SC-900 flash cards

Chapter 1

1
Q

Zero-Trust guiding principles

A
  • Always Verify: Always authenticate and authorize access based on all available elements, includes a user’s identity, location, device health, data classification, service or workload
  • Use least privilege access: use just-in-time (JIT) & just-enough-access (JEA) for better data protection
  • Assume breach: Always assume an attacker has gained some access to the environment.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the new perimeter and preferred control plane?

A

Identity, has become the new preferred perimeter and control plane for the entire infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Zero-Trust model

A

Not trusting anything and always verifying
trustworthiness explicitly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Six Pillar of Zero-Trust

A
  • Identity
  • Endpoint
  • Data
  • Apps
  • Infrastructure
  • Network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

When cloud computing who’s responsible for physical security?

A

The Cloud service providers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which following responsibilities are always retained by the customer:

A
  • Data
  • Endpoint
  • Account
  • Access management
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Traditional defense-in-depth layers are?

A
  1. Data
  2. Application
  3. Host
  4. Internal network
  5. Perimeter
  6. Physical Security
  7. Policies, people, process
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What model approach is DDoS protection found?

A

Defense-in-Depth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Key capabilities for Applications to handle massive amounts of traffic

A

High availability
Scale-out
Resiliency
Fault-Tolerance
Attack surface area reduction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Common Threats

A
  • Malware
  • Phishing attacks
  • Denial of Service (DOS) & Distributed Denial of service (DDoS)
  • Ransomware
  • Botnet
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a Malware

A

Malicious application an code that can cause damage and disrupt the normal use of devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Phishing Attacks

A

Attempt to steal sensitive information through emails, websites, text messages, or other forms of electronic communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Denial of Service (DoS) and Distributed Denial of Service (DDoS

A

Disrupts businesses by limiting the function of a network application or exhausting a computing resource until it becomes unavailable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Botnet

A

is a network of compromised devices that an attacker
controls without the knowledge of their owners.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which one of the CIA pillars does a DoS or DDoS attack affect

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is authentication?

A

the act of something or someone proving its identity to
something else.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the abbreviation for authentication?

A

AuthN

18
Q

What is the most common form of multifactor authentication?

A

Text messages or phone calls

19
Q

What is OTP & What does it do?

A

One-time-passcode:

where the passcode can be used only once and is usually good for a limited time. Authenticator apps, such as the Microsoft Authenticator app, send a push notification to the device that is approved by the user.

20
Q

What is authorization?

A

Once the system
or services knows who you are—authentication—you have rights or
permissions to do things—authorization.

21
Q

What is authorization abbreviated as?

A

AuthZ

22
Q

If you want to set up a specific role assigned to your account, you might have inherited permissions in the system to add, modify, delete, or view things. what control must you implement?

A

A Role-Based Access Control (RBAC)

23
Q

What role manages all aspects of Azure Active Directory?

A

Global administrator

24
Q

What is a Global reader?

A

Same as Global administrator except without the ability to make any changes?

25
Q

At what level is Most of the authorization happens?

A

At the application level using RBAC controls

26
Q

Does authorization apply to non-human accounts?

A

Yes authorization applies even to non-human account

27
Q

In Azure AD what type of account hold roles and has the same permissions as any human accounts with that role?

A

Service accounts

28
Q

What does authorization do?

A

Authorization grants or denies permissions to various resources for
both human and non-human accounts.

29
Q

What is Active Directory?

A

Windows Server Active Directory is a multi-master, on-premises directory service that has been built into the Windows operating system since Windows 2000.

30
Q

What does Active Directory do?

A

Active Directory provides authentication, authorization, and usually a single sign-on experience to corporate resources such as file servers, email, and other applications that access the local intranet.

31
Q

What protocols does Active Directory support?

A

Active Directory supports LDAP, NTLM, Kerberos and DNS

32
Q

What functionality applies security policies to computers and users?

A

Group policy

33
Q

How can Active Directory be managed?

A

AD can be managed hierarchically in containers and organizational units

34
Q

What is the boundary for Active Directory

A

Active Directory forest

35
Q

What are boundaries used for?

A

boundaries are used in merger and acquisition scenarios, as well as some older architectures that had separate resource forests for applications.

36
Q

Federation Protocols?

A

WS-Fed, SAML, OAuth and OpenID Connect

37
Q

What does IdP or IDP do?

A

IdP handles the authentication of the users.

38
Q

Examples of IdP’s are?

A

Azure AD, Active Directory Federations Services (ADFS), Ping Federate

39
Q

What are claims

A

Claims are information that is sent to the application/resource provider that, in this case, identifies the user and any additional information about the user that the application needs to function.

40
Q

What is used to sign the claims?

A

Public key cryptography is used to digitally sign claims by the IDP using
its private key

41
Q

Common Identity attacks

A

Credential reuse, password spray, and phishing