign in again. It leverages a centralized identity provider. It has nothing to do with password resets.

23
Q

What are types of distributed denial-of-service (DDoS) attacks?
Select only one answer.

A. password spray, protocol attacks, and man-in-the-middle (MITM) attacks
B. password spray, dictionary attack, and resource layer attacks
C. resource layer attacks, protocol attacks, and volumetric attacks
D. dictionary attacks, man-in-the-middle (MITM) attacks, and volumetric attacks

A

C. resource layer attacks, protocol attacks, and volumetric attacks

Explanation:
Resource layer attacks, protocol attacks, and volumetric attacks are the most common DDoS attacks. Password sprays and MITM attacks are not DDoS attacks.

24
Q

Which Azure feature provides network-level filtering, application-level filtering, and outbound SNAT?
Select only one answer.

A. distributed denial-of-service (DDoS) protection
B. Azure Firewall
C. Azure Web Application Firewall (WAF)
D. Azure Bastion hosts

A
25
Q

What Azure feature provides application-level filtering and SSL termination?
Select only one answer.

A. distributed denial-of-service (DDoS) protection
B. Azure Firewall
C. Azure Web Application Firewall (WAF)
D. Azure Bastion hosts

A

C. Azure Web Application Firewall (WAF)

Explanation:
Azure WAF provides all these capabilities. DDoS protection does not provide filtering. Azure Firewall does not provide SSL termination. Bastion does not provide filtering.

26
Q

What can you use to connect to Azure virtual machines remotely over RDP and SSH from the Azure portal?
Select only one answer.

A. Azure Web Application Firewall (WAF)
B. Azure AD Identity Protection
C. Microsoft Defender for Cloud
D. Azure Bastion

A
27
Q

You have the following inbound network security group (NSG) security rules in Azure:

AllowVNetInBound with a priority of 65000

AllowAzureLoadBalancerInBound with a priority of 65001

DenyAllInBound with a priority of 65500

No other inbound rules were defined for the NSG.

In which order will the rules be processed?
Select only one answer.

A. The AllowVNetInBound rule is processed first. The AllowAzureLoadBalancerInBound rule is processed second. The last rule that will be processed in the NSG, is the DenyAllInBound rule.
B. The DenyAllInBound rule is processed first. The AllowAzureLoadBalancerInBound rule is processed second. The last rule that will be processed in the NSG is the AllowVNetInBound rule.
C. The AllowAzureLoadBalancerInBound rule is processed first. The AllowVNetInBound rule is processed second. The last rule that will be processed in the NSG is the DenyAllInBound rule.
D. The DenyAllInBound rule is processed first. The AllowVNetInBound rule is processed second. The last rule that will be processed in the NSG is the AllowVNetInBound rule.

A

A. The AllowVNetInBound rule is processed first. The AllowAzureLoadBalancerInBound rule is processed second. The last rule that will be processed in the NSG, is the DenyAllInBound rule.

Explanation:
The lowest priority value always has the priority.

28
Q

Which Azure service provides centralized protection of web apps from common exploits and vulnerabilities?
Select only one answer.

A. Azure Key Vault
B. Azure Web Application Firewall (WAF)
C. Azure AD Identity Protection
D. Microsoft Defender for Cloud

A

B. Azure Web Application Firewall (WAF)

Explanation:
Azure WAF provides centralized protection of web app from common exploits and vulnerabilities. Key Vault is a centralized cloud service for storing application secrets. Defender for Cloud is an Endpoint protection solution and cannot help mitigate the attacks.

29
Q

Which two characteristics are part of a security orchestration automated response (SOAR) solution? Each correct answer presents a complete solution.
Select all answers that apply.

A. collection of data from IT estate
B. correlation of data
C. action-driven workflows
D. issue mitigation

A

C. action-driven workflows
D. issue mitigation

Explanation:
Action-driven workflows and issue mitigation are done by SOAR systems.

30
Q

Which two types of security systems make up Microsoft Sentinel? Each correct answer presents part of the solution.
Select all answers that apply.

A. data loss prevention (DLP)
B. security information and event management (SIEM)
C. security orchestration automated response (SOAR)
D. endpoint protection platform (EPP)

A

B. security information and event management (SIEM)
C. security orchestration automated response (SOAR)

Explanation:
Microsoft Sentinel is a mix of SIEM and SOAR systems.

31
Q

What can you use in Microsoft Sentinel to create visual reports?
Select only one answer.

A. workbooks
B. analytics
C. playbooks
D. hunting

A

A. workbooks

Explanation:
You can monitor data by using Microsoft Sentinel integration with Azure Monitor workbooks. Microsoft Sentinel uses analytics to correlate alerts into incidents. Playbooks are collections of procedures that can be run from Microsoft Sentinel in response to an alert or incident. Hunting is a search-and-query tool, based on the MITRE framework.

32
Q

Select the answer that correctly completes the sentence.

In Microsoft Sentinel, an incident is a group of related [answer choice].
Select only one answer.

A. alerts
B. workbooks
C. security tasks
D. hunting queries

A
33
Q

Which feature is only available in Microsoft Defender for Office 365 Plan 2?
Select only one answer.

A. Attack Simulator
B. Safe Links
C. Anti-phishing protection
D. Real-time detections

A

A. Attack Simulator

Explanation:
Attack Simulator is only available in Microsoft Defender for Office 365 Plan 2.

34
Q

Which feature in Microsoft Defender for Cloud Apps is used to retrieve data from activity logs?
Select only one answer.

A. Cloud Discovery
B. App connectors
C. policies
D. the Cloud apps catalog

A

B. App connectors

Explanation:
Connectors retrieve data from apps and their activity logs. Policies detect risky behavior, violations, and suspicious data points. The Cloud apps catalog is used to sanction or unsanction apps. Cloud Discovery is used to identify cloud environments and apps used by an organization.

35
Q

For which two services does Microsoft Secure Score provide recommendations? Each correct answer presents a complete solution.
Select all answers that apply.

A. Azure AD
B. Microsoft Teams
C. Azure SQL Database
D. Azure Cosmos DB

A

A. Azure AD
B. Microsoft Teams

Explanation:
Microsoft Secure Score supports recommendations for Microsoft 365 (including Exchange Online), Azure AD, Microsoft Defender for Endpoint, Defender for Identity, Defender Cloud Apps, and Teams.