SC-900 Flashcards

1
Q

What is the shared responsibility model for Infrastructure as a Service (IaaS)

A

Provider is responsible for physical security & physical datacenter equipment

Customer is responsible for software components running on the cloud infrastructure. Such as: OS, Network Controls, Applications and protecting data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the shared responsibility model for Platform as a Service (PaaS)

A

Provider is responsible for physical security, datacenter equipment & OS management

Customer is responsible for Applications and Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the shared responsibility model for Software as a Service (SaaS)

A

Provider is responsible for Physical Security, Datacenter Equipment, OS Management, Network Controls & Applications

Customer is responsible for Data, Devices, Accounts and Identities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the defence in depth layers

A

Physical - limiting physical access to datacenter

Identity and access - conditional access, such as MFA

Perimeter - Security of corporate network

Network- Network segmentation, network access controls, limit communication between resources.

Compute- secure access to VM’s by closing certain ports

Application- Ensure apps are free of vulnerabilities

Data- Controls to manage access to data and encrypt data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are Zero Trust guiding principles?

A

Verify Explicitly - Always authenticate and authorize all data requests. Just because the request is coming from a trusted network or device

Least Privileged Access- limit user access with just in time and just enough access to allow user to perform tasks

Assume Breach- segment access by network, user, devices and applications. Use encryption to protect data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the 6 Pillars of Zero Trust?

A

Identities may be users or devices. When an Identity tries to access a resource, it must be verified with strong authentication.

Devices- One of the biggest vulnerabilities is through devices. Continual monitoring of devices for health and compliance is critical.

Applications- How data is consumed. All apps need to be tracked.

Data- Needs to be classified, labeled and encrypted

Infrastructure- comprehensive inventory of everything accessing data

Networks- Segmented at all times

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the two types of Encryption and how are they different?

A

Symmetric- uses the same key to encrypt and decrypt data

Asymmetric uses a public key and private key pair to encrypt and decrypt data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the 4 pillars of identity infrastructure

A

Administration- Creation and management of identities for users, devices and services

Authentication- Determine that who someone says they are is who they actually are

Authorization- Determine if a user is allowed to access what they are attempting to access.

Auditing- Tracking who does what, when, where and how and being able to provide reports and alerts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is an Azure AD Service Principle

A

Provide an identity for an application. Requires more manual actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is an Azure AD Managed Identity

A

Provide an identity for an application. Manages the creation and automatic renewal of a service principle on your behalf.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly