Module 3 - Review Quiz Flashcards
(35 cards)
In MS 365 platform, which service allows organizations to store user information and attributes?
Microsoft 365 Groups
Azure Active Directory
Windows Configuration Designer
Group Policy
Azure Active Directory
An organiztaion has deployed Microsoft 365 applications to all employees. Consider the shared responsibility model, who is responsible for the accounts and identities relating to these employees?
The Organization
The user of the Account
Microsoft, the SaaS Provider
There’s Shared Responsbility between an organization and Microsoft
The Organization
Which of the following measures might an organization implement as part of the Defense in-Depth Security methodoloy?
Multi-factor Authentication for all users.
Ensuring physical Security around Network perimeter.
Locating all its servers in a single physical location.
Ensuring there’s no segmenetation of your corporate Network.
Multi-factor Authentication for all users.
The human resources organization wants to ensure that stored employee data is encrypted. Which security mechanism would they use?
Encryption in Transit
Encryption at Rest
Multi-factor Authenitcation
Hashing
Encryption at Rest
Which of the following best describes the concept of data sovereignty?
Trust no one, Verify everything.
There are regulations that govern the physical locations where data can be stored and how and when it can be transferred, processed, or accessed internationally.
Data, particularly personal data, is subject to the laws and regulations of the country/region in which it is physically collected, held, and/or processed.
Data, particularly personal data, is subject to the laws and regulations of the country/region in which it is physically collected, held, and/or processed.
In which two ways does Microsoft 365 encrypt data?
In utero
At bay
At rest
In transit
At rest
In transit
_________________ is the NEW Security perimeter?
Managed devices.
Identity
Muli-factor Authentication
SaaS
Identity
Administration, Authentication, Authorization, and Auditing are the key factors of __________________________?
Security and Compliance
Azure Active Directory
Identity Infrastructure
IaaS
Identity Infrastructure
In modern Authentication, all Services - identity management, Authorization, including Authentication Services, are provided by ________________________?
A central identity provider.
Azure Active Directory
Internet Service Provider (ISP)
Azure Identity
A central identity provider.
Setting up Single-Sign-On (SSO) between multiple identity providers is called?
Republic
Domain Services
Federation
Cloud App Security Broker
Federation
You are making a purchase from an online vendor. You are required to login using your Facebook, Google, or Apple account. This is an example of what practice?
Federation
Single-Sign-On
Azure Active Directory
Active Directory
Federation
Which relationship allows federated services to access resources?
Trust Relationship
Shared Access Relationship
Claim Relationship
Trust Relationship
Authentication is the process of doing what?
Enabling Federated Services
The process of tracking user behavior.
Verifying that a user or device is who they say they are.
Verifying that a user or device is who they say they are.
Which two key areas does Microsoft Defender cover?
Threat Protection Policies
Service Health
Windows Defender Application Guard
Reports
Threat Protection Policies
Reports
Which of the two features are exclusively part of Microsoft Defender for Office 365 Plan 2?
Attack Simulator
Proactively Hunt for Threats with Advanced Hunting
Safe Links
Anti-Phishing Protection
Attack Simulator
Proactively Hunt for Threats with Advanced Hunting
Microsoft Defender for Endpoint embeds technology built into Windows 10 and MSFT Cloud Services?
True
False
True
Micrsoft Defender for Endpoint includes Microsoft Secure Score for Devices and other Microsoft Solutions including Intune and Microsoft Defender for Cloud?
True
False
True
Microsoft Defender for Identity is a Cloud-Based Security Solution that uses on-premises Active Directory data?
True
False
True
Which tool monitors and analyzes user activities, creates a behavioral baseline for each user and then using built-in intelligence identifies anomalies for suspicious activities, compromised users or insider threats?
MS Activity Report ID
VIVA Insights
Defender for Identity
Windows Defender Application Guard
Defender for Identity
A lead admin for an organization is looking to protect against malicious threats posed by email messages, links, and collaboration tools. Which solution from Microsoft 365 Defender suite is best suited for this purpose?
Microsoft Defender for Identity
Microsoft Defender Advanced Threat Protection
Microsoft Defender for Office 365
Microsoft Defender for Endpoint
Microsoft Defender for Office 365
A Cloud Access Security Broker (CASB) provides protection across 4 areas/pillars: Visibility to detect all cloud services, Data Security, Threat Protection, and Compliance. These pillars represent the basis of the Cloud App Security framework upon which Microsoft Defender for Cloud Apps is built. Which pillar is responsible for identifying and controlling sensitive information?
Threat Protection
Data Security
Compliance Center
Data Security
Admins in the organization are using the Microsoft 365 Defender portal every day. They want to quickly get an understanding of the organization’s current security posture. Which capability in the Microsoft 365 Defender portal will they use?
Reports
Secure Score
Policies
Reports
What Microsoft Software allows for synchronization of on-premise identity provider with Azure Active Directory?
Syncrhonized Identity
MS Cloud Authentication
Azure Active Directory Connect
Azure Active Directory Connect
Personal data and the residency of the data is monitored in Microsoft 365 by which tool?
Microsoft Priva
Microsoft Insights
Microsoft Defender Advanced Threat Protection
Windows Defender Application Guard
Microsoft Priva