SC900 (Udemy) Flashcards
Which of the following allows you to invite guest users and provide them access to Azure resources within your organization?
A. Azure Identity Protection
B. Azure Privileged Identity Management
C. Azure Active Directory B2B
D. Azure AD Connect
C. Azure Active Directory B2B
Explanation:
With Azure Active Directory B2B, you can actually invite users from external partners. You can then securely give them access to Azure resources within your organization.
Option A is incorrect since this is used for the protection of identities.
Option B is incorrect since this is used to give just-in-time access to resources in Azure.
Option D is incorrect since this is used to sync your on-premises identities to Azure Active Directory.
For more information on Azure Active Directory B2B, please refer to:
https://docs.microsoft.com/en-us/azure/active-directory/external-identities/what-is-b2b
Your company is planning on making use of Azure Active Directory. Do all versions of Azure Active Directory provide the same set of features?
A. Yes
B. No
B. No
Explanation:
There are different pricing models available for Azure Active Directory. The most basic version is the Free model. With this plan, there is a limitation in terms of features. For example, you will not get features such as:
- A service level agreement
- Self-service password reset for cloud users
- Group access management
For more information on Azure AD Pricing, please refer to: https://azure.microsoft.com/en-us/pricing/details/active-directory/
Your company is planning on making use of conditional access. Can you use conditional access to enable multi-factor authentication for users that sign in from certain locations?
A. Yes
B. No
A. Yes
Explanation:
Yes, you can use conditional access to enable multi-factor authentication for users that sign in from certain locations.
As the Cloud Admin for your organization, you have been tasked to block all access requests that originate from outside of your home country. In addition, you need to require Multi-factor authentication for any requests that originate outside of your corporate network. What Azure AD feature can be used to accomplish this?
A. Conditional Access Policies
B. Privileged Identity Management
C. Active Directory Connect
D. Identity Protection
A. Conditional Access Policies
Explanation:
Answer A is correct as Conditional Access Policies are simple IF-THEN statements that evaluate signals such as a user device, user location, and real-time risk to determine if access should be blocked, granted with additional requirements, or just granted.
Answer B is incorrect as Privileged Identity Management is a feature of Azure Active Directory that provides time-based and approval-based role activation. It would not be used to prevent users from accessing resources from a specific country. This would not meet your requirements.
Answer C is incorrect as Active Directory Connect is a tool that is used to sync identity information from an on-premise Identity store such as Active Directory Domain Services to Azure Active Directory. This would not meet your requirements.
Answer D is incorrect as Identity Protection is an Azure Active Directory feature that enables the ability to detect, investigate, and remediate risks to your user’s identities, such as exposed passwords or compromised accounts. This would not meet your requirements.
Extra info:
https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/overview
https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/location-condition
A company wants to make use of Windows Hello for business when it comes to authentication. Which of the following are the authentication techniques available for Windows Hello for business? Choose 3 answers from the options given below
A. PIN
B. Facial Recognition
C. Email message
D. Password
E. Fingerprint Recognition
A. PIN
B. Facial Recognition
E. Fingerprint Recognition
Explanation:
The entire purpose of Windows Hello for business is to ensure passwords are not used in the authentication process. Here uses can use other techniques for authentication via the usage of PIN and biometric recognition.
Options C and D are incorrect since Windows Hello for Business tries to ensure that security measures are used for the authentication process.
For more information on Windows Hello for business, please refer to:
https://docs.microsoft.com/en-us/windows/security/identity-protection/hello-for-business/hello-overview
Your company is planning on making use of conditional access. Can you use conditional access to enable multi-factor authentication for users that sign in via certain cloud-based applications?
A. Yes
B. NO
A. Yes
Explanation:
Yes, you can use conditional access to enable multi-factor authentication for users that sign in via certain cloud-based applications.
For more information on Azure AD Conditional Access, please refer to:
https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/overview
Your company wants to start making use of Azure. They are looking at different security aspects when it comes to using Azure. Which of the following could be used for the following requirement?
“Enforce Multi-Factor authentication based on the location of the user and what application the user is trying to access ”
A. Azure AD Identity Management
B. Azure Conditional Access
C. Azure AD Roles
D. Azure AD Connect
B. Azure Conditional Access
Explanation:
Yes, you can use conditional access to enable multi-factor authentication for users that sign in via certain cloud-based applications and also based on the location.
You are looking at the capabilities of Azure Active Directory. Can you use Azure Active Directory to provide user access to manage an Azure virtual machine?
A. Yes
B. No
B. No
Explanation:
To manage access to resources in Azure, you need to use Role-based access control. You will define the user identities in Azure AD, but then provide access using Role-based access control.
For more information on Role-based access control, please refer to:
https://docs.microsoft.com/en-us/azure/role-based-access-control/overview
You are looking at using Azure Active Directory Access Reviews. Can you use Azure AD Access reviews to review group memberships for users defined in Azure AD?
A. Yes
B. No
A. Yes
Explanation:
Your company is planning on making use of Azure Active Directory Privileged Identity Management. Can Privileged Identity Management be used to provide time-bound access for Azure virtual machines?
A. Yes
B. No
B. No
Explanation:
Your company is planning on making use of Network Security Groups. Can you make use of network security groups to deny all inbound traffic from the Internet?
A. Yes
B. No
A. Yes
Explanation:
By default, there is a rule in the Network security group that blocks all network traffic except for that within the Azure virtual network. This rule will block all traffic from the Internet.
For more information on Azure network security groups, please refer to:
https://docs.microsoft.com/en-us/azure/virtual-network/network-security-groups-overview
You have to decide on the right service to use based on a requirement:
Provide protection against large scale internet attacks
A. Azure Bastion
B. Azure Firewall
C. Network Security Groups
D. Azure DDoS Protection
D. Azure DDoS Protection
Explanation:
Which of the following is available for the Azure Application Gateway service that helps to protect web applications from common exploits and vulnerabilities?
A. Azure Firewall
B. Azure Web Application Firewall
C. Azure Policy
D. Azure Identity Protection
B. Azure Web Application Firewall
Explanation:
The Azure Web Application Firewall can be used along with the Azure Application Gateway resource to protect web applications from common exploits and vulnerabilities. It can help to protect against attacks such as SQL injection attacks or cross-site scripting attacks.
For more information on the Azure Web Application Firewall, please refer to:
https://docs.microsoft.com/en-us/azure/web-application-firewall/ag/ag-overview
You are planning on using the Azure Firewall service. Can you use the Azure Firewall service to filter incoming traffic to Azure virtual machines?
A. Yes
B. No
A. Yes
Explanation:
The Azure Firewall service has network traffic filtering rules that can be defined to allow or deny traffic. You can filter traffic based on the source, destination IP address, port number, and protocol.
For more information on the network traffic filtering rules in the Azure Firewall service, please refer to:
https://docs.microsoft.com/en-us/azure/firewall/features#network-traffic-filtering-rules
You have to decide on the right service to use based on a requirement. Which of the following would you use for the below requirement?
Provide a secure way to RDP/SSH into Azure virtual machines.
A. Azure Bastion
B. Azure Firewall
C. Network Security Groups
D. Azure DDoS Protection
A. Azure Bastion
Explanation:
The Azure Bastion service is a managed service that allows you to connect to an Azure virtual machine via the browser and the Azure portal.
Option B is incorrect since this is a managed firewall service.
Option C is incorrect since this is used to filter the traffic to your Azure virtual machines.
Option D is incorrect since this is used to protect your Azure resources against large-scale attacks from the Internet.
For more information on the Azure Bastion service , please refer to the below URL
https://docs.microsoft.com/en-us/azure/bastion/bastion-overview
Which of the following maps to the below encryption technique?
Encrypting information that resides in persistent storage on physical media.
A. Encryption in transit
B. Encryption at Rest
C. In Memory Encryption
D. SSL Encryption
B. Encryption at Rest
Explanation:
This concept is mapped to the concept of ensuring that data is encrypted at rest. The data on the underlying physical media is encrypted.
The other options are all incorrect since the keyword of “rest” maps to data that resides on the physical device
For more information on Azure Encryption, please refer to:
https://docs.microsoft.com/en-us/azure/security/fundamentals/encryption-overview
Which of the following can be used to provide a secure score for the resources defined as part of your Azure account?
A. Azure Security Center
B. Azure Key Vaults
C. Azure Sentinel
D. Azure Information Protection
A. Azure Security Center
Which of the following provides advanced and intelligent protection of Azure and hybrid resources and workloads?
A. Azure Defender
B. Azure Policies
C. Azure Blueprints
D. Azure Active Directory
A. Azure Defender
Explanation:
With Azure Defender, you can enable intelligent protection of your resources that are defined in Azure and also in your on-premises infrastructure.
Which of the following is a scalable, cloud-native, security information event management and security orchestration automated response solution?
A. Azure Sentinel
B. Azure Security Center
C. Azure Active Directory
D. Azure AD IDentity Protection
A. Azure Sentinel
Explanation:
Explanation
You can use Azure Sentinel as a scalable, cloud-native, security information event management and security orchestration automated response solution. Azure Sentinel has the capability to ingest data from a variety of sources and perform threat monitoring on that data.
For more information on Azure Sentinel, please refer to:
https://docs.microsoft.com/en-us/azure/sentinel/overview
The Microsoft 365 Defender Suite provides functionality for your IT staff to assess threat signals from your organizations’ Identities, Endpoints, Applications, and ___________.
A. Databases
B. Email
C. Container Registries
D. Storage
B. Email
Explanation:
The Microsoft 365 Defender suite includes the 4 services below which protect Identities, Endpoints, Applications, and Emails:
- Microsoft Defender for Endpoint
- Microsoft Defender for O365
- Microsoft Defender for Identity
- Microsoft Cloud App Security
Databases are protected by Azure Defender for SQL, but it is not part of the Microsoft 365 Defender suite.
Storage accounts are protected by Azure Defender for Storage, but it is not part of the Microsoft 365 suite.
Container Registries are protected by Azure Defender for Container Registries, but it is not part of the Microsoft 365 suite.
More info:
https://docs.microsoft.com/en-us/microsoft-365/security/defender/microsoft-365-defender?view=o365-worldwide
You want to enable safe attachments for SharePoint and OneDrive. Which of the following can be used for this requirement?
A. Microsoft Defender for Endpoint
B. Microsoft Defender for Identity
C. Microsoft Defender for O365
D. Azure AD Identity Protection
C. Microsoft Defender for O365
Explanation:
Which of the following is a component of the Cloud App Security Framework?
A. Entitlement Management to provide access packages
B. MFA
C. Regulatory Compliance to ensure Regulatory Standards
D. Control and Discover the use of Shadow IT
D. Control and Discover the use of Shadow IT
Explanation:
Your organization is exploring the possibility of allowing users to Bring Your Own Device and use it to access company resources. What tool can be used to help protect organizational data resources when accessed on devices owned by end-users?
A. Azure Sentinel
B. Microsoft 365 Compliance Center
C. Azure Security Center
D. Microsoft Intune
D. Microsoft Intune
Explanation:
You are considering the use of sensitivity labels in Microsoft 365. Can sensitivity labels be used to encrypt the contents in documents?
A. Yes
B. No
A. Yes