Security IV Flashcards

1
Q

Take a systematic approach to security for on-premises and in the cloud (T/F)

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Customers must take an active role in the security partnership (T/F)

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Enterprise organizations are better able to manage and address concerns about security in the cloud when they don’t take a systematic approach (T/F)

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Moving workloads to the cloud shifts many security responsibilities and costs to Microsoft, freeing your security resources to focus on the critically important areas of data, identity, strategy, and governance (T/F)

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Microsoft’s security strategy, governance, and operationalization model?

A

A. Develop cloud security policies
B. Manage continuous threats
C. Manage continuous innovation
D. Contain risk by assuming breach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Microsoft’s administrative control strategy?

A
A. Least privilege admin model
B. Harden security dependencies
C. Use strong authentication
D. Use dedicated admin accounts and workstations
E. Enforce stringent security standards
F. Monitor admin accounts
G. Educate and empower admins
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Microsoft’s data protection strategy?

A
A. Establish information protection priorities
B. Protect High Value Assets (HVAs)
C. Find and protect sensitive assets
D. Set organizational minimum standards
E. Establish user policy and education
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Microsoft’s user identity and device security plan?

A

A. Use strong authentication
B. Manage trusted and compliant devices
C. Educate, empower, and enlist users
D. Monitor for account and credential abuse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Microsoft’s application security model?

A

A. Secure applications that you require

B. Follow the Security Development Lifecycle (SDL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Microsoft’s network security model?

A

A. Update your network security strategy and architecture for cloud computing
B. Optimize with cloud capabilities
C. Manage and monitor network security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Microsoft’s OS and middleware security model?

A

A. Secure the Virtual OS and middleware running on it. Ensure all aspects meet or exceed the level required
B. Secure system management tools at or above the level of systems they manage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly