Bash, the Crucial Exams Chat Bot
AI Bot
AZ-900 Identity, Governance, and Monitoring Flashcards
Microsoft Azure Fundamentals AZ-900 Flashcards
| Front | Back |
| Explain Azure Policy. | A service used to create, assign, and manage policies that enforce different rules over Azure resources to ensure compliance with standards |
| Explain Azure Security Center. | A unified security management system that strengthens security posture, protects against threats, and provides security recommendations |
| Explain Passwordless Authentication. | Authentication methods that don't require users to provide traditional passwords, such as FIDO2 keys or Microsoft Authenticator |
| What are Azure Management Groups? | Containers that help manage access, policies, and compliance across multiple subscriptions |
| What are Azure Monitor metrics? | Numerical values collected at regular intervals that describe some aspect of a system at a particular time |
| What are Azure RBAC Custom Roles? | User-defined roles that provide specific, customized access permissions in addition to built-in roles |
| What are Azure Tags? | Name-value pairs that allow you to categorize resources and view consolidated billing |
| What are Diagnostic Settings in Azure? | Configuration options that determine where platform logs and metrics should be sent |
| What are Managed Identities in Azure? | A feature providing Azure services with automatically managed identities for authenticating to services supporting Azure AD authentication |
| What are the editions of Azure AD available? | Free, Office 365 Apps, Premium P1, and Premium P2 |
| What are the three main elements of RBAC? | Security principal, role definition, and scope |
| What is a Guest User in Azure AD? | An external user invited to access an organization's resources with their own credentials |
| What is a Log Analytics workspace? | A unique environment for Azure Monitor log data where data is collected, aggregated, and analyzed |
| What is a Resource Group? | A container that holds related resources for an Azure solution |
| What is a Service Trust Portal? | A portal providing information, tools, and resources about Microsoft's security, privacy, and compliance practices |
| What is a User Access Administrator? | A role that allows management of user access to Azure resources |
| What is an Azure Management Scope? | The range of resources that the management operation applies to (management groups, subscriptions, resource groups, resources) |
| What is an Azure Resource Graph? | A service that provides efficient resource exploration with the ability to query at scale across subscriptions |
| What is an Azure Resource Lock? | A setting that prevents resources from being accidentally deleted or modified |
| What is Application Insights? | A feature of Azure Monitor that provides application performance monitoring and user behavior analytics |
| What is Azure Active Directory (Azure AD)? | Azure AD is Microsoft's cloud-based identity and access management service that helps users sign in and access resources. |
| What is Azure Activity Log? | A platform log that provides insight into subscription-level events in Azure |
| What is Azure AD B2B? | Azure Active Directory Business-to-Business, a feature enabling secure collaboration with external partners |
| What is Azure AD B2C? | Azure Active Directory Business-to-Consumer, a customer identity access management solution for consumer-facing applications |
| What is Azure AD Connect? | A tool that connects on-premises identity infrastructure to Azure AD |
| What is Azure Advisor? | A service that analyzes your resource configuration and usage telemetry to recommend solutions to optimize deployments |
| What is Azure Blueprint? | A service that enables organizations to define a repeatable set of Azure resources that implements and adheres to standards, patterns, and requirements |
| What is Azure Monitor? | A comprehensive solution for collecting, analyzing, and responding to monitoring data from Azure resources and applications |
| What is Azure Multi-Factor Authentication (MFA)? | A security feature that requires users to provide two or more verification methods to access resources |
| What is Azure Network Watcher? | A service that provides tools to monitor, diagnose, and gain insights into network performance and health in Azure |
| What is Azure Sentinel? | A cloud-native security information and event manager (SIEM) and security orchestration automated response (SOAR) solution |
| What is Azure Service Health? | A service that provides personalized alerts and guidance when Azure service issues affect you |
| What is Conditional Access in Azure AD? | A feature that allows organizations to enforce specific conditions before granting access to resources (e.g., location, device compliance) |
| What is Cost Management in Azure? | A set of tools for monitoring, allocating, and optimizing Azure costs |
| What is Identity Protection in Azure AD? | A tool that detects potential vulnerabilities affecting organizational identities and configures automated responses |
| What is Log Analytics in Azure? | A tool to edit and run log queries with data in Azure Monitor |
| What is Microsoft Defender for Cloud? | A cloud security posture management and cloud workload protection platform for all your Azure, on-premises, and multicloud resources |
| What is Privileged Identity Management (PIM)? | A service that enables you to manage, control, and monitor access to important resources in Azure AD |
| What is Role-Based Access Control (RBAC)? | A system that enables fine-grained access management for Azure resources based on user roles |
| What is the principle of least privilege? | A security concept that recommends granting only the minimum levels of access necessary to complete a task |
This deck focuses on Azure identity services (e.g., Azure AD), governance tools (e.g., RBAC, Azure Policy), and monitoring solutions like Azure Monitor and Log Analytics.