SC-900 Flashcards
(158 cards)
What is the shared responsibility model?
identifies which security tasks are handled by the cloud provider and which are are handled by the customer
True or False: For all cloud deployment types, you, the cloud customer, own your data and identities
True
What are the typical layers for defense in depth?
Physical, Identity and Access, Perimeter, Network, Compute, Applications, Data
What is CIA?
Confidentiality, Integrity, and Availability
Explain the C in CIA
confidentiality refers to the need to keep confidential sensitive data such as customer information, passwords, or financial data.
Explain the I in CIA
Integrity refers to keeping data or messages correct.
Explain the A in CIA
Availability refers to making data available to those who need it, when they need it.
What are the Zero Trust Model’s guiding principles?
Verify Explicitly, Use Rule of Least Privilege, Assume Breach
What are the six pillars of Zero Trust Model?
Identities, Devices, Applications, Data, Infrastructure, Networks
What is the pithy Zero Trust saying?
Trust no one, verify everything
What is encryption?
The process of making data unreadable and usable to unauthorized viewers
What decrypts encrypted data?
a key
What is symmetric encryption?
uses the same key to encrypt and decrypt the data
What is asymmetric encryption?
uses a public key and private key pair
What is hashing?
uses an algorithm to convert text to a unique fixed length value called a hash
When using a hash, will it produce the same hash value every time identical text is put into it?
Yes
What does it mean to salt a hash?
Adding a fixed length random value to the input of the has functions
What is Governance?
A system of rules, practices, and processes an organization uses to direct and control its activities.
What is Risk Management?
the process of identifying, assessing, and responding, to threats or events that can impact company or customer objectives
What is Compliance?
refers to the country/region, state, or federal laws or even multi-national regulations that an organization must follow
An organization has deployed Microsoft 365 applications to all employees. Considering the shared responsibility model, who is responsible for the accounts and identities relating to these employees?
The organization
Describe data sovereignty
Data, particularly personal data, is subject to the laws and regulations of the country/region in which it’s physically collected, held, or processed
What is Authentication?
the process of proving a person is who they say they are
What is Authorization?
the process of deciding what access an authorized individual has