SC-900 Flashcards
What is the shared responsibility model?
identifies which security tasks are handled by the cloud provider and which are are handled by the customer
True or False: For all cloud deployment types, you, the cloud customer, own your data and identities
True
What are the typical layers for defense in depth?
Physical, Identity and Access, Perimeter, Network, Compute, Applications, Data
What is CIA?
Confidentiality, Integrity, and Availability
Explain the C in CIA
confidentiality refers to the need to keep confidential sensitive data such as customer information, passwords, or financial data.
Explain the I in CIA
Integrity refers to keeping data or messages correct.
Explain the A in CIA
Availability refers to making data available to those who need it, when they need it.
What are the Zero Trust Model’s guiding principles?
Verify Explicitly, Use Rule of Least Privilege, Assume Breach
What are the six pillars of Zero Trust Model?
Identities, Devices, Applications, Data, Infrastructure, Networks
What is the pithy Zero Trust saying?
Trust no one, verify everything
What is encryption?
The process of making data unreadable and usable to unauthorized viewers
What decrypts encrypted data?
a key
What is symmetric encryption?
uses the same key to encrypt and decrypt the data
What is asymmetric encryption?
uses a public key and private key pair
What is hashing?
uses an algorithm to convert text to a unique fixed length value called a hash
When using a hash, will it produce the same hash value every time identical text is put into it?
Yes
What does it mean to salt a hash?
Adding a fixed length random value to the input of the has functions
What is Governance?
A system of rules, practices, and processes an organization uses to direct and control its activities.
What is Risk Management?
the process of identifying, assessing, and responding, to threats or events that can impact company or customer objectives
What is Compliance?
refers to the country/region, state, or federal laws or even multi-national regulations that an organization must follow
An organization has deployed Microsoft 365 applications to all employees. Considering the shared responsibility model, who is responsible for the accounts and identities relating to these employees?
The organization
Describe data sovereignty
Data, particularly personal data, is subject to the laws and regulations of the country/region in which it’s physically collected, held, or processed
What is Authentication?
the process of proving a person is who they say they are
What is Authorization?
the process of deciding what access an authorized individual has
What is an Identity?
the set of things that define or characterize someone/something
What are the 4 pillars of an identity infrastructure?
Administration, Authentication, Authorization, and Auditing
What does an identity provider do?
creates, maintains, and manages identity information while offering authentication, authorization, and auditing services
What is a directory?
a hierarchical structure that stores information about objects on the network
What is the Windows on-prem directory service?
Active Directory
Does Azure Directory Domain Services support modern authentication?
No
What provides Identity as a Service solutions for all an organization’s apps across the cloud and on-prem?
Microsoft Entra ID
What is Federation?
enables access of services across organizational or domain boundaries by establishing trust relationships between the respective domain’s identity provider
What service means there’s no need for a user to maintain a different username and password when accessing resources in other domains?
Federation
Which relationship allows federated services to access resources?
Trust relationships
What is Microsoft Entra ID?
Microsoft’s cloud based identity and access management service
What is Entra ID’s identity secure score?
a percentage for how aligned you are with Microsoft’s best practices
What is an Entra tenant?
an instance of Microsoft Entra ID
What is an Entra directory?
a logical container within a Microsoft Entra tenant that holds and organizes the various resources and objects related to identity and access management including users, groups, applications, devices, and other directory objects.
What is a multi-tenant organization?
An organization that has more than one Entra tenant
What are the three categories of things you can assign Microsoft Entra ID’s to?
Humans, physical devices, software applications
What are the two types of managed identities?
system assigned and user assigned
What are the two kinds of groups?
Security groups and 365 groups
What is a security group created for?
manage user and device access to shared resources
What is a 365 group for?
grouping users according to collaboration needs
What is Entra Cloud Sync?
designed to meet and accomplish your hybrid identity goals for provisioning and synchronization of users, groups, and contacts
What can you do with B2B direct connect?
you create two-way trust relationships with other Microsoft Entra organizations to allow users to seamlessly sign in to your shared resources and vice versa.
An organization has completed a full migration to the cloud and has purchased devices for all its employees. All employees sign in to the device through an organizational account configured in Microsoft Entra ID. Select the option that best describes how these devices are set up in Microsoft Entra ID?
These devices are set up as Microsoft Entra joined
A developer wants an application to connect to Azure resources that support Microsoft Entra authentication, without having to manage any credentials and without incurring any extra cost. What best describes the identity type of the application?
Managed Identity
What two phone verification options does Microsoft Entra support?
SMS and Voice call
What is OAUTH?
Open Authentication is an open standard that specifies how time-based, one-time password (TOTP) codes are generated. One-time password codes can be used to authenticate a user.
What does Windows Hello do?
Replaces passwords with strong two factor authentication on devices
What is FIDO?
Fast Identity Online allows users and organizations to leverage the standard to sign in to their resources using an external security key or a platform key built into a device, eliminating the need for a username and password.
What is CBA?
Certificate based authentication enables customers to allow or require users to authenticate directly with X.509 certificates against their Microsoft Entra identity, for applications and browser sign-in.
What is SSPR?
Self-service password reset is a way for users to reset their password without an admin
What is the feature of Entra ID that limits users ability to set weak passwords?
Password protection
True or False: A global banned password list with known weak passwords is automatically updated and enforced by Microsoft.
True
True or False: Admins can also create custom banned password lists to support specific business security needs.
True
What is conditional access?
a feature of Microsoft Entra ID that provides an extra layer of security before allowing authenticated users access to resources
What is conditional access picking up to make a decision?
signals like user, location, device, application,
What is managing access using roles known as?
RBAC – role based access control
An organization plans to implement Conditional Access. What do admins need to do?
Create policies that enforce organizational rules.
Sign-in risk is a signal used by Conditional Access policies to decide whether to grant or deny access. What is sign-in risk?
The probability that the authentication request isn’t authorized by the identity owner.
What gives organizations the ability to do the following tasks:
Govern the identity lifecycle.
Govern access lifecycle.
Secure privileged access for administration.
ID governance