Security Flashcards

1
Q

Explain Microsoft level of cloud security

A

Microsoft azure hosts dynamics 365 business applications, and security is integrated into every aspect of it. Asher offers you unique security advantages derived from global security intelligence, sophisticated customer facing controls, and a secure hardened infrastructure. This powerful combination protects your applications and data, supports your compliance efforts, and provides cost effective security for organizations of all sizes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Who owns your data?

A

You own Your data, even when it’s located in a data center. If you leave the service, Microsoft take the necessary steps to ensure the continued ownership of your data. In other words your data is secured in transit between user devices and the Microsoft datacenters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the Microsoft compliance center?

A

The location/platform used to track logging and auditing of data changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does encryption at rest mean?

A

To perform real time encryption of data when written to disk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the benefit of encryption at rest?

A

Encryption at rest prevents attackers from accessing the unencrypted data by ensuring the data is encrypted when on disk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the administrators to primary goals?

A

Empower users to be productive whenever and wherever.

Protect the organizations assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the three authentication methods hybrid identity with azure A.D. uses?

A

Hash synchronization

Pass-through authentication

Federation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Explain in further detail azure A.D. and conditional access

A

Azure A.D. use this conditional access to bring signals together, to make decisions, and in force organizational policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How can guests access Dynamics 365 data through the power apps portal?

A

You can configure power apps portals to authenticate business to consumer users, and grant them a specific data access based on their contact record entitlements. By using azure A.D. B2C, organizations can authenticate external users using standard protocols like open ID connect and OAuth 2.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is single sign-on?

A

A service that provides users the security and convenience of accessing multiple azure A.D. applications within the same tenant.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the benefits that Microsoft identity and access management offer?

A

Enable strong authentication

Enforce intelligent access policies

Monitor and audit access

Connect and protect your applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are some suggested actions In administrator can take when dealing with data loss prevention policies?

A

Identify sensitive information across to many locations

Prevent accidental sharing of sensitive information

Monitor and protect sensitive information in the desktop versions of excel PowerPoint and word

Hope users learn how to stay compliant without interrupting their workflow

Educate your users about data loss prevention policies and help them remain compliant without blocking their work

View data loss prevention reports showing content that matches the organizations data loss prevention policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a Business Unit?

A

All or part of an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a security role?

A

A collection of privileges and access levels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is an entity?

A

A collection of records, such as a sales deal or prospect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are privileges?

A

Actions that allow users in a role to take actions on records in an entity

17
Q

What are access levels?

A

Levels that determine the scope of entities in records are user can take actions on, from most restrictive to least restrictive.

18
Q

Can a user have more than one security role?

A

Yes, if they do, the role with the broadest permissions will override rolls with lesser permissions

19
Q

Describe what level global access means?

A

This access level gives a user access to all records in the organization whatever of the business unit hierarchical level that the instance or the user belongs to.

20
Q

Describe what level deep access means?

A

This excess level gives a user access to records in the users business unit and all subordinate business units.

21
Q

Describe what level local access means

A

This excess level gives a user access to records in the users business unit.

22
Q

Describe what level basic access means

A

This access level gives a user access to records that the user owns,Objects shared with user, and objects shared with the team that the user is a member of

23
Q

What are eight record level privileges in a model driven app?

A

Create, read, write, delete, append, append to, assign, and share

24
Q

When sharing a record what privileges can be assigned?

A

Sharing can add read, write, delete, a pen, sign, and share privileges

25
Q

What are user privileges in a model driven app?

A

These privileges are part of the security roll assigned to the users. Users can create an access records created or owned by the users with the basic access level.

26
Q

What are team privileges in a model driven app?

A

These privileges are part of the team assigned to the users.Team members who don’t have user privileges of their own can only create records with the team as the owner, and they can access records owned by the team with the basic access level

27
Q

Can users experience be altered based off of their assigned security roles?

A

Yes,Users experience in the application is the combined result of the defined security rules, team memberships, an app licenses.

28
Q

With finance and operation applications, describe the security model.

A

Security model is a combination of duties, privileges, permissions, authentication, and authorization.

29
Q

For the finance and operations security model, what our duties?

A

Duties correspond to parts of a business process. The Admin assigns a duty to one or more security roles. Duties have privileges to do specific actions.

30
Q

For finance and operations security model, what are privileges?

A

A privilege specifies the level of access needed to do a job, solve a problem, or complete an assignment. It also has permissions to individual application objects, such as user interface elements in tables.

31
Q

For finance and operations security model, our authorizations?

A

Authorization is the control of access to the app. Once you are authorized, security permissions control access to individual elements of the program

32
Q

For Finance and operations security model, what are permissions?

A

Permissions give access to individual securable objects, such as menu items and tables. Privileges include permissions and represent access to tasks, such as posting a journal and processing credit and collections.

33
Q

Describe role based security in finance in operation apps.

A

In role based security,Access isn’t granted to individual users, only two security roles.You assign users to Roles. A user assigned to a security role get access to the side of privileges that is associated with that role.

34
Q

Describe the security model for Dynamics 365 business central.

A

Dynamics 365 business central is a standalone product for small to medium sized businesses. It has a self-contained security system that allows you to control which objects a user can access within each database or environment. You can specify for each user whether they can read, change, or enter data in the selected database objects.

35
Q

What are the two levels of permissions to database objects in business central?

A

Overall permissions according to the license, also referred to as the entitlement.

Detailed permissions as assigned from within business central.