Understand Security, Privacy, Compliance, and Trust Flashcards

1
Q

What is a Network Security Group (NSG)?

A

It allows or denies inbound network traffic to your Azure resources. Think of a network security group as a cloud-level firewall for your network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What’s Multi-Factor Authentication (MFA)?

A

It is a form of authentication that requires more than one element for full authentication. These elements can fall into three categories: something you know (security question), something you own (mobile app, token generating device), something you are (fingerprint, face scan).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What’s an identity?

A

It is something that can be authenticated - users, applications, servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What’s a principal?

A

It is an identity acting with certain roles or claims.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What’s a service principal?

A

It is an identity that is used by a service or an application and can be assigned roles.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Role Based Access Control?

A

Roles are sets of permissions, like “Read-only” or “Contributor”, that users can be granted to access an Azure service instance. Identities are mapped to roles directly or through group membership.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What’s Azure AD Privileged Identity Management (PIM)?

A

It is an additional, paid-for offering that provides oversight of role assignments, self-service, and just-in-time role activation and Azure AD and Azure resource access reviews.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What’s encryption?

A

It is the process of making data unreadable and unusable to unauthorized viewers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What’s the difference between symmetric and asymmetric encryption?

A

Symmetric encryption uses the same key to encrypt and decrypt the data, while in asymmetric encryption either key can encrypt the data but a single key can’t decrypt its own encrypted data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What’s Azure Key Vault?

A

It is a cloud service that works as a secure secrets store. Key Vault allows you to create multiple secure containers, called vaults. Key Vault is designed to support any type of secret. These secrets could be passwords, database credentials, API keys, and certificates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What’s Azure Application Gateway?

A

It is a load balancer that includes a web application firewall that provides protection from common, known vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What’s DDoS?

A

Distributed Denial of Service is an attack that attempts to overwhelm a network resource by sending so many requests that the resource becomes slow or unresponsive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How does Azure DDoS Protection work?

A

It identifies the attacker’s attempt to overwhelm the network and blocks further traffic from reaching Azure services. Legitimate traffic from customers still flows into Azure without any interruption of service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What’s defense in depth?

A

It is a strategy that employs a series of mechanisms to slow the advance of an attack aimed at acquiring unauthorized access to information. Each layer provides protection so that if one layer is breached, a subsequent layer is already in place to prevent further exposure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

To which scopes can RBAC be applied:

  • Subscription
  • Resource group
  • Files and folders withing a Linux filesystem
  • Resource
A
  • Subscription
  • Resource group
  • Resource

Files and folders within a Linux file system can be secured with various methods, but not with RBAC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does web application firewall (WAF) provide protection from?

A
  • cross-site scripting (XSS)
  • SQL-injection
17
Q

What network security groups (NSG) are for?

A

Restricting unnecessary communication between virtual machines.

18
Q

What’s ExpressRoute for?

A

It provides a dedicated, private connection between your network (on-premise) and Azure.

19
Q

What is Azure Security Center (ASC)?

A

It is a monitoring service that provides threat protection across all of your services both in Azure, and on-premises.

20
Q

When should the input be validated?

A

Always

21
Q

What is a secret in Key Vault?

A

It is a name-value pair of strings.

name - 1-127 characters long, contain only alphanumeric characters and dashes; unique per vault

value - UTF-8 string up to 25 KB

22
Q

Command to create a key vault

A

az keyvault create –resource-group {rg} –name {name}

23
Q

Command to create a secret

A

az keyvault secret set –name {name} –value {value} –vault-name {vault_name}

24
Q

What’s Azure Information Protection (AIP)?

A

It is a cloud-based solution that helps an organization to classify and optionally, protect its documents and emails by applying labels.

25
Q

What’s Advanced Threat Protection?

A

It is a cloud-based security solution that identifies, detects, and helps you investigate advanced threats, compromised identities, and malicious insider actions directed at your organization.