sc900 Flashcards

1
Q

Microsoft Entra Verified ID

A

a service for securely managing and verifying digital credentials. It automates identity verification while maintaining privacy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Microsoft Entra Permissions Management

A

a Cloud Infrastructure Entitlement Management (CIEM) solution that helps organizations manage permissions for identities and resources across Microsoft Azure, AWS, and GCP, supporting a Zero Trust security model with least privilege access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Microsoft Entra ID Protection

A

helps organizations detect, investigate, and remediate identity-based risks by analyzing signals from user and workload identities. It integrates with tools like Conditional Access and SIEM for better security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Six Foundational Pillars of Zero Trust

A

Identities, Device, Applications, Data, Infrastructure, Networks (IDADIN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Data Residency

A

Refers to regulations governing the physical location where data can be stored and how it can be transferred, processed, or accessed internationally. These regulations vary by jurisdiction, making it crucial for organizations to be aware of local laws when handling data across borders.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Data Sovereignty

A

This principle states that data, especially personal data, is subject to the laws and regulations of the country or region in which it is collected, stored, or processed. This can create complexity as data may cross multiple jurisdictions, each with different laws.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Data Privacy:

A

transparency about the collection, use, and sharing of personal data. Organizations must comply with various laws and regulations to protect privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Authentication

A

is the process of verifying a person’s identity, proving they are who they claim to be.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Authorization

A

happens after authentication and determines what resources a person can access and what actions they can perform.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Four Pillars of Identity Infrastructure

A

Administration, Authentication, Authorization, Auditing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The Microsoft Service Trust Portal (STP)

A

how Microsoft protect data, maintain compliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Microsoft Priva

A

is a set of privacy solutions designed to help organizations manage privacy operations, ensure compliance with regulations, and mitigate privacy risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Microsoft Purview

A

is a set of integrated data security, data governance, and data compliance solutions that can help organizations secure and govern their entire data estate, while helping them meet their compliance requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Data Loss Prevention (DLP) in Microsoft Purview

A

helps organizations protect sensitive information from being shared inappropriately.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Describe audit in Microsoft Purview (standard and premium)

A

log retention policies, high-value intelligent insights, and higher bandwidth to API.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The following authentication methods are available for SSPR:

A

Mobile app notification
Mobile app code
Email
Mobile phone
Office phone
Security questions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

service password reset (SSPR) is a

A

feature of Microsoft Entra ID that allows users to change or reset their password, without administrator or help desk involvement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

azure Bastion provides

A

secure RDP and SSH connectivity to all of the VMs in the virtual network for which it’s provisioned.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Microsoft Purview Compliance Manager

A

helps reduce risks related to data protection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Microsoft Purview Communication Compliance

A

helps detect, capture, and address inappropriate messages that may lead to breaches or compliance incidents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Microsoft Purview Data Lifecycle Management

A

provides tools for managing data retention and deletion, helping organizations meet compliance requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Microsoft Purview data governance

A

enables organizations to securely manage, access, and utilize their data across a distributed environment while ensuring compliance, improving data quality, and supporting innovation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Microsoft Purview Data Catalog

A

provides a comprehensive solution for organizing, managing, and securing data across the organization.

24
Q

federation

A

When multiple identity providers work together where users only need to log in once, and their credentials can be used to access multiple applications

25
Q

FIDO2

A

passwordless authentication standard using security keys or built-in device keys. It’s more secure than passwords, resistant to phishing, and supports single sign-on for both cloud and on-premises resources.

26
Q

Windows Hello for Business

A

something you have, something you know, and something that’s part of you.

27
Q

Conditional Access

A

extra layer of security by automating access decisions based on user, location, device, application, and risk factors

28
Q

Microsoft Global Secure Access dashboard

A

a security solution that unifies Microsoft Entra Internet Access (SAAS) and Private Access (VPN) to protect users, devices, and data

29
Q

Microsoft Entra ID different identity types

A

User Identities:
Workload Identities:
Device Identities:
Hybrid Identities:
external Identities

30
Q

In entra ID there are three basic terminologies

A

Tenant: is an instance of entra ID
Directory: a database or catalog of identities and resources associated with an organization’s tenant.
Multi-tenant: is an organization that has more than one instance of Entra ID. including organizations with multiple subsidiaries, organizations that merge or acquire companies

31
Q

Microsoft Entra ID Governance

A

who should have access, what users do with that access, and whether controls are working effectively

32
Q

Microsoft Entra access reviews

A

manage group memberships, application access, and role assignments, ensuring only the right people have access to resources

33
Q

Entitlement Management in Microsoft Entra automates

A

access requests, assignments, reviews, and expirations, helping manage access at scale. It allows non-administrators to create access packages and define access policies.

34
Q

Network Security Groups (NSGs):

A

NSGs filter inbound and outbound network traffic to Azure resources, like virtual machines (VMs). An NSG consists of rules that define traffic flow based on criteria such as source, destination, port, protocol, and direction

35
Q

NSGs vs Azure Firewall:

A

While NSGs provide distributed network-level filtering, Azure Firewall is a firewall that offers both network and application-level protection across multiple virtual networks and subscriptions. Together, they provide a defense-in-depth approach to security.

36
Q

Microsoft Defender for Cloud

A

is a cloud-native application protection platform (CNAPP) designed to secure cloud-based applications from cyber threats and vulnerabilities

37
Q

Microsoft Sentinel

A

is a cloud SIEM solution that provides intelligent security analytics and threat intelligence to protect enterprises.

38
Q

Microsoft Defender XDR

A

is an enterprise security suite designed to protect against sophisticated cyberattacks by integrating threat signals from endpoints, applications, email, and identities.

39
Q

Microsoft Defender for Office 365

A

protects organizations from threats like phishing, malware, and attacks targeting email links, attachments

40
Q

Microsoft Defender for Endpoint

A

is a platform designed to protect enterprise networks by securing endpoints such as laptops, phones, tablets, PCs, routers, and firewalls

41
Q

Microsoft Defender for Cloud Apps

A

provides comprehensive protection for Software-as-a-Service (SaaS) applications

42
Q

Microsoft Defender for Identity

A

is a cloud-based security solution that leverages on-premises identity infrastructure signals to detect and respond to identity-based threats

43
Q

Microsoft Defender Vulnerability Management

A

provides organizations with asset visibility, intelligent risk assessments,

44
Q

Microsoft Defender Threat Intelligence (TI)

A

helps security teams efficiently aggregate, analyze, and prioritize threat intelligence data to protect organizations from the most impactful threats.

45
Q

Microsoft Purview Information Protection

A

provides data classification capabilities to help organizations manage sensitive information and comply with regulatory requirements

46
Q

OATH (Open Authentication): A standard for generating time-based one-time passwords (TOTP) for user verification.

A
  • Software OATH tokens: Apps generating OTPs using a secret key.
  • Hardware OATH tokens: Devices like key fobs showing changing codes every 30-60 seconds.
    Used as secondary authentication in Microsoft Entra ID for password resets or multifactor authentication.
47
Q

Cloud security posture management (CSPM

A

CSPM provides detailed visibility into the security state of your assets and workloads and offers hardening guidance to help you improve your security posture.

48
Q

An identity provider (IdP)

A

is a service responsible for creating, maintaining, and managing identity information.
Examples of Identity Providers:
Microsoft Entra ID, Google, Amazon, LinkedIn, and GitHub.

49
Q

Single Sign-On (SSO):

A

An important feature of modern identity providers is Single Sign-On (SSO). With SSO, users only need to log in once, and their credentials can be used to access multiple applications or resources. When multiple identity providers work together in this manner, it is called federation.

50
Q

Data Residency: .

A

the physical location where data can be stored and how it can be transferred, processed, or accessed internationally

51
Q

Data Sovereignty:

A

personal data, is subject to the laws and regulations of the country or region in which it is collected, stored, or processed.

52
Q

Data Privacy:

A

transparency about the collection, use, and sharing of personal data.

53
Q

Defense in Depth is a layered security approach that prevents unauthorized access by using multiple security mechanisms

A

Physical :
Identity and access control:
Perimeter
Network :
Compute :
Application :
Data :

54
Q

Key Principles of Zero Trust:

A

Verify Explicitly:
Least Privilege Access:
Assume Breach:

55
Q

shared responsibility model

A

Devices & accounts always CUSTOMER
On-premises datacenters: The organization is fully responsible for everything
IaaS: customer responsible for everything except physical
PaaS: customer responsible shared with applications and network
SaaS: Organization responsible for everything

56
Q

eDiscovery

A

eDiscovery, is the process of identifying and delivering electronic information that can be used as evidence in legal cases

57
Q

Lockbox

A

Lockbox ensures that Microsoft can’t access your content to do service operations without your explicit approval.