Microsoft SCI fundamentals assessment 1 Flashcards

(50 cards)

1
Q

Which score measures an organization’s progress in completing actions that help reduce risks associated to data protection and regulatory standards?

A

Compliance score

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What do you use to provide real-time integration between Azure Sentinel and another security source?

A

A connector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which Microsoft portal information about how Microsoft cloud services comply with regulatory standards, such as International Organization for Standardization (ISO)?

A

Microsoft Service Trust Portal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In the shared responsibility model for an Azure deployment, what is Microsoft solely responsible for managing?

A

The management of the physical hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What can you use to provide a user with a two-hour window to complete an administrative task in Azure?

A

Conditional access policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In a hybrid identity model, what can you use to sync identities between Active Directory Domain Services (AD DS) and Azure Active Directory (Azure AD)?

A

Azure AD Connect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the purpose of Azure Active Directory (Azure AD) Password Protection?

A

to prevent users from using specific words in their passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which Azure Active Directory (Azure AD) feature can you use to evaluate group membership and automatically remove users that no longer require membership in a group?

A

Access reviews

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which Azure Active Directory (Azure AD) feature can you use to provide just-in-time (JIT) access to manage Azure resources?

A

Azure AD Privileged Identity Management (PIM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What should you use in the Microsoft 365 security center to view security trends and track the protection status of identities

A

reports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are two capabilities of Microsoft Defender for Endpoint?

A

-automated investigation and remediation
-attack surface reduction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which Microsoft 365 compliance center feature can you use to identify all the documents on a Microsoft Sharepoint online site that contain a specific key word?

A

Content search

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which two tasks can you implement by using data loss prevention (DLP) policies in Microsoft 365?

A

-Display policy tips to users who are about to violate your organization’s policies
-Protect documents in Microsoft OneDrive that contains sensitive information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which Microsoft 365 compliance feature can you use to encrypt content automatically based on specific conditions?

A

sensitivity labels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a use case for implementing information barrier policies in Microsoft 365?

A

to restrict Microsoft Exchange Online email between certain groups within an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What can you use to provision Azure resources across multiple subscriptions in a consistent manner?

A

Azure Blueprints

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Yes or No
All Azure Active Directory (Azure AD) license editions include the same features.

A

no

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

You can manage an Azure Active Directory (Azure AD) tenant by using the Azure portal.

yes or no

A

yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Select Yes if the following statement is true. Otherwise select No:

You must deploy Azure virtual machines to host an Azure Active Directory (Azure AD) tenant.

A

no

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

____________ provides best practices from Microsoft employees, partners, and customers, including tools and guidance to assist in an Azure deployment.

A

The Microsoft Cloud Adoption Framework for Azure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

______ is used to identify, hold, and export electronic information that might be used in an investigation.

22
Q

You can manage Microsoft Intune by using the _________________.

A

Microsoft Endpoint Manager admin center.

23
Q

Federation is used to establish _______ between organizations.

A

a trust relationship

24
Q

Select Yes if the following statement is true. Otherwise, select No:

Applying system updates increases an organization’s secure score in Azure Security Center.

25
Select Yes if the following statement is true. Otherwise, select No: The secure score in Azure Security Center can evaluate resources across multiple Azure subscriptions.
yes
26
Select Yes if the following statement is true. Otherwise, select No: Enabling multi-factor authentication (MFA) increases an organization’s secure score in Azure Security Center.
yes
27
Select Yes if the following statement is true. Otherwise, select No: Verify explicitly is one of the guiding principles of Zero Trust.
yes
28
Select Yes if the following statement is true. Otherwise, select No: Assume breach is one of the guiding principles of Zero Trust.
yes
29
Select Yes if the following statement is true. Otherwise, select No: The Zero Trust security model assumes that a firewall secures the internal network from external threats.
no
30
Select Yes if the following statement is true. Otherwise, select No: Control is a key privacy principle of Microsoft.
yes
31
Select Yes if the following statement is true. Otherwise, select No: Transparency is a key privacy principle of Microsoft.
yes
32
Yes if the following statement is true. Otherwise, select No: Shared responsibility is a key privacy principle of Microsoft.
no
33
_____ a file makes the data in the file readable and usable to viewers that have the appropriate key.
Encrypting
34
Yes if the following statement is true. Otherwise, select No: You can create custom roles in Azure Active Directory (Azure AD).
yes
35
Yes if the following statement is true. Otherwise, select No: Global administrator is a role in Azure Active Directory (Azure AD).
yes
36
Yes if the following statement is true. Otherwise, select No: An Azure Active Directory (Azure AD) use can be assigned only one role.
no
37
Yes if the following statement is true. Otherwise, select No: Azure Active Directory (Azure AD) is deployed to an on-premises environment
no
38
Yes if the following statement is true. Otherwise, select No: Azure Active Directory (Azure AD) is provided as part of a Microsoft 365 subscription.
yes
39
Yes if the following statement is true. Otherwise, select No: Azure Active Directory (Azure AD) is an identity and access management service.
yes
40
With Windows Hello for Business, a user’s biometric data used for authentication __________.
is stored on a local device only.
41
________ requires additional verification, such as a verification code sent to a mobile phone.
Multi-factor authentication (MFA)
42
Yes if the following statement is true. Otherwise, select No: Conditional access policies can use the device state as a signal.
yes
43
Yes if the following statement is true. Otherwise, select No: Conditional access policies apply before first-factor authentication is complete.
no
44
Yes if the following statement is true. Otherwise, select No: Conditional access policies can trigger multi-factor authentication (MFA) if a user attempts to access a specific application.
yes
45
_____ is a cloud-based solution that leverages on-premises Active Directory signals to identify, detect, and investigate advanced threats.
Microsoft Defender for Identity
46
Microsoft Defender for Identity can identify advanced threats from __________ signals.
on-premises Active Directory Domain Services (AD DS)
47
Azure Active Directory (Azure AD) is ________________ used for authentication and authorization.
an identity provider
48
_________________ can use conditional access policies to control sessions in real time.
Microsoft Cloud App Security
49
Azure DDoS Protection Standard can be used to protect ____________.
virtual networks
50
You can use ______ in the Microsoft 365 security center to identify devices that are affected by an alert.
incidents