Security and Networking Flashcards

1
Q

What is Azure Security Center?

A

A monitoring service that provides visibility across all of your services, both on Azure and on-premises, into your cybersecurity policies and controls, as well as how well you can predict, prevent, and respond to security threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How can you prevent malware from being installed on your VMs?

A

You can use Azure Security Center to either use machine learning to detect and block malware or adaptive application controls to define rules that ensure only allowed applications can run

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are some of Security Center’s advanced cloud defense capabilities?

A

Just-in-time VM access, Adaptive application controls, Adaptive network hardening, File integrity monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Azure Sentinel?

A

A cloud-based security information and event management (SIEM) system which uses intelligent security analytics and threat analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Azure Key Vault?

A

A centralized cloud service for storing an application’s secrets in a single location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a host group?

A

A collection of dedicated physical servers provided by Azure Dedicated Host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What’s the easiest way for Tailwind Traders to combine security data from all of its monitoring tools into a single report?

A

Collect security data in Azure Sentinel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the best way for Tailwind Traders to safely store its TLS certificates so that they’re accessible to cloud VMs?

A

Store the certificates in Azure Key Vault

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How can you ensure that certain VM workloads are physically isolated from workloads being run by other customers?

A

Run the VMs on Azure Dedicated Host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is defense in depth?

A

A strategy of providing security on many layers to remove reliance on any single layer of protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Give an overview of each layer that defense in depth is concerned with?

A
  • Physical Security layer is the first line of defenses to protect computing hardware
  • Identity and Access layer controls access to infrastructure and change control
  • Perimeter layer uses DDoS protection to filter large-scale attacks
  • Network layer limits communication between resources through segmentation and access controls
  • Compute layer secures access to virtual machines
  • Application layer helps ensure that applications are secure and free of security vulnerabilities
  • Data layer controls access to business and customer data that you need to protect
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the common principles to define a security posture?

A
  • Confidentiality - use the principle of least privilege
  • Integrity - Prevent unauthorized changes to information both when stored and in transit
  • Availability - Ensure services are functioning and can be accessed only by authorized users
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What can you configure with Azure Firewall?

A
  • Application rules that define fully qualified domain names (FQDNs) that can be accessed from a subnet
  • Network rules that define source address, protocol, destination port, and destination address
  • Network Address Translation (NAT) rules that define destination IP addresses and ports to translate inbound requests
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What kind of attacks can Azure DDoS Protection help prevent?

A
  • Volumetric attacks that flood the network layer with seemingly legitimate traffic
  • Protocol attacks that render a target inaccessible by exploiting a weakness in the networking (IP) and transport (TCP) layers of the protocol stack
  • Resource-layer (application-layer) attacks that target web application packets to disrupt the transmission of data between hosts. A Web Application Firewall (WAF) is required to protect against L7 attacks.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are network security groups?

A

NSGs act like an internal firewall and enable you to filter network traffic to and from Azure resources within an Azure virtual network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Web Application Firewall?

A

WAF is a feature of Azure Application Gateway that provides your web applications with centralized, inbound protection against common exploits and vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What command would you use to create a NSG rule via Azure CLI?

A

az network nsg rule create

18
Q

An attacker can bring down your website by sending a large volume of network traffic to your servers. Which Azure service can you protect you from this kind of attack?

A

Azure DDoS Protection

19
Q

What’s the best way to limit all outbound traffic from VMs to known hosts?

A

Create application rules in Azure Firewall

20
Q

How can you most easily implement a deny by default policy so that VMs can’t connect to each other?

A

Create a network security group rule that prevents access from another VM on the same network

21
Q

What is Azure Virtual Networking

A

Azure virtual networks enable Azure resources to communicate with each other, users on the internet, and on-premises client computers

22
Q

How can you enable incoming connections to a VM from the internet?

A

Define a public IP address or a public load balancer

23
Q

What two ways can you enable Azure resources to communicate securely with each other?

A

Virtual networks and service endpoints

24
Q

What three mechanisms are available to link together resources between your on-premises environment and your Azure subscription?

A

Point-to-site Virtual Private Networks, Site-to-site Virtual Private Networks, Azure ExpressRoute

25
Q

How does point-to-site VPN differ from site-to-site VPN?

A

In point-to-site, a client computer initiates an encrypted VPN connection to Azure, connecting it to the Azure virtual network. In site-to-site, the client’s on-premises VPN device or gateway is connected to the Azure VPN gateway in a virtual network, allowing the devices in Azure to appear as if they’re on the local network.

26
Q

What is Azure ExpressRoute?

A

Provides a dedicated, private connection between the client and Azure that does not travel over the internet. It offers greater bandwidth and higher levels of security.

27
Q

What can you use to override how network traffic is routed between Azure and the on-premises network?

A

Route tables and Border Gateway Protocol (BGP)

28
Q

What is Border Gateway Protocol?

A

BGP defines the best route for network traffic to reach the destination

29
Q

What is a Network virtual appliance?

A

A specialized VM that carries out a particular network function, such as running a firewall or performing WAN optimization

30
Q

What are two ways to filter traffic between subnets?

A

Network security groups and network virtual appliances

31
Q

What is peering?

A

Links virtual networks together, even in separate regions, allowing you to create a global interconnected network through Azure

32
Q

True or False: To connect Azure resources using Azure Virtual Network, the resources must be within the same resource group and subscription?

A

True

33
Q

True or False: To connect resources over a VPN gateway, the resources must be within the same region?

A

False

34
Q

What are the 3 architectures to consider when planning a VPN gateway?

A
  • Point to site over the internet
  • Site to site over the internet
  • Site to site over a dedicated network, such as Azure ExpressRoute
35
Q

What are some factors to consider when planning a VPN gateway?

A
  • Throughput
  • Internet or private backbone
  • Availability of a public, static IP address
  • VPN device compatibility
  • Multiple client connections vs. a site-to-site link
  • VPN gateway type
  • Azure VPN Gateway SKU
36
Q

What are Gateway SKUs?

A

Identifies the type of workloads, throughputs, features, and SLAs that the VPN Gateway can support. You specify the Gateway SKU to use when you create a virtual network gateway.

37
Q

What does the AZ suffix represent on a Gateway SKU?

A

This is a zone-redundant virtual network gateway, meaning that your gateway instances are deployed to separate Azure Availability Zones to protect network connectivity to Azure from zone-level failures.

38
Q

What does the “Basic” Gateway SKU not support that the other SKUs do?

A

The Basic SKU does not support point to site IKEv2/OpenVPN connections and does not support BGP

39
Q

When designing VPN gateways, what are some rules that you must consider?

A
  • A subnet in one location does not contain the same address space as in another location (Subnets cannot overlap)
  • IP addresses must be unique
  • VPN gateways need a gateway subnet called “GatewaySubnet”
40
Q

How does a Route Based VPN gateway differ from a Policy Based one?

A

Route based are typically built on router platforms. They use wildcard traffic selectors and let routing tables direct traffic to IPsec tunnels. Policy based are typically built on firewall devices and use the combinations of prefixes from both networks to define how traffic is encrypted/decrypted through IPsec tunnels.

41
Q

In ExpressRoute, how does Azure private peering differ from Microsoft peering?

A

Azure private peering connect to Azure compute services such as VMs and cloud services, while Microsoft peering connects to cloud-based SaaS offerings, such as Microsoft 365.

42
Q

Which protocol provides dynamic routing for Azure ExpressRoute?

A

Border Gateway Protocol (BGP)