Security and Network Security Flashcards

1
Q

Azure Security Center

A

Azure Security Center can help to keep up best practices, providing steps to take to keep resources secure. Azure Security Center offers two tiers of services: Free tier and Azure Defender tier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Key Vault

A

Azure Key Vault provides a secure way to store secrets, keys, and certificates. Once an item is stored in key vault, security policies that define which users, applications can access items.
A common use scenario for Key Vault is to store encryption keys for VMs. Whole disks of VMs can be encrypted and decrypted using Key Vault

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Azure Sentinel

A

Azure Sentinel is designed for implement security process SOAR (Security Orchestration, Automation, and Response) or SIEM (Security Information and Event Management)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Azure Dedicated Host

A

Azure Dedicated Host provide a solution to run VMs on dedicated host computers where there is no usage of other customers on such host computers. Azure Dedicated Host helps to solve issues for companies with strict compliance rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Free tier

A

The free tier provides general assessment and recommendations for securing Azure resources, provide secure score overall security of resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Azure Defender tier

A

The Azure Defender tier add functionality for securing VMs, applications and networks. It add features like advanced threat detection, analysis from Microsoft Threat Intelligence, abilities to manage the regulatory compliance of Azure resources, and Microsoft Defender for end points of servers. Price of Azure Defender tier is calculated after hours.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Defense in depth

A

Defense in depth is often referred to as the “castle approach”, in which network security is protected by multiple layers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Network Security Group

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Azure Firewall

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Azure DDoS Protection

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Inbound Security Rule

A

Rules that allow traffic into subnets from address spaces of other virtual network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Security Rule

A

A Security Rule can be associated with subnets or Network Interfaces used by a VM.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Flow Record

A

Outbound security rules are not always required for each Inbound security rule. Network Security Group(NSG) maintain a flow record that store state of connection, and NSG will allow traffic that corresponds to that flow record without any explicit rule.
Flow records will automatically invalid once traffic stops flowing for a few minutes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly