Bash, the Crucial Exams Chat Bot
AI Bot
Azure Security Monitoring and Analytics Flashcards
Microsoft Azure Security Engineer Associate AZ-500 Flashcards
| Front | Back |
| What are KQL queries | Queries written in Kusto Query Language used to analyze data in Azure Monitor Logs |
| What are Role-Based Access Controls (RBAC) in Azure | Mechanisms used to manage access to resources by assigning roles to users and groups |
| What are Secure Score recommendations | Security posture improvement suggestions provided by Azure Security Center |
| What does Azure Defender for Servers offer | Advanced threat protection and monitoring for VMs running in Azure, on-premises, and other clouds |
| What does the Investigation Graph in Azure Sentinel show | A visual representation of relationships between security events for streamlined investigation |
| What is a Log Analytics Workspace | A central repository for Azure Monitor Logs data that enables querying and reporting |
| What is Advanced Threat Analytics (ATA) | A component used to detect and analyze advanced threats targeting organizational accounts and systems |
| What is Azure Firewall | A managed cloud-based network security service to protect Azure environments |
| What is Azure Key Vault's role | Securely storing secrets, encryption keys, and certificates for Azure resources |
| What is Azure Monitor Logs | A tool for collecting, analyzing, and acting on telemetry data from Azure resources |
| What is Azure Policy | A tool that ensures resources comply with organizational standards and governance |
| What is Azure Security Center | A unified infrastructure security management system for strengthening security posture and providing advanced threat protection |
| What is Azure Sentinel | A scalable cloud-native security information and event management (SIEM) and security orchestration automated response (SOAR) solution |
| What is DDoS Protection in Azure | A service that defends Azure applications against Distributed Denial of Service (DDoS) attacks |
| What is Just-In-Time (JIT) VM Access | A feature that reduces attack surfaces by allowing temporary VM access only when needed |
| What is Microsoft Threat Intelligence in Azure Sentinel | A built-in feature that provides up-to-date insights into known threats worldwide |
| What is Network Watcher | A service for monitoring and diagnosing issues in Azure networks |
| What is the Azure Activity Logs | Logs that provide insights into subscription-level events in Azure |
| What is the purpose of Security Baselines in Azure | To provide minimum implementation recommendations for consistent security across Azure services |
| What is threat detection in Azure Security Center | Automated detection of known and new threats targeting Azure resources |
This deck focuses on tools and solutions for monitoring, analyzing, and responding to security incidents in Azure environments.