dec-2(m) Flashcards

1
Q

Entra Application Proxy. When to use? what is the service running on the cloud side and on premise?

A

To enable users to access on-premises web applications (RDP, sharepoint, teams, etc) from remote client. Proxy service on the cloud side and Proxy connector on premises. You can enable single-sign-on (SSO), but
proxy does not authenticate user Azure file share access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which SAS can be used and signed with Entra ID credential? What service(s) it can secure?

A

User delegtion SAS, Blob

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

2 DDos Protection SKUS(s)?

A

Network Protection, IP-Protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

which service can be interagrated with both DDos Protection SKUS?

A

Azure Firewall Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which DDos SKU provides Cost-protection and rapid-response team support?

A

Network Protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Is a Monitoring role is enough to set up container insight and monitor your AKS cluster?

A

No. A monitoring role allows to read monitoring data and edit monitoring settings within Azure monitor, but does not enable insight. Need Log Analytics contributor role.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what 3 things you are settings for group membership access review?

A

review setting (group or M360 group with guest) -> select group
scope (guest user only or all users). - > select all users so that all users of group be reviewed.
reviewer setting -> select group owner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

to allow group owners to create their own group access review, what to do? To configure this, what role is needed to configure?

A

You need to be at least Identity Governance administrator. Global adim works.
Go to Identity Governance-> setting. On the Delegate who can create and manage access reviews page, set Group owners can create and manage access reviews for groups they own to Yes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What KV access policy permissions is needed for Always encryption?

A

get, list, unwrap key, wrap key, create, sign, verify

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What encryption keys are involved in Always encryption?

A

column encryption key, column master key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In Always encryption, which encryption types are used for SSN column? How about for Salary column?

A

Deterministric (Equation-based Search with SSN column).
Radonmized (no computation with Salary column).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which Sentinel connector is for sign-in log?

A

Azure AD connector including user sign-in, audit and provisioning (user,group).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which Sentinel connector is for risk sign in attempt?

A

Azure AD identity protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

deletion of resource lock on VM appears in which log?

A

Activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Owner assignment to a resource group can be searched in which log?

A

Activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which client devices are supporting P2S VPN with Azure AD authentication?

A

Windows 10, Mac OS.

17
Q

Scenario: access to dev.azure.com (Azure pipeline), access to dns resolver (1.1.1.1).

what resources and rules we need?

A

Azure Firewall policy and 2 rules (application rule, and network rule) defined under it

18
Q

Allow access to SQL. Which firewall rule?

A

Application rule based on dns name like server1.database.windows.net

19
Q

Remote desktop connection using Azure Firewall. What do you need?

A

DNAT (Destination Network address Translation)

20
Q

URL filtering. Which Firewall SKU?

A

Premium

21
Q

Two restrictions to think about in Azure Disk Encryption. (i.e. VM series, and OS)

A

Basic and A series VM is not supported.
Windows only. And, Server core OS needs bdehdcfg

22
Q

To enable dynamic membership, what license needed?

A

P1

23
Q

Can JIT access to VM protected by Firewall in the same VNET?

A

Yes

24
Q

Can JIT access to VM protected by Firewall controlled by Firewall Manager?

A

No

25
Q

In Scenario with MDC and MMA (Microsoft Monitoring Agent), what resource and key are needed for onboarding?

A

Log Analytics workspace, and its workspace key

26
Q

what to use to protect backend servers in authentication

A

Managed identity

27
Q

To remediate the non-compliance policy, what to do?

A

Modify the policy assignment and create a remediation task.

28
Q

To allow access from specific FD to Function App or Web app, what needs to be done?

A

Add access restriction rule with the service tag ‘AzureFrontDoor.Backend’ and Further filter the specific instance with X-Azure-FDID header.

29
Q

What is the cloud-based workflow automation for MDC?

A

Logic app

30
Q

Can you attach NSG to ACR?

A

No. NSG can be attached to NIC or subnet

31
Q

Is Conditional Access related to Access Review?

A

No