SC900 Learn Microsoft Flashcards
Which functionality is provided by Azure AD?
Select only one answer.
A. single sign on (SSO) for users
B. defense in depth
C. encryption of data at rest
D. encryption of data in transit
A. single sign on (SSO) for users
Explanation:
Azure AD provides SSO.
Azure AD provides federation
Azure AD is one perimeter of defense in depth
Azure AD does not provide file services
Azure AD does not provide the encryption of data in transit
Which type of identity should you use to allow Azure virtual machines to access Azure Storage without having to handle password changes manually?
Select only one answer.
A. user
B. device
C. service principal
D. managed identity
D. managed identity
Explanation:
Managed identities are fully managed by Azure AD and can be used by Azure resources when accessing other Azure resources.
Users need to manage passwords manually
Device is used for devices but cannot be used to access Azure resources
Service principal is used for apps, but not for Azure resources
You need to allow external users to use either Microsoft accounts or Google accounts to access an application hosted in Azure.
What is the minimum edition of Azure AD that you can use?
Select only one answer.
A. Free
B. Office 365 Apps
C. Azure AD Premium P1
D. Azure AD Premium P2
C. Azure AD Premium P1
Explanation:
Both Azure AD Premium P1 and P2 allow external users, but Azure AD Premium P1 is the minimum edition that allows this. Free and Office365 apps do not provide external access
Which two authentication methods are available in Azure AD during sign in? Each correct answer presents a complete solution.
Select all answers that apply.
A. password
B. SMS-based authentication
C. security questions
D. driver’s license
E. calling the Microsoft Helpdesk
A. password
B. SMS-based authentication
Explanation:
Passwords are the most common form of authentication and are supported in Azure AD
Text messaging can be used as a primary form of authentication
The Google authenticator app can be used as a primary form of authentication to sign into any Azure AD account
Calling the Microsoft Helpdesk is not a valid authentication method in Azure AD.
Security questions are not used during sign in
Which type of Microsoft identity is used for identifying an application?
Select only one answer.
A. service principal
B. Managed Identity
C. device
D. user
A. service principal
Explanation:
A service principal is, essentially, an identity for an application
For an application to delegate its identity and access functions to Azure AD, the application must first be registered with Azure AD to enable its integration
Once registered, a service principal is created in each Azure AD tenant where the application is used
An organization is migration to the Microsoft cloud. The plan is to use a hybrid identity model.
What can be used to sync identities between Active Directory Domain Services (AD DS) and Azure AD?
Select only one answer.
A. Active Directory Federation Services (AD FS)
B. Microsoft Sentinel
C. Azure AD Connect
D. Azure AD Privileged Identity Management (PIM)
C. Azure AD Connect
Explanation:
Azure AD Connect is designed to meet and accomplish hybrid identity goals.
ADFS cannot be used for hybrid identity models.
Microsoft Sentinel is not an identity product
PIM is used for managing and monitoring access to important resources
Based on a Microsoft Azure Security Score recommendation, an administrator decides to improve identity security within an organization.
What provides the greatest protection to user identities?
Select only one answer.
A. using the Microsoft Authenticator app
B. enforcing password change
C. enforcing complex password
D. using soft tokens
A. using the Microsoft Authenticator app
Explanation:
The Microsoft Authenticator app (phone sign in) is the strongest authentication method.
Enforcing a password change or enforcing a complex password will not provide the greatest protection alone
Using soft tokens does not offer as strong protection as Microsoft Authenticator
What are three things that a user can use for Azure AD Multi-Factor Authentication (MFA)? Each correct answer presents a complete solution.
Select all answers that apply.
A. something the claimant knows
B. something the claimant has
C. something the claimant is
D. something the claimant can not reuse
E. something the claimant solves
A. something the claimant knows
B. something the claimant has
C. something the claimant is
Explanation:
Azure AD MFA works by requiring something you know (such as password), and something you have (such as phone), or something you are (biometrics)
A malicious user is attempting to access many user accounts by using commonly used passwords. The user repeats the action every 20 minutes to avoid triggering an account lockout.
Which Azure AD feature can protect organizations from such attacks?
Select only one answer.
A. Windows Hello for Business
B. Self-service password reset (SSPR)
C. Conditional Access
D. Azure AD Password Protection
D. Azure AD Password Protection
Explanation:
Azure AD Password Protection helps you defend against password spray attacks
Conditional Access brings signals together to make decisions and enforce organizational policies, but it cannot stop password attacks by itself
SSPR allows users to change or reset their password without administrator or help desk involvements, but it cannot prevent password attacks
Windows Hello for Business replaces passwords with strong 2FA on devices
Which condition can you use in a Conditional Access policy to evaluate the likelihood that a user account was compromised?
Select only one answer.
A. location
B. device State
C. user risk
D. sign-in risk
C. user risk
Explanation:
User risk can evaluate the likelihood that a user account was compromised
Sign in risk can identify whether the sign in attempt is considered risky, such as attempts to sign in from compromised IP networks.
Device state verifies the device platform
Locations are associated to specific IP networks
Which Azure feature provides network-level filtering, application-level filtering, and outbound SNAT?
Select only one answer.
A. distributed denial-of-service (DDoS) protection
B. Azure Firewall
C. Azure Web Application Firewall (WAF)
D. Azure Bastion hosts
B. Azure Firewall
Explanation:
Azure Firewall provides all these capabilities. DDoS protection does not provide filtering
Azure WAF does not provide network filtering, just application level filtering
Bastion does not provide filtering
What Azure feature provides application-level filtering and SSL termination?
Select only one answer.
A. distributed denial-of-service (DDoS) protection
B. Azure Firewall
C. Azure Web Application Firewall (WAF)
D. Azure Bastion hosts
C. Azure Web Application Firewall (WAF)
Explanation:
Azure WAF provides all these capabilities
DDoS protection does not provide filtering
Azure Firewall does not provide SSL termination
Bastion does not provide filtering
To implement network segmentation in Azure, you must create [answer choice].
Select only one answer.
A. bastion hosts
B. firewalls
C. security groups
D. virtual networks
D. virtual networks
Explanation:
Virtual networks are the core component for network segmentation
Firewalls can be used to control access between networks
Bastion hosts provide RDP and SSH access to virtual machines through a web portal
Security groups group users together to simply assigning access to resources
Which statement describes network security groups (NSG)?
Select only one answer.
A. Provide network layer traffic filtering to limit traffic to resources within virtual networks in each subscription.
B. Provide protection of web app from common exploits and vulnerabilities.
C. Provide a centralized network firewall as-a-service, which provides network and application-level protection across different subscriptions and virtual networks.
D. Allow a lock down of inbound traffic only, reducing exposure to attacks.
A. Provide network layer traffic filtering to limit traffic to resources within virtual networks in each subscription.
Explanation:
NSGs provide distributed network layer traffic filtering to limit traffic to resources within virtual networks in each subscription.
Which service enables you to continually assess the security posture, identify threats, and harden resources in Azure and on-premises workloads?
Select only one answer.
A. Azure Firewall
B. Microsoft Defender for Cloud
C. Azure Web Application Firewall (WAF)
D. Microsoft Purview
B. Microsoft Defender for Cloud
Explanation:
These capabilities of Defender for Cloud
Azure Firewall does not harden or assess threats
Azure WAF protects web apps, not Azure resources
Microsoft Purview provides data governance
[Answer choice] can be used to apply guidance from the Azure Security Benchmark to services such as Azure AD.
Select only one answer.
A. Security baselines
B. Microsoft Sentinel
C. Microsoft Purview
D. Compliance policies
A. Security baselines
Explanation:
Security baselines for Azure apply guidance from the Azure Security Benchmark to the specific service for which it is defined and provide organizations with a consistent experience when securing their environment
Which two features are part of Microsoft Defender for Clouds enhanced security? Each correct answer presents a complete solution.
Select all answers that apply.
A. endpoint detection and response (EDR)
B. vulnerability scanning for SQL resources
C. security information and event management (SIEM) coloration
D. Security Benchmark Recommendation
A. endpoint detection and response (EDR)
B. vulnerability scanning for SQL resources
Explanation:
EDR and vulnerability scanning for SQL is part of Defender for Cloud enhanced security
SIEM coloration is part of Microsoft Sentinel and Security Benchmark Recommendation is part of Azure Security Benchmarks
Which two types of security systems make up Microsoft Sentinel? Each correct answer presents part of the solution.
Select all answers that apply.
A. data loss prevention (DLP)
B. security information and event management (SIEM)
C. security orchestration automated response (SOAR)
D. endpoint protection platform (EPP)
B. security information and event management (SIEM)
C. security orchestration automated response (SOAR)
Explanation:
Microsoft Sentinel is a mix of SIEM and SOAR systems
What can you use to aggregate security alerts into incidents and to create automated responses to security alerts?
Select only one answer.
A. Microsoft Sentinel
B. Microsoft Defender for Cloud
C. Microsoft Intune
D. Microsoft 365 Defender
A. Microsoft Sentinel
Explanation:
Aggregating security alerts into incidents and creating automated responses to security alerts can be completed by using MIcrosoft Sentinel
Microsoft for Cloud and Microsoft 365 Defender cannot help you manage cyber incidents unless it is connected to MIcrosoft Sentinel
Intune cannot help you manage cyber incidents
What can you use in Microsoft Sentinel to create visual reports?
Select only one answer.
A. workbooks
B. analytics
C. playbooks
D. hunting
A. workbooks
Explanation:
You can monitor data by using Microsoft Sentinel integration with Azure Monitor workbooks
Microsoft Sentinel uses analytics to correlate alerts into incidents
Playbooks are collections of pro
Which feature is only available in Microsoft Defender for Office 365 Plan 2?
Select only one answer.
A. Attack Simulator
B. Safe Links
C. Anti-phishing protection
D. Real-time detections
A. Attack Simulator
Explanation:
Attack Simulator is only available in Microsoft defender for Office 365 Plan 2
Which Microsoft Defender for Endpoint feature regulates access to malicious IP addresses, domains, and URLs?
Select only one answer.
A. threat and vulnerability management
B. attack surface reduction (ASR)
C. automated investigation and remediation (AIR)
D. Microsoft threat experts
B. attack surface reduction (ASR)
Explanation:
ASR handles access to malicious endpoints.
AIR uses playbooks to analyze alerts and take action
Microsoft threat experts handle the SOCs of Microsoft
Threat and vulnerability management scans for vulnerabilities and configuration
For which two services does Microsoft Secure Score provide recommendations? Each correct answer presents a complete solution.
Select all answers that apply.
A. Azure AD
B. Microsoft Teams
C. Azure SQL Database
D. Azure Cosmos DB
A. Azure AD
B. Microsoft Teams
Explanation:
Microsoft Secure Score supports recommendations for Microsoft 365 (including Exchange Online), Azure AD, Microsoft Defender for Endpoint, Defender for Identity, Defender Cloud Apps and Teams
Which three components are protected by using Microsoft Defender? Each correct answer provides a complete solution.
Select all answers that apply.
A. identity
B. endpoints
C. applications
D. analytics
E. mobile devices
A. identity
B. endpoints
C. applications
Explanation:
Microsoft 365 Defender suite protects identities with Microsoft Defender for Identity and Azure AD Identity Protection, endpoints with Microsoft Defender for Endpoint, applications with Microsoft Defender for Cloud Apps and email and collaboration with Microsoft Defender for Office365
Which Microsoft privacy principle defines the use and management of encryption keys?
Select only one answer.
A. transparency
B. security
C. control
D. strong legal protection
B. security
Explanation:
The security principle defines the use of encryption and key management
The control principle states that customers are in control of their data
The strong legal protection principle states that any request from legal authorities for access to customer data must go to the customer, not Microsoft
The transparency principle describes how MIcrosoft informs all parties of how data is used and accessed