Bash, the Crucial Exams Chat Bot
AI Bot
Microsoft Security Concepts Flashcards
Microsoft Security, Compliance, and Identity Fundamentals SC-900 Flashcards
| Front | Back |
| How can Secure Score improve Microsoft security | By providing a measure of your organization’s security stance and recommendations for improvement. |
| How does Endpoint Detection and Response (EDR) enhance security | Provides continuous real-time monitoring and response to advanced threats on endpoints. |
| How does Microsoft Defender for Endpoint help secure devices | Detects, prevents, investigates, and responds to advanced threats on devices. |
| How does multifactor authentication enhance security | By requiring multiple forms of verification like a password and a code. |
| What are Microsoft Secure Score alerts | Notifications that identify gaps in your organization’s security and recommend actionable improvements. |
| What are network security groups (NSGs) in Azure | Filters network traffic to and from resources based on rules for enhanced security. |
| What are Security Groups in Microsoft environments | Collections of user accounts that simplify permission management. |
| What are service principals in Azure | Identities used by applications or services to access specific resources securely. |
| What are user risk levels in Azure AD Identity Protection | Indicators of likelihood that a user’s identity may have been compromised. |
| What does Azure Active Directory Identity Protection do | Identifies and mitigates suspicious activities and risks for user accounts. |
| What does Conditional Access do in Microsoft environments | Blocks or grants access based on specific conditions like user location or device health. |
| What does encryption do for data | Converts data into a format that is unreadable without a decryption key. |
| What does Microsoft Information Protection (MIP) do | Helps safeguard sensitive data through classification, labeling, and encryption. |
| What does Secure Boot do | Ensures that a device boots using only software trusted by the manufacturer to prevent malicious code. |
| What is a Microsoft Management Group | Provides hierarchical management of multiple subscriptions for unified governance. |
| What is a security baseline in Microsoft solutions | A predefined configuration setting to ensure standardized security policies across systems. |
| What is a Security Operations Center (SOC) in Microsoft environments | A centralized team or facility for monitoring, analyzing, and responding to security events and threats proactively. |
| What is Azure Security Center used for | Provides unified security management and advanced threat protection across hybrid cloud workloads. |
| What is BitLocker used for | Encrypts hard drives to prevent data theft or exposure in case of device loss or theft. |
| What is data loss prevention (DLP) in Microsoft solutions | Prevents sensitive data from being shared or leaked outside an organization. |
| What is defense-in-depth | A layered security approach that provides multiple barriers to prevent breaches. |
| What is least privilege access | Granting users only the permissions they need to perform their job functions. |
| What is Microsoft Cloud App Security (MCAS) | A CASB solution that enhances visibility, controls data movement, and protects against threats in the cloud. |
| What is Privileged Identity Management (PIM) in Microsoft solutions | Provides enhanced management of privileged accounts by enabling just-in-time access and role activation. |
| What is role-based access control (RBAC) | Restricts system access to users based on their defined roles. |
| What is Secure Access Service Edge (SASE) | A security framework combining network and security services in the cloud for secure access. |
| What is the Zero Trust model | A security framework assuming no user or device is inherently trustworthy. |
| What is Windows Hello | A feature providing secure authentication using biometrics or PIN instead of passwords. |
Front
What are Microsoft Secure Score alerts
Click the card to flip
Back
Notifications that identify gaps in your organization’s security and recommend actionable improvements.
Front
What are network security groups (NSGs) in Azure
Back
Filters network traffic to and from resources based on rules for enhanced security.
Front
What are Security Groups in Microsoft environments
Back
Collections of user accounts that simplify permission management.
Front
What are service principals in Azure
Back
Identities used by applications or services to access specific resources securely.
Front
What is Microsoft Cloud App Security (MCAS)
Back
A CASB solution that enhances visibility, controls data movement, and protects against threats in the cloud.
Front
How does Endpoint Detection and Response (EDR) enhance security
Back
Provides continuous real-time monitoring and response to advanced threats on endpoints.
Front
What is a Microsoft Management Group
Back
Provides hierarchical management of multiple subscriptions for unified governance.
Front
What does encryption do for data
Back
Converts data into a format that is unreadable without a decryption key.
Front
What is least privilege access
Back
Granting users only the permissions they need to perform their job functions.
Front
What is Azure Security Center used for
Back
Provides unified security management and advanced threat protection across hybrid cloud workloads.
Front
How does Microsoft Defender for Endpoint help secure devices
Back
Detects, prevents, investigates, and responds to advanced threats on devices.
Front
What does Secure Boot do
Back
Ensures that a device boots using only software trusted by the manufacturer to prevent malicious code.
Front
How does multifactor authentication enhance security
Back
By requiring multiple forms of verification like a password and a code.
Front
How can Secure Score improve Microsoft security
Back
By providing a measure of your organization’s security stance and recommendations for improvement.
Front
What is defense-in-depth
Back
A layered security approach that provides multiple barriers to prevent breaches.
Front
What is role-based access control (RBAC)
Back
Restricts system access to users based on their defined roles.
Front
What is Windows Hello
Back
A feature providing secure authentication using biometrics or PIN instead of passwords.
Front
What are user risk levels in Azure AD Identity Protection
Back
Indicators of likelihood that a user’s identity may have been compromised.
Front
What is Secure Access Service Edge (SASE)
Back
A security framework combining network and security services in the cloud for secure access.
Front
What is a Security Operations Center (SOC) in Microsoft environments
Back
A centralized team or facility for monitoring, analyzing, and responding to security events and threats proactively.
Front
What is BitLocker used for
Back
Encrypts hard drives to prevent data theft or exposure in case of device loss or theft.
Front
What is the Zero Trust model
Back
A security framework assuming no user or device is inherently trustworthy.
Front
What is data loss prevention (DLP) in Microsoft solutions
Back
Prevents sensitive data from being shared or leaked outside an organization.
Front
What is a security baseline in Microsoft solutions
Back
A predefined configuration setting to ensure standardized security policies across systems.
Front
What does Conditional Access do in Microsoft environments
Back
Blocks or grants access based on specific conditions like user location or device health.
Front
What does Azure Active Directory Identity Protection do
Back
Identifies and mitigates suspicious activities and risks for user accounts.
Front
What does Microsoft Information Protection (MIP) do
Back
Helps safeguard sensitive data through classification, labeling, and encryption.
Front
What is Privileged Identity Management (PIM) in Microsoft solutions
Back
Provides enhanced management of privileged accounts by enabling just-in-time access and role activation.
1/28
This deck covers foundational security concepts like defense-in-depth, encryption, and secure access principles relevant to Microsoft solutions.