SC-900 Access Management Flashcards

1
Q

What does conditional access mean?

A

Feature of entra that examines signals like user, location, device, application, and risk to automate decisions for authorizing access to resources (apps and data) after factor authentication happens.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Common parts of conditional access include things like?

A

Assignements (Determines which signals to use. Who, what, where, and when)

Conditions (Define when and where the policy will apply)

Access Controls (Determine what actions occur)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are examples of RBAC in entra and can roles be customized?

A

Yes (With a P1/P2 license) and examples include Global Admin, User Admin, and Billing Admin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are some common categories of entra roles?

A

Entra specfiic: Permissions limited directly to resources in Entra (User admin)

Service specific: Permissions tied directly to managing services of 365 (Intune Admin)

Cross service: Permissions that span multiple services (Compliance admin)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the major features of entitlement management?

A

Feature that allow organizations to manage identity and access lifecycle at scale including the automatic management of external users and the delegation of access packages (that contain resources that users can request)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the major features of privilidged identity management?

A

Service that allows access to resources to be just in time, time bound, approval based, visible, and auditable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What describes the general workflow of PIM?

A

Assign (members/owners, scope, assignement types, and durations)

Activate

Approve/Deny

Extend/Renew

Default behaivor will be to see all PIM actions for the past 30 days.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define sign in risk?

A

The probability that a given authentication request isn’t autorized by the identity owner (odd IP, atypical travel, odd sign in properties, entra threat intelligence)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define user risk?

A

Probability that a given identity or account is compromised (odd behaivor, suspucious activity, leadked creds, threat intell)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Reports that are often a part of identity protection include?

A

Risk detections: Contains every risk detected

Risky sign ins: Takes place when one or more risk detections is triggered for a sign in.

Risky users: When one or more risky signs or risky detections have taken palce.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly