Security in 365 Flashcards

1
Q

What secures identities to reach a zero trust environment?

A

Identity & Access Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What helps stop damaging attacks with integrated and automated security?

A

Threat Protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What locates and classifies information anywhere that it lives?

A

Information Protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What strengthens your security posture with insights and guidance?

A

Security Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Establishing identity of end user

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Level of access to a given resource

A

Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Replaces passwords with MFA and ties biometric authentication to a device.

A

Windows Hello

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Provides an option for MFA using a phone app.

A

Microsoft Authenticator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Types of ______________________________

  • User Attributes
  • Devices
  • Application
  • Location
  • Risk
A

Conditional Access Factors (5)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Solution that identifies and remediates compromised accounts

A

Azure AD Identity Protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Solution that identifies, detects, and helps you investigate advanced threats, compromised identities, and malicious insider actions.

A

Azure Advanced Threat Protection (ATP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Location for a unified view of security across your on-premise and cloud workloads.

A

Azure Security Center

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Cloud-based email filtering service.

A

Microsoft Exchange Online Protection (EOP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Collection of insights and information available in the Security Center including activity, authentication, email, compromised PCs, and security incidents.

A

Office 365 Threat Intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Protects integrity of the boot process through drive encryption.

A

BitLocker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Protects apps and data against accidental leaks.

A

Windows Information Protection (WIP)

17
Q

Which 4 activities describe an information protection strategy?

A

Discover, classify, protect, monitor

18
Q

Components of __________________

  • Validating identities
  • Protecting endpoints
  • Evaluating data for malicious content
  • Protecting SaaS applications
  • Protecting on-prem and cloud infrastructure
A

Microsoft Threat Protection (5)

19
Q

Activities in ________

  • Discover
  • Classify
  • Protect
  • Monitor
A

Information Protection Strategy (4)

20
Q

Matches false positives and overrides, and links to create or edit policies.

A

Data Loss Prevention (DLP)

21
Q

Information about how labels are applied, labels classified as records, label trends.

A

Data Governance