Bash, the Crucial Exams Chat Bot
AI Bot
Secure Data and Applications Flashcards
Microsoft Azure Security Engineer Associate AZ-500 Flashcards
| Front | Back |
| Best practice for securing sensitive environment variables? | Store them in Azure Key Vault instead of hardcoding in application code. |
| Difference between symmetric and asymmetric encryption? | Symmetric encryption uses the same key for encryption and decryption, while asymmetric encryption uses a public key for encryption and a private key for decryption. |
| How can Azure storage accounts be made more secure? | Enable encryption, use private endpoints, and enforce firewall rules. |
| How does Azure Active Directory protect applications? | It provides identity management and supports authentication methods like Multi-Factor Authentication. |
| How does input validation enhance application security? | It prevents malicious data entry (e.g., SQL injection or cross-site scripting attacks). |
| How is data encrypted at rest in Azure Storage? | Azure Storage encrypts all data at rest automatically using storage service encryption with AES256. |
| How to protect applications against Distributed Denial-of-Service (DDoS) attacks? | Use Azure DDoS Protection to detect and mitigate DDoS threats automatically. |
| Key benefit of using Azure Key Vault for data security? | Centralized key management and secure secret storage for applications and services. |
| Purpose of application secrets rotation? | Reduce the risk of exposure by periodically updating access credentials or secrets. |
| Recommended method for securing sensitive information in Azure SQL Database? | Use Transparent Data Encryption (TDE) and Always Encrypted for encrypting sensitive data in transit and at rest. |
| What does Azure Security Center monitor? | Azure Security Center monitors security configurations, compliance, and threats to protect Azure resources. |
| What is a shared access signature (SAS) in Azure? | A SAS provides limited access to Azure Storage resources without sharing the account key. |
| What is a web application firewall (WAF) and its use? | A WAF protects web applications by filtering and monitoring HTTP traffic to block malicious activity. |
| What is encryption and why is it essential for securing data? | Encryption is the process of converting data into a secure format to prevent unauthorized access, ensuring confidentiality and integrity. |
| What is role-based access control (RBAC) in Azure? | RBAC enables precise control over access permissions for Azure resources based on user roles. |
| What is the principle of least privilege? | It ensures users and applications only receive the minimum permissions necessary to perform their tasks. |
| What technique ensures that sensitive information is not exposed in application logs or debugging outputs? | Redact sensitive information before logging it and sanitize debug output to exclude sensitive data. |
| Why is HTTPS essential for application security? | It ensures encrypted communication between clients and servers to prevent data interception. |
| Why is regular patching of application dependencies important? | It ensures known vulnerabilities are addressed and reduces the risk of security breaches. |
Front
How does Azure Active Directory protect applications?
Click the card to flip
Back
It provides identity management and supports authentication methods like Multi-Factor Authentication.
Front
Best practice for securing sensitive environment variables?
Back
Store them in Azure Key Vault instead of hardcoding in application code.
Front
How is data encrypted at rest in Azure Storage?
Back
Azure Storage encrypts all data at rest automatically using storage service encryption with AES256.
Front
What does Azure Security Center monitor?
Back
Azure Security Center monitors security configurations, compliance, and threats to protect Azure resources.
Front
Why is regular patching of application dependencies important?
Back
It ensures known vulnerabilities are addressed and reduces the risk of security breaches.
Front
What is a web application firewall (WAF) and its use?
Back
A WAF protects web applications by filtering and monitoring HTTP traffic to block malicious activity.
Front
How can Azure storage accounts be made more secure?
Back
Enable encryption, use private endpoints, and enforce firewall rules.
Front
How to protect applications against Distributed Denial-of-Service (DDoS) attacks?
Back
Use Azure DDoS Protection to detect and mitigate DDoS threats automatically.
Front
What technique ensures that sensitive information is not exposed in application logs or debugging outputs?
Back
Redact sensitive information before logging it and sanitize debug output to exclude sensitive data.
Front
Key benefit of using Azure Key Vault for data security?
Back
Centralized key management and secure secret storage for applications and services.
Front
What is the principle of least privilege?
Back
It ensures users and applications only receive the minimum permissions necessary to perform their tasks.
Front
What is role-based access control (RBAC) in Azure?
Back
RBAC enables precise control over access permissions for Azure resources based on user roles.
Front
Difference between symmetric and asymmetric encryption?
Back
Symmetric encryption uses the same key for encryption and decryption, while asymmetric encryption uses a public key for encryption and a private key for decryption.
Front
Purpose of application secrets rotation?
Back
Reduce the risk of exposure by periodically updating access credentials or secrets.
Front
How does input validation enhance application security?
Back
It prevents malicious data entry (e.g., SQL injection or cross-site scripting attacks).
Front
Recommended method for securing sensitive information in Azure SQL Database?
Back
Use Transparent Data Encryption (TDE) and Always Encrypted for encrypting sensitive data in transit and at rest.
Front
What is encryption and why is it essential for securing data?
Back
Encryption is the process of converting data into a secure format to prevent unauthorized access, ensuring confidentiality and integrity.
Front
What is a shared access signature (SAS) in Azure?
Back
A SAS provides limited access to Azure Storage resources without sharing the account key.
Front
Why is HTTPS essential for application security?
Back
It ensures encrypted communication between clients and servers to prevent data interception.
1/19
This deck addresses securing Azure storage, databases, and application services, with topics including encryption, managing sensitive data, and application security best practices.