Security Flashcards

1
Q

What does the term security posture refer to?

A

The term security posture refers to cybersecurity policies and controls, as well as how well you can predict, prevent, and respond to security threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Azure Security Center?

A

Azure Security Center is a monitoring service that provides visibility of your security posture across all of your services, both on Azure and on-premises.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does SIEM stand for?

A

security information and event management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Microsoft’s cloud-based SIEM system?

A

Azure Sentinel. It uses intelligent security analytics and threat analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are Azure Sentinel capabilities?

A

AI security

  • Collect cloud data at scale
  • Detect previously undetected threats
  • Investigate threats with artificial intelligence
  • Respond to incidents rapidly
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How is your Azure Security Center limited with a free tier subscription?

A

While you can use a free Azure subscription tier with ASC, it is limited to assessments and recommendations of Azure resources only.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the three main defense techniques against malicious input being entered into your applications?

A
  • validate input
  • encode output
  • create parameterized queries
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why should you always encode your output?

A

This design principle will make sure that everything is displayed as output and not inadvertently interpreted as something that should be executed, which is another common attack technique that is referred to as “Cross-Site Scripting” (XSS).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does a WORM state mean?

A

Write once read many (WORM) describes a data storage device in which information, once written, cannot be modified. This write protection affords the assurance that the data cannot be tampered with once it is written to the device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a region pair?

A

Two regions close to each other become a pair. These pairs are never updated at the same time, and if both regions do down because of an outage, one region will be prioritized to get back up and running.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Will Microsoft ever transfer your data to a third party?

A

No never.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Azure Data Lake Storage is build on …

A

It’s built on Azure Blob storage, so it inherits all of its security features

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a single instanced key?

A

Only one key exists.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are versioned keys?

A

A key is an object with a primary (active) key, and a collection of zero, one or more secondary (archived) keys created when keys are rolled (renewed).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the difference between management plane and data plane of Azure key vault?

A

Key Vault access has two facets: the management of the Key Vault itself, and accessing the data contained in the Key Vault. Documentation refers to these facets as the management plane and the data plane.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Does the role Key vault contributor give access to the data plane or the management plane?

A

Management plane.

17
Q

Does the role Contributor give access to the data plane or the management plane?

A

Both.

18
Q

What is a Key Vault access policy?

A

A Key Vault access policy is a permission set assigned to a user or managed identity to read, write, and/or delete secrets and keys.

19
Q

Is encrypted communication turned on automatically when connecting to an Azure SQL Server?

A

Yes. Azure SQL Database enforces encryption (SSL/TLS) at all times for all connections.

20
Q

Transparent Data Encryption will encrypt which database files?

A

Transparent Data Encryption encrypts all database, log, and backup files. When new Azure SQL databases are created, Transparent Data Encryption will be enabled by default.

21
Q

A mask has been applied to a column in the database that holds a user’s email address, laura@contoso.com. From the list of options, what would the mask display when a database administrator account accesses user data?

A

When database administrator accounts access data that have a mask applied, the mask is removed, and the original data is visible.

22
Q

Which of the following is the most efficient way to secure a database to allow only access from a VNet while restricting access from the internet?

A

A server-level virtual network rule will allow you to allow connectivity from specific Azure VNet subnets, and will block access from the internet. This is the most efficient manner to secure this configuration.