SC-900 flash cards

Chapter 1

1
Q

Zero-Trust guiding principles

A
  • Always Verify: Always authenticate and authorize access based on all available elements, includes a user’s identity, location, device health, data classification, service or workload
  • Use least privilege access: use just-in-time (JIT) & just-enough-access (JEA) for better data protection
  • Assume breach: Always assume an attacker has gained some access to the environment.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the new perimeter and preferred control plane?

A

Identity, has become the new preferred perimeter and control plane for the entire infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Zero-Trust model

A

Not trusting anything and always verifying
trustworthiness explicitly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Six Pillar of Zero-Trust

A
  • Identity
  • Endpoint
  • Data
  • Apps
  • Infrastructure
  • Network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

When cloud computing who’s responsible for physical security?

A

The Cloud service providers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which following responsibilities are always retained by the customer:

A
  • Data
  • Endpoint
  • Account
  • Access management
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Traditional defense-in-depth layers are?

A
  1. Data
  2. Application
  3. Host
  4. Internal network
  5. Perimeter
  6. Physical Security
  7. Policies, people, process
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What model approach is DDoS protection found?

A

Defense-in-Depth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Key capabilities for Applications to handle massive amounts of traffic

A

High availability
Scale-out
Resiliency
Fault-Tolerance
Attack surface area reduction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Common Threats

A
  • Malware
  • Phishing attacks
  • Denial of Service (DOS) & Distributed Denial of service (DDoS)
  • Ransomware
  • Botnet
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a Malware

A

Malicious application an code that can cause damage and disrupt the normal use of devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Phishing Attacks

A

Attempt to steal sensitive information through emails, websites, text messages, or other forms of electronic communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Denial of Service (DoS) and Distributed Denial of Service (DDoS

A

Disrupts businesses by limiting the function of a network application or exhausting a computing resource until it becomes unavailable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Botnet

A

is a network of compromised devices that an attacker
controls without the knowledge of their owners.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which one of the CIA pillars does a DoS or DDoS attack affect

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is authentication?

A

the act of something or someone proving its identity to
something else.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the abbreviation for authentication?

18
Q

What is the most common form of multifactor authentication?

A

Text messages or phone calls

19
Q

What is OTP & What does it do?

A

One-time-passcode:

where the passcode can be used only once and is usually good for a limited time. Authenticator apps, such as the Microsoft Authenticator app, send a push notification to the device that is approved by the user.

20
Q

What is authorization?

A

Once the system
or services knows who you are—authentication—you have rights or
permissions to do things—authorization.

21
Q

What is authorization abbreviated as?

22
Q

If you want to set up a specific role assigned to your account, you might have inherited permissions in the system to add, modify, delete, or view things. what control must you implement?

A

A Role-Based Access Control (RBAC)

23
Q

What role manages all aspects of Azure Active Directory?

A

Global administrator

24
Q

What is a Global reader?

A

Same as Global administrator except without the ability to make any changes?

25
At what level is Most of the authorization happens?
At the application level using RBAC controls
26
Does authorization apply to non-human accounts?
Yes authorization applies even to non-human account
27
In Azure AD what type of account hold roles and has the same permissions as any human accounts with that role?
Service accounts
28
What does authorization do?
Authorization grants or denies permissions to various resources for both human and non-human accounts.
29
What is Active Directory?
Windows Server Active Directory is a multi-master, on-premises directory service that has been built into the Windows operating system since Windows 2000.
30
What does Active Directory do?
Active Directory provides authentication, authorization, and usually a single sign-on experience to corporate resources such as file servers, email, and other applications that access the local intranet.
31
What protocols does Active Directory support?
Active Directory supports LDAP, NTLM, Kerberos and DNS
32
What functionality applies security policies to computers and users?
Group policy
33
How can Active Directory be managed?
AD can be managed hierarchically in containers and organizational units
34
What is the boundary for Active Directory
Active Directory forest
35
What are boundaries used for?
boundaries are used in merger and acquisition scenarios, as well as some older architectures that had separate resource forests for applications.
36
Federation Protocols?
WS-Fed, SAML, OAuth and OpenID Connect
37
What does IdP or IDP do?
IdP handles the authentication of the users.
38
Examples of IdP's are?
Azure AD, Active Directory Federations Services (ADFS), Ping Federate
39
What are claims
Claims are information that is sent to the application/resource provider that, in this case, identifies the user and any additional information about the user that the application needs to function.
40
What is used to sign the claims?
Public key cryptography is used to digitally sign claims by the IDP using its private key
41
Common Identity attacks
Credential reuse, password spray, and phishing