Module 3 - Review Quiz Flashcards

(35 cards)

1
Q

In MS 365 platform, which service allows organizations to store user information and attributes?

Microsoft 365 Groups
Azure Active Directory
Windows Configuration Designer
Group Policy

A

Azure Active Directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An organiztaion has deployed Microsoft 365 applications to all employees. Consider the shared responsibility model, who is responsible for the accounts and identities relating to these employees?

The Organization
The user of the Account
Microsoft, the SaaS Provider
There’s Shared Responsbility between an organization and Microsoft

A

The Organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following measures might an organization implement as part of the Defense in-Depth Security methodoloy?

Multi-factor Authentication for all users.
Ensuring physical Security around Network perimeter.
Locating all its servers in a single physical location.
Ensuring there’s no segmenetation of your corporate Network.

A

Multi-factor Authentication for all users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The human resources organization wants to ensure that stored employee data is encrypted. Which security mechanism would they use?

Encryption in Transit
Encryption at Rest
Multi-factor Authenitcation
Hashing

A

Encryption at Rest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following best describes the concept of data sovereignty?

Trust no one, Verify everything.

There are regulations that govern the physical locations where data can be stored and how and when it can be transferred, processed, or accessed internationally.

Data, particularly personal data, is subject to the laws and regulations of the country/region in which it is physically collected, held, and/or processed.

A

Data, particularly personal data, is subject to the laws and regulations of the country/region in which it is physically collected, held, and/or processed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In which two ways does Microsoft 365 encrypt data?

In utero
At bay
At rest
In transit

A

At rest
In transit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

_________________ is the NEW Security perimeter?

Managed devices.
Identity
Muli-factor Authentication
SaaS

A

Identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Administration, Authentication, Authorization, and Auditing are the key factors of __________________________?

Security and Compliance
Azure Active Directory
Identity Infrastructure
IaaS

A

Identity Infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In modern Authentication, all Services - identity management, Authorization, including Authentication Services, are provided by ________________________?

A central identity provider.
Azure Active Directory
Internet Service Provider (ISP)
Azure Identity

A

A central identity provider.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Setting up Single-Sign-On (SSO) between multiple identity providers is called?

Republic
Domain Services
Federation
Cloud App Security Broker

A

Federation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

You are making a purchase from an online vendor. You are required to login using your Facebook, Google, or Apple account. This is an example of what practice?

Federation
Single-Sign-On
Azure Active Directory
Active Directory

A

Federation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which relationship allows federated services to access resources?

Trust Relationship
Shared Access Relationship
Claim Relationship

A

Trust Relationship

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Authentication is the process of doing what?

Enabling Federated Services
The process of tracking user behavior.
Verifying that a user or device is who they say they are.

A

Verifying that a user or device is who they say they are.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which two key areas does Microsoft Defender cover?

Threat Protection Policies
Service Health
Windows Defender Application Guard
Reports

A

Threat Protection Policies
Reports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the two features are exclusively part of Microsoft Defender for Office 365 Plan 2?

Attack Simulator
Proactively Hunt for Threats with Advanced Hunting
Safe Links
Anti-Phishing Protection

A

Attack Simulator
Proactively Hunt for Threats with Advanced Hunting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Microsoft Defender for Endpoint embeds technology built into Windows 10 and MSFT Cloud Services?

True
False

17
Q

Micrsoft Defender for Endpoint includes Microsoft Secure Score for Devices and other Microsoft Solutions including Intune and Microsoft Defender for Cloud?

True
False

18
Q

Microsoft Defender for Identity is a Cloud-Based Security Solution that uses on-premises Active Directory data?

True
False

19
Q

Which tool monitors and analyzes user activities, creates a behavioral baseline for each user and then using built-in intelligence identifies anomalies for suspicious activities, compromised users or insider threats?

MS Activity Report ID
VIVA Insights
Defender for Identity
Windows Defender Application Guard

A

Defender for Identity

20
Q

A lead admin for an organization is looking to protect against malicious threats posed by email messages, links, and collaboration tools. Which solution from Microsoft 365 Defender suite is best suited for this purpose?

Microsoft Defender for Identity
Microsoft Defender Advanced Threat Protection
Microsoft Defender for Office 365
Microsoft Defender for Endpoint

A

Microsoft Defender for Office 365

21
Q

A Cloud Access Security Broker (CASB) provides protection across 4 areas/pillars: Visibility to detect all cloud services, Data Security, Threat Protection, and Compliance. These pillars represent the basis of the Cloud App Security framework upon which Microsoft Defender for Cloud Apps is built. Which pillar is responsible for identifying and controlling sensitive information?

Threat Protection
Data Security
Compliance Center

A

Data Security

22
Q

Admins in the organization are using the Microsoft 365 Defender portal every day. They want to quickly get an understanding of the organization’s current security posture. Which capability in the Microsoft 365 Defender portal will they use?

Reports
Secure Score
Policies

23
Q

What Microsoft Software allows for synchronization of on-premise identity provider with Azure Active Directory?

Syncrhonized Identity
MS Cloud Authentication
Azure Active Directory Connect

A

Azure Active Directory Connect

24
Q

Personal data and the residency of the data is monitored in Microsoft 365 by which tool?

Microsoft Priva
Microsoft Insights
Microsoft Defender Advanced Threat Protection
Windows Defender Application Guard

A

Microsoft Priva

25
When browsing Microsoft compliance documentation in the Service Trust Portal, you have found several documents that are specific to your industry. What is the best way of ensuring you keep up to date with the latest updates? Print each document so you can easily refer them. Download each document. Save the document to MyLibrary Save them to OneDrive
Save the document to MyLibrary
26
Microsoft's approach to privacy is built on six principles: Three of the principles are strong legal protectiohn for privacy, no content-based targeting, and benefits to the customer from any data we collect. Identitfy the three other principles that are part of Microsoft's approach to privacy? Customer Control, Transparency, and Zero Trust Shared Responsibility, Transparency, and Security Shared Responsibility, Transparency, and Zero Trust Customer Control, Transparency, and Security
Customer Control, Transparency, and Security
27
________________________________ security principles are an understanding that threats can come from inside or outside an organization's Network? User Network Implied Trust Zero-Trust
Zero-Trust
28
Which identity model is not connected to any on-premises directory or external authentication system? Federated Identity On-premises Identity Cloud Identity Hybrid Identity
Cloud Identity
29
You are the security administrator for your organization. You are concerned that users may become targets of phishing attacks and you want to help secure their identities in the event that user passwords become compromises. Which product, feature, or service should you configure? Conditional Access Access Reviews Azure Active Directory Connect MFA
MFA (Multi-factor Authentication)
30
The Chief Information Security Office (CISO) for your organization has requested Security training for all users as part of the risk and compliance audit. Part of this security training involves running phishing campaigns against the users. What Microsoft 365 Service or feature can be used to accomplish this task? Microsoft 365 Defender Attack Simulator Microsoft Priva Microsoft 365 Phishing Simulator Microsoft Secure Score
Microsoft 365 Defender Attack Simulator
31
Your organization wants to enable users to use their own devices (BYOD) to access corporate data resources. Users have expressed privacy concerns with the device enrollment process. What feature or service can you implement to manage the data without requiring device enrollment? BitLocker Mobile Device Management (MDM) Windows Defender Application Guard Mobile Application Management (MAM)
Mobile Application Management (MAM)
32
The Office 365 attack simulator is part of the ________________________? Microsoft 365 E5 Office 365 E5 Office 365 E3 Microsoft 365 E3
Microsoft 365 E5
33
Data residency answers which of the following questions? Where is my data stored? What encryption is used to protect my data? Who has access to my data? Which security standards are applied to my data?
Where is my data stored?
34
Which Microsoft 365 tool can organizations use to track their progress against industry compliance standards? GDPR Accelerator Compliance Manager Service Trust Portal Compliance Dashboard
Compliance Manager
35
_________________________ is the tool that allows you to track improvement actions to improve your security posture? Microsoft Defender Advanced Threat Protection Windows Defender Application Guard Advanced Audit Secure Score
Secure Score