Intro to Azure Security Flashcards

(17 cards)

1
Q

What is the responsibility of the cloud provider with Infrastructure as a Service (IaaS)

A

Storage, logical networking, Servers/Virtualization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the responsibility of the customer with Infrastructure as a Service (IaaS)

A

Applications, runtimes, security, databases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the responsibility of the cloud provider with Platform as a Service (PaaS)

A

Storage, logical networking, Servers/Virtualization, runtimes, security, databases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the responsibility of the customer with Platform as a Service (PaaS)

A

Only the applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the responsibility of the cloud provider with Software as a Service (SaaS)

A

Everything - Storage, logical networking, Servers/Virtualization, applications, runtimes, security, databases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Regardless of the cloud service model, what will customers always retain the responsibilities for?

A
  • Data governance and rights management
  • Endpoint protection
  • Account and access management
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Regardless of the cloud service model, what will the cloud service provider always retain the responsibilities for?

A
  • Physical data center
  • Physical network
  • Physical hosts
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What responsibilities vary based on the cloud service model?

A
  • Identity and directory infrastructure
  • Applications
  • Logical Network
  • Operating system
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the two ways azure networks can be managed?

A

managed by Microsoft and managed by us

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What networking model is used in Azure data centers?

A

3-tier topology:
* Core
* Distribution
* Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

in terms of network topology, what elements does an Azure data center contain?

A
  • Edge network
  • Wide area network (WAN)
  • Regional gateways network
  • Data center network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Describe the “Edge network” in an Azure data center

A

Represents a separation point between the Microsoft network and other networks (such as the internet or corporate networks); responsible for providing internet connectivity and ExpressRoute peering into Azure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Describe the “Wide area network (WAN)” in an Azure data center

A

Microsoft’s backbone; provides connectivity between Azure regions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Describe the “Regional gateways network” in an Azure data center

A

A point of aggregation for Azure regions and applies to all data centers within the region; provides connectivity between data centers within the Azure region and enables connectivity with other regions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Describe the “Data center network” in an Azure data center

A

Enables connectivity between data centers and enables communication between servers within the data center; The network is separated into three stages – ingress, middle, and egress. Each stage contains multiple switches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How is traffic routed in the Azure data center network?

A

When a call is made, it enters the ingress switch and from there it can be routed to any available middle switch, and from the middle switch to any available egress switch.

17
Q

What steps are taken when a security issues arises?

A
  1. The customer is notified of the incident.
  2. An immediate investigation is started to provide detailed information regarding the security incident.
  3. Steps are taken to mitigate the effects and minimize the damage of the security incident.