Topic 2 Flashcards
Select the answer that correctly completes the sentence.
Applications registered in Azure Active Directory (Azure AD) are associated automatically to a
↘
- guest account
- managed identity
- service principal
- user account
service principal
Which three authentication methods does Windows Hello for Business support? Each correct answer presents a complete solution.
A. fingerprint
B. facial recognition
C. PIN
D. email verification
E. security question
A. fingerprint
B. facial recognition
C. PIN
Select the answer that correctly completes the sentence.
When you enable security defaults in Azure Directory (Azure AD), ________ will be enabled for all Azure AD users.
↘
- Azure AD Identity Protection
- Azure AD Privileged Identity Management (PIM)
- multi-factor authentication (MFA)
multi-factor authentication (MFA)
You have an Azure subscription.
You need to implement approval-based, time-bound role activation.
What should you use?
A. Windows Hello for Business
B. Azure Active Directory (Azure AD) Identity Protection
C. access reviews in Azure Active Directory (Azure AD)
D. Azure Active Directory (Azure AD) Privileged Identity Management (PIM)
D. Azure Active Directory (Azure AD) Privileged Identity Management (PIM)
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
- Global administrators are exempt from conditional access policies
- A conditional access policy can add users to Azure Active Directory (Azure AD)
- Conditional access policies can force the use of multi-factor authentication (MFA) to access cloud apps
- Global administrators are exempt from conditional access policies → No
- A conditional access policy can add users to Azure Active Directory (Azure AD) → No
- Conditional access policies can force the use of multi-factor authentication (MFA) to access cloud apps → Yes
When security defaults are enabled for an Azure Active Directory (Azure AD) tenant, which two requirements are enforced?
A. All users must authenticate from a registered device.
B. Administrators must always use Azure Multi-Factor Authentication (MFA).
C. Azure Multi-Factor Authentication (MFA) registration is required for all users.
D. All users must authenticate by using passwordless sign-in.
E. All users must authenticate by using Windows Hello.
B. Administrators must always use Azure Multi-Factor Authentication (MFA).
C. Azure Multi-Factor Authentication (MFA) registration is required for all users.
Which type of identity is created when you register an application with Active Directory (Azure AD)?
A. a user account
B. a user-assigned managed identity
C. a system-assigned managed identity
D. a service principal
D. a service principal
Which three tasks can be performed by using Azure Active Directory (Azure AD) Identity Protection?
A. Configure external access for partner organizations.
B. Export risk detection to third-party utilities.
C. Automate the detection and remediation of identity based-risks.
D. Investigate risks that relate to user authentication.
E. Create and automatically assign sensitivity labels to data.
C. Automate the detection and remediation of identity based-risks.
D. Investigate risks that relate to user authentication.
B. Export risk detection to third-party utilities.
Select the answer that correctly completes the sentence.
When using multi-factor authentication (MFA), a password is considered something you
↘
- are
- have
- know
- share
know
Password = know
Device / code / key = have
Biometric = you are
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
- Windows Hello for Business can use the Microsoft Authenticator app as an authentication
- Windows Hello for Business can use a PIN code as an authentication method
- Windows Hello for Business authentication information syncs across all the devices registered by a user
- Windows Hello for Business can use the Microsoft Authenticator app as an authentication → No
- Windows Hello for Business can use a PIN code as an authentication method → Yes
- Windows Hello for Business authentication information syncs across all the devices registered by a user → No
Select the answer that correctly completes the sentence.
An Azure resource can use a system-assigned _________ to access Azure services.
↘
- Azure Active Directory (Azure AD) joined device
- managed identity
- service principal
- user identity
managed identity
Select the answer that correctly completes the sentence.
You can use _____ in the Microsoft 365 Defender portal to identify devices that are affected by an alert.
↘
- classifications
- incidents
- policies
- Secure score
incidents
What are two capabilities of Microsoft Defender for Endpoint?
A. automated investigation and remediation
B. transport encryption
C. shadow IT detection
D. attack surface reduction
A. automated investigation and remediation
D. attack surface reduction
Match the Azure networking service to the appropriate description.
Each service may be used once, more than once, or not at all.
Services
- Azure Bastion
- Azure Firewall
- Network security group (NGS)
Answer Area
- Provides Network Address Translation (NAT) services
- Provides secure and seamless Remote Desktop connectivity to Azure virtual machines
- Provides traffic filtering that can be applied to specific network interfaces on a virtual network
- Provides Network Address Translation (NAT) services → Azure Firewall
- Provides secure and seamless Remote Desktop connectivity to Azure virtual machines → Azure Bastion
- Provides traffic filtering that can be applied to specific network interfaces on a virtual network → Network security group (NSG)
Select the answer that correctly completes the sentence.
- Azure Advisor
- Azure Bastion
- Azure Monitor
- Azure Sentinel
↘
is a cloud-native security information and event management (SIEM) and security orchestration automated response (SOAR) solution used to provide a single solution for alert detection, threat visibility, proactive hunting, and threat response.
Azure Sentinel
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
- Azure Defender can detect vulnerabilities and threats for Azure Storage
- Cloud Security Posture Management (CSPM) is available for all Azure subscriptions
- Azure Security Center can evaluate the security of workloads deployed to Azure or on-premises
- Azure Defender can detect vulnerabilities and threats for Azure Storage → Yes
- Cloud Security Posture Management (CSPM) is available for all Azure subscriptions → Yes
- Azure Security Center can evaluate the security of workloads deployed to Azure or on-premises → Yes
Select the answer that correctly completes the sentence.
- Reports
- Hunting
- Attack simulator
- Incidents
↘
in the Microsoft 365 security center to view an aggregation of alerts that relate to the same attack.
Incidents
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
- Network security groups (NSGs) can deny inbound traffic from the internet
- Network security groups (NSGs) can deny outbound traffic to the internet
- Network security groups (NSGs) can filter traffic based on IP address, protocol, and port
- Network security groups (NSGs) can deny inbound traffic from the internet → Yes
- Network security groups (NSGs) can deny outbound traffic to the internet → Yes
- Network security groups (NSGs) can filter traffic based on IP address, protocol, and port → Yes
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
- Microsoft Intune can be used to manage Android devices
- Microsoft Intune can be used to provision Azure subscription
- Microsoft Intune can be used to manage organization-owned devices and personal devices
- Microsoft Intune can be used to manage Android devices → Yes
- Microsoft Intune can be used to provision Azure subscription → No
- Microsoft Intune can be used to manage organization-owned devices and personal devices → Yes
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
- You can create one Azure Bastion per virtual network
- Azure Bastion provides secure user connections by using RDP
- Azure Bastion provides a secure connection to an Azure virtual machine by using the Azure portal
- You can create one Azure Bastion per virtual network → Yes
- Azure Bastion provides secure user connections by using RDP → Yes
- Azure Bastion provides a secure connection to an Azure virtual machine by using the Azure portal → Yes
What feature in Microsoft Defender for Endpoint provides the first line of defense against cyberthreats by reducing the attack surface?
A. automated remediation
B. automated investigation
C. advanced hunting
D. network protection
network protection
Select the answer that correctly completes the sentence.
In Microsoft Sentinel, you can automate common tasks by using
↘
- deep investigation tools
- hunting search-and-query tools
- playbooks
- workbooks
playbooks
Which two types of resources can be protected by using Azure Firewall?
A. Azure virtual machines
B. Azure Active Directory (Azure AD) users
C. Microsoft Exchange Online inboxes
D. Azure virtual networks
E. Microsoft SharePoint Online sites
A. Azure virtual machines
D. Azure virtual networks
You plan to implement a security strategy and place multiple layers of defense throughout a network infrastructure.
Which security methodology does this represent?
A. threat modeling
B. identity as the security perimeter
C. defense in depth
D. the shared responsibility model
defense in depth