Bash, the Crucial Exams Chat Bot
AI Bot
AZ-900 Identity, Governance, and Monitoring Flashcards
Front | Back |
Explain Azure Policy. | A service used to create, assign, and manage policies that enforce different rules over Azure resources to ensure compliance with standards |
Explain Azure Security Center. | A unified security management system that strengthens security posture, protects against threats, and provides security recommendations |
Explain Passwordless Authentication. | Authentication methods that don't require users to provide traditional passwords, such as FIDO2 keys or Microsoft Authenticator |
What are Azure Management Groups? | Containers that help manage access, policies, and compliance across multiple subscriptions |
What are Azure Monitor metrics? | Numerical values collected at regular intervals that describe some aspect of a system at a particular time |
What are Azure RBAC Custom Roles? | User-defined roles that provide specific, customized access permissions in addition to built-in roles |
What are Azure Tags? | Name-value pairs that allow you to categorize resources and view consolidated billing |
What are Diagnostic Settings in Azure? | Configuration options that determine where platform logs and metrics should be sent |
What are Managed Identities in Azure? | A feature providing Azure services with automatically managed identities for authenticating to services supporting Azure AD authentication |
What are the editions of Azure AD available? | Free, Office 365 Apps, Premium P1, and Premium P2 |
What are the three main elements of RBAC? | Security principal, role definition, and scope |
What is a Guest User in Azure AD? | An external user invited to access an organization's resources with their own credentials |
What is a Log Analytics workspace? | A unique environment for Azure Monitor log data where data is collected, aggregated, and analyzed |
What is a Resource Group? | A container that holds related resources for an Azure solution |
What is a Service Trust Portal? | A portal providing information, tools, and resources about Microsoft's security, privacy, and compliance practices |
What is a User Access Administrator? | A role that allows management of user access to Azure resources |
What is an Azure Management Scope? | The range of resources that the management operation applies to (management groups, subscriptions, resource groups, resources) |
What is an Azure Resource Graph? | A service that provides efficient resource exploration with the ability to query at scale across subscriptions |
What is an Azure Resource Lock? | A setting that prevents resources from being accidentally deleted or modified |
What is Application Insights? | A feature of Azure Monitor that provides application performance monitoring and user behavior analytics |
What is Azure Active Directory (Azure AD)? | Azure AD is Microsoft's cloud-based identity and access management service that helps users sign in and access resources. |
What is Azure Activity Log? | A platform log that provides insight into subscription-level events in Azure |
What is Azure AD B2B? | Azure Active Directory Business-to-Business, a feature enabling secure collaboration with external partners |
What is Azure AD B2C? | Azure Active Directory Business-to-Consumer, a customer identity access management solution for consumer-facing applications |
What is Azure AD Connect? | A tool that connects on-premises identity infrastructure to Azure AD |
What is Azure Advisor? | A service that analyzes your resource configuration and usage telemetry to recommend solutions to optimize deployments |
What is Azure Blueprint? | A service that enables organizations to define a repeatable set of Azure resources that implements and adheres to standards, patterns, and requirements |
What is Azure Monitor? | A comprehensive solution for collecting, analyzing, and responding to monitoring data from Azure resources and applications |
What is Azure Multi-Factor Authentication (MFA)? | A security feature that requires users to provide two or more verification methods to access resources |
What is Azure Network Watcher? | A service that provides tools to monitor, diagnose, and gain insights into network performance and health in Azure |
What is Azure Sentinel? | A cloud-native security information and event manager (SIEM) and security orchestration automated response (SOAR) solution |
What is Azure Service Health? | A service that provides personalized alerts and guidance when Azure service issues affect you |
What is Conditional Access in Azure AD? | A feature that allows organizations to enforce specific conditions before granting access to resources (e.g., location, device compliance) |
What is Cost Management in Azure? | A set of tools for monitoring, allocating, and optimizing Azure costs |
What is Identity Protection in Azure AD? | A tool that detects potential vulnerabilities affecting organizational identities and configures automated responses |
What is Log Analytics in Azure? | A tool to edit and run log queries with data in Azure Monitor |
What is Microsoft Defender for Cloud? | A cloud security posture management and cloud workload protection platform for all your Azure, on-premises, and multicloud resources |
What is Privileged Identity Management (PIM)? | A service that enables you to manage, control, and monitor access to important resources in Azure AD |
What is Role-Based Access Control (RBAC)? | A system that enables fine-grained access management for Azure resources based on user roles |
What is the principle of least privilege? | A security concept that recommends granting only the minimum levels of access necessary to complete a task |
Front
What is Log Analytics in Azure?
Click the card to flip
Back
A tool to edit and run log queries with data in Azure Monitor
Front
What are the three main elements of RBAC?
Back
Security principal, role definition, and scope
Front
Explain Azure Policy.
Back
A service used to create, assign, and manage policies that enforce different rules over Azure resources to ensure compliance with standards
Front
Explain Azure Security Center.
Back
A unified security management system that strengthens security posture, protects against threats, and provides security recommendations
Front
What is Azure Active Directory (Azure AD)?
Back
Azure AD is Microsoft's cloud-based identity and access management service that helps users sign in and access resources.
Front
What are Azure Monitor metrics?
Back
Numerical values collected at regular intervals that describe some aspect of a system at a particular time
Front
What is Azure Advisor?
Back
A service that analyzes your resource configuration and usage telemetry to recommend solutions to optimize deployments
Front
What is Azure AD B2B?
Back
Azure Active Directory Business-to-Business, a feature enabling secure collaboration with external partners
Front
What is the principle of least privilege?
Back
A security concept that recommends granting only the minimum levels of access necessary to complete a task
Front
What are the editions of Azure AD available?
Back
Free, Office 365 Apps, Premium P1, and Premium P2
Front
What is Microsoft Defender for Cloud?
Back
A cloud security posture management and cloud workload protection platform for all your Azure, on-premises, and multicloud resources
Front
What is a User Access Administrator?
Back
A role that allows management of user access to Azure resources
Front
What is Azure AD B2C?
Back
Azure Active Directory Business-to-Consumer, a customer identity access management solution for consumer-facing applications
Front
What is Cost Management in Azure?
Back
A set of tools for monitoring, allocating, and optimizing Azure costs
Front
What is a Log Analytics workspace?
Back
A unique environment for Azure Monitor log data where data is collected, aggregated, and analyzed
Front
What is a Resource Group?
Back
A container that holds related resources for an Azure solution
Front
What is Role-Based Access Control (RBAC)?
Back
A system that enables fine-grained access management for Azure resources based on user roles
Front
What is Azure Monitor?
Back
A comprehensive solution for collecting, analyzing, and responding to monitoring data from Azure resources and applications
Front
What is Privileged Identity Management (PIM)?
Back
A service that enables you to manage, control, and monitor access to important resources in Azure AD
Front
What is Azure Network Watcher?
Back
A service that provides tools to monitor, diagnose, and gain insights into network performance and health in Azure
Front
What is a Guest User in Azure AD?
Back
An external user invited to access an organization's resources with their own credentials
Front
What is Azure Blueprint?
Back
A service that enables organizations to define a repeatable set of Azure resources that implements and adheres to standards, patterns, and requirements
Front
What is Azure Service Health?
Back
A service that provides personalized alerts and guidance when Azure service issues affect you
Front
What are Azure Tags?
Back
Name-value pairs that allow you to categorize resources and view consolidated billing
Front
What is Conditional Access in Azure AD?
Back
A feature that allows organizations to enforce specific conditions before granting access to resources (e.g., location, device compliance)
Front
What is an Azure Resource Graph?
Back
A service that provides efficient resource exploration with the ability to query at scale across subscriptions
Front
Explain Passwordless Authentication.
Back
Authentication methods that don't require users to provide traditional passwords, such as FIDO2 keys or Microsoft Authenticator
Front
What are Managed Identities in Azure?
Back
A feature providing Azure services with automatically managed identities for authenticating to services supporting Azure AD authentication
Front
What are Azure RBAC Custom Roles?
Back
User-defined roles that provide specific, customized access permissions in addition to built-in roles
Front
What are Diagnostic Settings in Azure?
Back
Configuration options that determine where platform logs and metrics should be sent
Front
What is Azure Sentinel?
Back
A cloud-native security information and event manager (SIEM) and security orchestration automated response (SOAR) solution
Front
What is an Azure Management Scope?
Back
The range of resources that the management operation applies to (management groups, subscriptions, resource groups, resources)
Front
What is a Service Trust Portal?
Back
A portal providing information, tools, and resources about Microsoft's security, privacy, and compliance practices
Front
What is Azure Activity Log?
Back
A platform log that provides insight into subscription-level events in Azure
Front
What is Azure Multi-Factor Authentication (MFA)?
Back
A security feature that requires users to provide two or more verification methods to access resources
Front
What are Azure Management Groups?
Back
Containers that help manage access, policies, and compliance across multiple subscriptions
Front
What is Application Insights?
Back
A feature of Azure Monitor that provides application performance monitoring and user behavior analytics
Front
What is Identity Protection in Azure AD?
Back
A tool that detects potential vulnerabilities affecting organizational identities and configures automated responses
Front
What is an Azure Resource Lock?
Back
A setting that prevents resources from being accidentally deleted or modified
Front
What is Azure AD Connect?
Back
A tool that connects on-premises identity infrastructure to Azure AD
1/40
This deck focuses on Azure identity services (e.g., Azure AD), governance tools (e.g., RBAC, Azure Policy), and monitoring solutions like Azure Monitor and Log Analytics.