Security theory Flashcards
What is MIG?
Microsoft Information Governance (MIG) is a collection of features to govern your data for compliance or regulations.
What is the difference between Retention Policies and RM?
While Records Management (RM) leverages Retention Policies, they perform differently.
Retention labels keep a copy of the content hidden from the user (but they can still delete/modify content from the UI), but RM blocks actions in the UI.
6 Pillars of Zero Trust
- Identities must be verified
- Devices create a large attack surface needing monitoring
- Applications (inc Shadow IT) must be mapped & protected
- Data must be classified, encrypted & labelled
- Infrastructure must be monitored
- Networks need segmenting, encryption & monitoring
What are the THREE features you can configure to provide automated Data classification?
Trainable classifiers
Sensitive Information Types
Exact Data Matches
Sensitivity labels are an example of Data classification. List THREE other areas.
- (Sensitivity labels)
- Retention policies
- Communication compliance
- Insider risk management
What FOUR actions can you view with the activity explorer?
- Read
- Deletion
- Printed
- Copied to network share/USB
True/False: Azure Active Directory (Azure AD) Identity Protection can be used to invoke Multi-Factor Authentication based on a user’s risk level
True. CA is a feature provided by Identity Protection
Hot Area:
Answer Area
______ can use conditional access policies to control sessions in real time.
- Azure Active Directory (Azure AD) Privileged - Identity Management (PIM)
- Azure Defender
- Azure Sentinel
- Microsoft Cloud App Security
Cloud App Security /
MS Defender for Cloud
How many trainable classifiers and specific file extensions can be applied to a single Insider Risk Policy?
5 classifiers / 50 file extensions
What is a Sequence, in regards to Insider Risk Management?
A sequence is a group of two or more potentially risky activities performed one after the other that might suggest an elevated risk.
What FOUR categories of activity could trigger alerts for the Data leaks by the priority users sequence?
- Collection eg. downloading files from SharePoint sites or moving files into a compressed folder.
- Obfuscation eg. renaming files on a device.
- Exfiltration eg. sending emails with attachments outside of your organisation.
- Clean-up eg. deleting files from a device.
What’s required for an organisation to use Peer groups for cumulative exfiltration detection?
Your organisation agrees to share Azure AD data with the compliance portal, including organisation hierarchy and job titles.
What data is typically contained in a security token (claim)?
Issuer
Audience
Expiry/Issued at/Not valid before
Subject
OID/TID
Name
Signature
What tech is the MS ID platform built on?
OpenID Connect
How does Peer groups for cumulative exfiltration detection work?
It looks for peers outside the organisation, based on the following criteria:
- SharePoint sites: Insider risk management identifies peer groups based on users who access similar SharePoint sites.
- Similar organization: Users with reports and team members based on organization hierarchy.
- Similar job title: Users with a combination of organizational distance and similar job titles.
What TWO secondary authentication TYPES are supported in AAD?
OAuth software/hardware, voice-call verification
What SIX authentication methods are available for SSPR?
- Mobile app notification
- Mobile app code
- Mobile phone
- Office phone
- Security questions
What licence is required to allow banned password lists?
Banned password lists are a feature of Azure AD Premium P1
What licence is required to allow PIM?
Azure AD Premium P2
True/False: NSGs can deny inbound traffic from the Internet
TRUE, NSGs deny all in-bound Internet Traffic by default.
What’s an Access Package?
A group of access entitlements needed to fulfil a specific role
What licence is needed to allow Entitlement Management?
Azure AD Premium P2
What licence is needed to allow Access Reviews?
Azure Ad Premium P2
What THREE secondary authentication TECHNOLOGIES are supported in AAD?
Authenticator
Hello for Business
FIDO 2 keys