Security Flashcards
What model operates on the principle of “trust no one, verify everything”?
Zero Trust Model
What Zero-Trust Methodology principle states always authenticate and authorize based on all available data points?
Verify explicitly
Which Layer of Security manages access to virtual machines (ports, on-premise, cloud)?
Compute
What provides advanced protection for your Azure and on-premise workloads Azure Defender can be found in the Azure Security Center?
Azure Defender
What provides a graphical view with security overlays giving you recommendations and insights for hardening your network resources?
Azure Defender – Network Map
What is it called when you need to use code as an additional layer of security to access your account?
MFA (Multi-Factor Authenication)
This Azure service provides users with a unified infrastructure security management system
Azure Security Center
This Azure service provides a place to securely store cryptographic keys, and other secrets used by your cloud apps
Azure Key Vault
The 2 available subscription tiers for Azure DDOS protection
IP Protection and Network Protection
What does DDoS stand for?
Distributed Denial of Service Attack
This Azure service lets you centrally create, enforce, and log application and network connectivity policies across subscriptions and virtual networks.
Azure Firewall
This Azure security feature protects sensitive information such as emails and documents with encryption, restricted access, and integrated security in Office apps
Azure Information Protection (AIP)
This Azure security component acts as a web-traffic load balancer on layer 7 (http) of the OSI model
Azure Application Gateway
The 4 fundamental built-in roles for Azure Role-Based Access Control (RBAC)
Owner, Contributor, Reader, User Access Administrator
This Azure security feature lets you manage multiple Azure subscriptions under a hierarchical structure. Allowing subscriptions to inherit shared conditions and settings applied at a higher level
Azure Management Groups