Secure Data and Applications Flashcards
Microsoft Azure Security Engineer Associate AZ-500 Flashcards

| Front | Back |
| Best practice for securing sensitive environment variables? | Store them in Azure Key Vault instead of hardcoding in application code. |
| Difference between symmetric and asymmetric encryption? | Symmetric encryption uses the same key for encryption and decryption, while asymmetric encryption uses a public key for encryption and a private key for decryption. |
| How can Azure storage accounts be made more secure? | Enable encryption, use private endpoints, and enforce firewall rules. |
| How does Azure Active Directory protect applications? | It provides identity management and supports authentication methods like Multi-Factor Authentication. |
| How does input validation enhance application security? | It prevents malicious data entry (e.g., SQL injection or cross-site scripting attacks). |
| How is data encrypted at rest in Azure Storage? | Azure Storage encrypts all data at rest automatically using storage service encryption with AES256. |
| How to protect applications against Distributed Denial-of-Service (DDoS) attacks? | Use Azure DDoS Protection to detect and mitigate DDoS threats automatically. |
| Key benefit of using Azure Key Vault for data security? | Centralized key management and secure secret storage for applications and services. |
| Purpose of application secrets rotation? | Reduce the risk of exposure by periodically updating access credentials or secrets. |
| Recommended method for securing sensitive information in Azure SQL Database? | Use Transparent Data Encryption (TDE) and Always Encrypted for encrypting sensitive data in transit and at rest. |
| What does Azure Security Center monitor? | Azure Security Center monitors security configurations, compliance, and threats to protect Azure resources. |
| What is a shared access signature (SAS) in Azure? | A SAS provides limited access to Azure Storage resources without sharing the account key. |
| What is a web application firewall (WAF) and its use? | A WAF protects web applications by filtering and monitoring HTTP traffic to block malicious activity. |
| What is encryption and why is it essential for securing data? | Encryption is the process of converting data into a secure format to prevent unauthorized access, ensuring confidentiality and integrity. |
| What is role-based access control (RBAC) in Azure? | RBAC enables precise control over access permissions for Azure resources based on user roles. |
| What is the principle of least privilege? | It ensures users and applications only receive the minimum permissions necessary to perform their tasks. |
| What technique ensures that sensitive information is not exposed in application logs or debugging outputs? | Redact sensitive information before logging it and sanitize debug output to exclude sensitive data. |
| Why is HTTPS essential for application security? | It ensures encrypted communication between clients and servers to prevent data interception. |
| Why is regular patching of application dependencies important? | It ensures known vulnerabilities are addressed and reduces the risk of security breaches. |
About the Flashcards
Flashcards for the Microsoft Azure Security Engineer Associate exam help students review core Azure application security terminology and concepts. The deck covers encryption fundamentals (symmetric vs asymmetric), key and secret management with Azure Key Vault, data protection for storage and databases (TDE, Always Encrypted, AES256), and secure transport like HTTPS and SAS tokens.
It also addresses identity and access controls (RBAC, Azure Active Directory, MFA), network and perimeter defenses (WAF, DDoS Protection, private endpoints, firewall rules), monitoring with Azure Security Center, and secure development and operations practices such as input validation, sensitive logging redaction, patching, and secret rotation.
Topics covered in this flashcard deck:
- Encryption and key management
- Identity and access control
- Storage and database encryption
- Network and perimeter security
- Secure coding and logging
- Secrets rotation and storage