Security, Privacy, Compliance and Trust Flashcards

1
Q

describe Network Security Groups (NSG)

A

NETWORK SECURITY. Network Security Groups are a series of rules you can apply that allow inbound traffic based on certain rules, or allow outbound traffic based on certain rules. Enable you to filter traffic to and from resources by source and destination IP address, port, and protocol.
Inbound NSG rules protect a destination IP address and port by number. If you have hundreds of servers and machines Application Security Groups are better used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

describe Application Security Groups (ASG)

A

NETWORK SECURITY. Application security groups enable you to group resources by type, then apply rules to all IP addresses/ports in that type so that you don’t have to keep manually repeating your NSG configuration.

This feature allows you to reuse your security policy at scale without manual maintenance of explicit IP addresses. The platform handles the complexity of explicit IP addresses and multiple rule sets, allowing you to focus on your business logic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

describe User Defined Routes (UDR)

A

NETWORK SECURITY. Allows you to define some path your traffic needs to travel over your network.
e.g. force traffic to go through a firewall device before reaching your VM by specifying a UDR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe Azure DDoS Protection

A

NETWORK SECURITY. Azure DDoS Protection provides “Basic” and “Standard” service tiers.
Basic tier:
- Always on monitoring
- Automatic mitigation for L3/L4 attacks
- L7 Protection with Application Gateway Web application firewall
-Globally deployed

Standard tier:

  • Protection policies tuned to your VNet
  • Logging, alerting and telemetry
  • Resource cost scale protection
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

choose an appropriate Azure security solution

A

Consider all elements of defence in depth.

  1. Network Perimeter layer (DDoS protection and firewalls)
    a) All virtual network subnets should use NSG (Network Security Groups) as this is the most basic layer of allowing or denying traffic
    b) WAF Firewalls
  2. Networking layer (limit communication through segmenting your network and configuring access controls, deny by default, restric inbound internet access and limit outbound where appropriate, implement secure connectivity to on-premise networks)
  3. Comining services e.g. Network security groups and Azure firewall , Application Gateway WAF and Azure Firewall
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

describe the difference between authentication and authorization

A

Authentication - Who you are

Authorisation - what you can do

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

describe Azure Active Directory

A

Azure Active Directory is a Microsoft cloud-based identity and access management service. Azure AD helps employees of an organization sign in and access internal and external resources.

Azure AD provides services such as:
Authentication, SSO, Application management, Business to business identity services, Busines to customer identity services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

describe Azure Multi-Factor Authentication

A

Azure Multi-Factor Authentication provides additional security for your identities by requiring two or more elements for full authentication. These elements fall into three categories:
Something you know
Something you possess
Something you are (biometric)
Azure MFA comes with Azure AD Premium Licences, MFA authentication for O365 , Azure AD global administrators

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Describe Azure Security Center

A

Azure Security Center is a monitoring service that provides threat protection across all of your services both in Azure, and on-premises.
Security Center can:
Provide security recommendations, Monitor security and automatically apply required security to new services as they come online.
identify potential vulnerabilities before they can be exploited.
Use machine learning to detect and block malware from being installed on your virtual machines and services.
You can also define a list of allowed applications to ensure that only the apps you validate can execute.
Analyze and identify potential inbound attacks and help to investigate threats and any post-breach activity that might have occurred.
Provide just-in-time access control for ports, reducing your attack surface by ensuring the network only allows traffic that you require.

Available as Free or Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

describe the Microsoft Privacy Statement

A

This privacy statement explains the personal data Microsoft processes, how Microsoft processes it, and for what purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

describe the Trust center

A

The Trust Center is a website resource containing information and details about how Microsoft implements and supports security, privacy, compliance, and transparency in all Microsoft cloud products and services. The Trust Center is an important part of the Microsoft Trusted Cloud Initiative and provides support and resources for the legal and compliance community.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

describe the Service Trust Portal

A

The Service Trust Portal (STP) hosts the Compliance Manager service, and is the Microsoft public site for publishing audit reports and other compliance-related information relevant to Microsoft’s cloud services. STP users can download audit reports produced by external auditors and gain insight from Microsoft-authored reports that provide details on how Microsoft builds and operates its cloud services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

describe Compliance Manager

A

Compliance Manager is a workflow-based risk assessment dashboard within the Trust Portal that enables you to track, assign, and verify your organization’s regulatory compliance activities related to Microsoft professional services and Microsoft cloud services such as Office 365, Dynamics 365, and Azure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

describe Azure Government cloud services

A

Azure Government is a separate instance of the Microsoft Azure service. It addresses the security and compliance needs of US federal agencies, state and local governments, and their solution providers. Azure Government offers physical isolation from non-US government deployments and provides screened US personnel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

describe Azure China cloud services

A

Azure China is operated by 21Vianet (Azure China 21Vianet) is a physically separated instance of cloud services located in China, independently operated and transacted by Shanghai Blue Cloud Technology Co., Ltd. (“21Vianet”), a wholly owned subsidiary of Beijing 21Vianet Broadband Data Center Co., Ltd.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Describe Azure Security Center

A

SECURITY TOOL. Azure Security Center is a monitoring service that provides threat protection across all of your services both in Azure, and on-premises.
Security Center can:
Provide security recommendations, Monitor security and automatically apply required security to new services as they come online.
identify potential vulnerabilities before they can be exploited.
Use machine learning to detect and block malware from being installed on your virtual machines and services.
You can also define a list of allowed applications to ensure that only the apps you validate can execute.
Analyze and identify potential inbound attacks and help to investigate threats and any post-breach activity that might have occurred.
Provide just-in-time access control for ports, reducing your attack surface by ensuring the network only allows traffic that you require.

Available as Free or Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Describe Azure Key Vault

A

Azure Key Vault is a centralized cloud service for storing your applications’ secrets. Key Vault helps you control your applications’ secrets by keeping them in a single, central location and by providing secure access, permissions control, and access logging capabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

describe Azure Information Protection (AIP)

A

Azure Information Protection is a cloud-based solution that helps organizations classify and (optionally) protect its documents and emails by applying labels. Labels can be applied automatically (by administrators who define rules and conditions), manually (by users), or with a combination of both (where users are guided by recommendations).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Describe Azure Key Vault

A

SECURITY TOOL. Azure Key Vault is a centralized cloud service for storing your applications’ secrets. Key Vault helps you control your applications’ secrets by keeping them in a single, central location and by providing secure access, permissions control, and access logging capabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

describe Azure Information Protection (AIP)

A

SECURITY TOOL. Azure Information Protection is a cloud-based solution that helps organizations classify and (optionally) protect its documents and emails by applying labels. Labels can be applied automatically (by administrators who define rules and conditions), manually (by users), or with a combination of both (where users are guided by recommendations).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Describe Azure Advanced Threat Protection (Azure ATP)

A

SECURITY TOOL. Azure Advanced Threat Protection is a cloud-based security solution that identifies, detects, and helps you investigate advanced threats, compromised identities, and malicious insider actions directed at your organization. Azure ATP is capable of detecting known malicious attacks and techniques, security issues, and risks against your network.

22
Q

What is the purpose of Azure Firewall?

A

NETWORK SECURITY. A firewall analyses traffic that is directed towards it, then either reject traffic that doesn’t follow the permitted pattern or allow traffic.

23
Q

describe Role-Based Access Control (RBAC)

A

Role-based access control provides fine-grained access management for Azure resources, enabling you to grant users only the rights they need to perform their jobs. RBAC is provided at no additional cost to all Azure subscribers

24
Q

What is Azure Policy?

A

Azure Policy is a service in Azure that you use to create, assign, and, manage policies. These policies enforce different rules and effects over your resources, so those resources stay compliant with your corporate standards and service-level agreements (SLAs).

25
Q

How do you implement an Azure policy?

A
  1. create a policy definition
  2. Assign the definition to resources
    Assign to a specific scope which could range from a management group to a resource group, policy assignments are inherited by all child resources
  3. Review the evaluation results
    review the non-compliant policy results and take any action needed
26
Q

What is the function of Policy Initiatives

A

Policy Initiatives work with Azure Policies.
1. Initiative definition
a set of policy definitions to help track your compliance state for a larger goal
2. Initiative assignment
Assign the definition to a specific scope, which could range from a management group to a resource group

27
Q

What are Resource Locks used for?

A

Resource Locks help you prevent accidental deletion or modification of your Azure resources. You can manage these locks from within the Azure portal. You can set lock level to Read-Only or Can not delete.

28
Q

What are Azure Blueprints?

A

Azure Blueprints enable cloud architects to define a repeatable set of Azure resources that implement and adhere to an organization’s standards, patterns, and requirements. Azure Blueprint enables development teams to rapidly build and deploy new environments with the knowledge that they’re building within organizational compliance with a set of built-in components that speed up development and delivery.

29
Q

Describe Azure Monitor

A

Azure Monitor maximizes the availability and performance of your applications by delivering a comprehensive solution for collecting, analyzing, and acting on telemetry from your cloud and on-premises environments. It helps you understand how your applications are performing and proactively identifies issues affecting them and the resources they depend on. Azure Monitor features can be organized into four categories: Analyze, Respond, Visualize and Integrate.

30
Q

Describe Azure Service Health

A

Azure Service Health is a suite of experiences that provide personalized guidance and support when issues with Azure services affect you. It can notify you, help you understand the impact of issues, and keep you updated as the issue is resolved. Azure Service Health can also help you prepare for planned maintenance and changes that could affect the availability of your resources.
composed of: Azure Status, Service Health, Resource Health. Together, the Azure Service Health components provide you with a comprehensive view of the health status of Azure, at the level of granularity that is most relevant to you.

31
Q

Which of the following could grant or deny access based on the originating IP address?

Azure Active Directory
Azure Firewall
VPN Gateway

A

Azure Firewall.
The Azure Firewall grants server access based on the originating IP address of each request. You create firewall rules that specify ranges of IP addresses. Only clients from these granted IP addresses will be allowed to access the server. Firewall rules also include specific network protocol and port information.

32
Q

Which of the following services would you use to filter internet traffic in your Azure virtual network?

Azure Firewall
Network Security Group
VPN Gateway

A

Network Security Group (NSG).
NSGs allow you to filter network traffic to and from Azure resources in an Azure virtual network. An NSG can contain multiple inbound and outbound security rules that enable you to filter traffic to and from resources by source and destination IP address, port, and protocol.

33
Q

Which of the following provides information about planned maintenance and changes that could affect the availability of your resources?

Azure Monitor
Azure Security Center
Azure Service Health

A

Azure Service Health.
Azure Service Health is a suite of experiences that provide personalized guidance and support when issues with Azure services affect you. It can notify you, help you understand the impact of issues, and keep you updated as the issue is resolved. Azure Service Health can also help you prepare for planned maintenance and changes that could affect the availability of your resources.

34
Q

Which of the following can be used to help you enforce resource tagging so you can manage billing?

Azure Policy
Azure Service Health
Compliance Manager

A

Azure Policy.

Azure Policy can be used to enforce tagging values and rules on resources.

35
Q

Which of the following can be used to define a repeatable set of Azure resources that implement organizational requirements?

Azure Blueprint
Azure Policy
Azure Resource Groups

A

Azure Blueprints. Azure Blueprints enable cloud architects to define a repeatable set of Azure resources that implement and adhere to an organization’s standards, patterns, and requirements. Azure Blueprint enables development teams to rapidly build and deploy new environments with the knowledge that they’re building within organizational compliance with a set of built-in components that speed up development and delivery.

36
Q

Which of the following lets you grant users only the rights they need to perform their jobs?

Azure Policy
Compliance Manager
Role-Based Access Control

A

Role-Based Access Control (RBAC). RBAC lets you to grant users only the rights they need to perform their jobs.

37
Q

Who is responsible for the security of your Azure Storage account access keys?

A

I am responsible, not Azure

38
Q

True or false: you can create your own policies if built-in Azure Policy is not sufficient to your needs

A

TRUE, you can create custom policies using JSON

39
Q

What types of resources are defined as “compute resources”?

A

Compute Services - a category of services in Azure that provides CPU cycles for rent. Virtual Machines are only one type of compute resource. The Marketplace contains many types of resources, not just compute.

40
Q

Which feature within Azure collects all of the logs from various resources into a central dashboard, where you can run queries, view graphs, and create alerts on certain events?

A

Azure Monitor

a centralized dashboard that collects all the logs, metrics and events from your resources

41
Q

What are Azure Availability Zones?

A

Availability Zones - Unique physical locations within an Azure region, made up of one or more datacenters; there is a minimum of three zones in each region; you can manually place your resources in an availability zone for highest availability

42
Q

Azure Services can go through several phases in a Service Lifecycle. What are the three phases called?

A

Private Preview, Public Preview, and General Availability

43
Q

Which method of deploying a virtual machine provides the highest availability SLA?

A

Two or more virtual machines in an availability zone. This offers 99.99% availability when configured correctly.
Note: availability sets = 99.95% and single FM instance = 99.9%

44
Q

Which Azure feature is most likely to deliver the most immediate savings when it comes to reducing Azure costs?

A

Reserved Instances often offer 40% or more savings off of the price of pay-as-you-go virtual machines

45
Q

What is the most number of virtual machines that can me managed under a single Virtual Machine Scale Set?

A

1000

46
Q

What is the basic way of protecting an Azure Virtual Network subnet?

A

Network Security Group (NSG) - a fairly basic set of rules that you can apply to both inbound traffic and outbound traffic that lets you specify what sources, destinations, and ports are allowed to travel through from outside the virtual network to inside the virtual network

47
Q

Logic apps, functions, and service fabric are all examples of what model of compute within Azure?

A

Serverless model

48
Q

What is Single Sign-On?

A

Single Siugn-On is the ability to use the same user ID and password to log into every application that your company has enabled by Azure Active Directory

49
Q

Which tool within Azure helps you to track your compliance with various international standards and government laws?

A

Compliance Manager will track your own compliance with various standards and laws.

50
Q

What is a DDoS attack?

A

Distributed Denial of Service attacks (DDoS) -a type of attack that originates from the Internet that attempts to overwhelm a network with millions of packets of bad traffic that aims to prevent legitimate traffic from getting through

51
Q

What are some current capavilites of Asure Cognitive Services API?

A
  • speak text in an extremely realistic way
  • Recognise faces in picture
  • Translate text from one language to another
  • recognise text in an image
  • create text from audio