Security Flashcards

1
Q

What model operates on the principle of “trust no one, verify everything”?

A

Zero Trust Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What Zero-Trust Methodology principle states always authenticate and authorize based on all available data points?

A

Verify explicitly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which Layer of Security manages access to virtual machines (ports, on-premise, cloud)?

A

Compute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What provides advanced protection for your Azure and on-premise workloads Azure Defender can be found in the Azure Security Center?

A

Azure Defender

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What provides a graphical view with security overlays giving you recommendations and insights for hardening your network resources?

A

Azure Defender – Network Map

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is it called when you need to use code as an additional layer of security to access your account?

A

MFA (Multi-Factor Authenication)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

This Azure service provides users with a unified infrastructure security management system

A

Azure Security Center

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

This Azure service provides a place to securely store cryptographic keys, and other secrets used by your cloud apps

A

Azure Key Vault

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The 2 available subscription tiers for Azure DDOS protection

A

IP Protection and Network Protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does DDoS stand for?

A

Distributed Denial of Service Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

This Azure service lets you centrally create, enforce, and log application and network connectivity policies across subscriptions and virtual networks.

A

Azure Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

This Azure security feature protects sensitive information such as emails and documents with encryption, restricted access, and integrated security in Office apps

A

Azure Information Protection (AIP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

This Azure security component acts as a web-traffic load balancer on layer 7 (http) of the OSI model

A

Azure Application Gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The 4 fundamental built-in roles for Azure Role-Based Access Control (RBAC)

A

Owner, Contributor, Reader, User Access Administrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

This Azure security feature lets you manage multiple Azure subscriptions under a hierarchical structure. Allowing subscriptions to inherit shared conditions and settings applied at a higher level

A

Azure Management Groups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

This Azure service acts as a personalized cloud consultant to help you follow best practices and optimize your Azure environments

A

Azure Advisor

17
Q

The 5 categories of Azure Advisor recommendations

A

High Availability, Security, Performance, Cost, Operational Excellence