Bash, the Crucial Exams Chat Bot
AI Bot
Secure Data and Applications Flashcards
Microsoft Azure Security Engineer Associate AZ-500 Flashcards
| Front | Back |
| Best practice for securing sensitive environment variables? | Store them in Azure Key Vault instead of hardcoding in application code. |
| Difference between symmetric and asymmetric encryption? | Symmetric encryption uses the same key for encryption and decryption, while asymmetric encryption uses a public key for encryption and a private key for decryption. |
| How can Azure storage accounts be made more secure? | Enable encryption, use private endpoints, and enforce firewall rules. |
| How does Azure Active Directory protect applications? | It provides identity management and supports authentication methods like Multi-Factor Authentication. |
| How does input validation enhance application security? | It prevents malicious data entry (e.g., SQL injection or cross-site scripting attacks). |
| How is data encrypted at rest in Azure Storage? | Azure Storage encrypts all data at rest automatically using storage service encryption with AES256. |
| How to protect applications against Distributed Denial-of-Service (DDoS) attacks? | Use Azure DDoS Protection to detect and mitigate DDoS threats automatically. |
| Key benefit of using Azure Key Vault for data security? | Centralized key management and secure secret storage for applications and services. |
| Purpose of application secrets rotation? | Reduce the risk of exposure by periodically updating access credentials or secrets. |
| Recommended method for securing sensitive information in Azure SQL Database? | Use Transparent Data Encryption (TDE) and Always Encrypted for encrypting sensitive data in transit and at rest. |
| What does Azure Security Center monitor? | Azure Security Center monitors security configurations, compliance, and threats to protect Azure resources. |
| What is a shared access signature (SAS) in Azure? | A SAS provides limited access to Azure Storage resources without sharing the account key. |
| What is a web application firewall (WAF) and its use? | A WAF protects web applications by filtering and monitoring HTTP traffic to block malicious activity. |
| What is encryption and why is it essential for securing data? | Encryption is the process of converting data into a secure format to prevent unauthorized access, ensuring confidentiality and integrity. |
| What is role-based access control (RBAC) in Azure? | RBAC enables precise control over access permissions for Azure resources based on user roles. |
| What is the principle of least privilege? | It ensures users and applications only receive the minimum permissions necessary to perform their tasks. |
| What technique ensures that sensitive information is not exposed in application logs or debugging outputs? | Redact sensitive information before logging it and sanitize debug output to exclude sensitive data. |
| Why is HTTPS essential for application security? | It ensures encrypted communication between clients and servers to prevent data interception. |
| Why is regular patching of application dependencies important? | It ensures known vulnerabilities are addressed and reduces the risk of security breaches. |
This deck addresses securing Azure storage, databases, and application services, with topics including encryption, managing sensitive data, and application security best practices.