Bash, the Crucial Exams Chat Bot
AI Bot
Microsoft Security Concepts Flashcards
Microsoft Security, Compliance, and Identity Fundamentals SC-900 Flashcards
| Front | Back |
| How can Secure Score improve Microsoft security | By providing a measure of your organization’s security stance and recommendations for improvement. |
| How does Endpoint Detection and Response (EDR) enhance security | Provides continuous real-time monitoring and response to advanced threats on endpoints. |
| How does Microsoft Defender for Endpoint help secure devices | Detects, prevents, investigates, and responds to advanced threats on devices. |
| How does multifactor authentication enhance security | By requiring multiple forms of verification like a password and a code. |
| What are Microsoft Secure Score alerts | Notifications that identify gaps in your organization’s security and recommend actionable improvements. |
| What are network security groups (NSGs) in Azure | Filters network traffic to and from resources based on rules for enhanced security. |
| What are Security Groups in Microsoft environments | Collections of user accounts that simplify permission management. |
| What are service principals in Azure | Identities used by applications or services to access specific resources securely. |
| What are user risk levels in Azure AD Identity Protection | Indicators of likelihood that a user’s identity may have been compromised. |
| What does Azure Active Directory Identity Protection do | Identifies and mitigates suspicious activities and risks for user accounts. |
| What does Conditional Access do in Microsoft environments | Blocks or grants access based on specific conditions like user location or device health. |
| What does encryption do for data | Converts data into a format that is unreadable without a decryption key. |
| What does Microsoft Information Protection (MIP) do | Helps safeguard sensitive data through classification, labeling, and encryption. |
| What does Secure Boot do | Ensures that a device boots using only software trusted by the manufacturer to prevent malicious code. |
| What is a Microsoft Management Group | Provides hierarchical management of multiple subscriptions for unified governance. |
| What is a security baseline in Microsoft solutions | A predefined configuration setting to ensure standardized security policies across systems. |
| What is a Security Operations Center (SOC) in Microsoft environments | A centralized team or facility for monitoring, analyzing, and responding to security events and threats proactively. |
| What is Azure Security Center used for | Provides unified security management and advanced threat protection across hybrid cloud workloads. |
| What is BitLocker used for | Encrypts hard drives to prevent data theft or exposure in case of device loss or theft. |
| What is data loss prevention (DLP) in Microsoft solutions | Prevents sensitive data from being shared or leaked outside an organization. |
| What is defense-in-depth | A layered security approach that provides multiple barriers to prevent breaches. |
| What is least privilege access | Granting users only the permissions they need to perform their job functions. |
| What is Microsoft Cloud App Security (MCAS) | A CASB solution that enhances visibility, controls data movement, and protects against threats in the cloud. |
| What is Privileged Identity Management (PIM) in Microsoft solutions | Provides enhanced management of privileged accounts by enabling just-in-time access and role activation. |
| What is role-based access control (RBAC) | Restricts system access to users based on their defined roles. |
| What is Secure Access Service Edge (SASE) | A security framework combining network and security services in the cloud for secure access. |
| What is the Zero Trust model | A security framework assuming no user or device is inherently trustworthy. |
| What is Windows Hello | A feature providing secure authentication using biometrics or PIN instead of passwords. |
This deck covers foundational security concepts like defense-in-depth, encryption, and secure access principles relevant to Microsoft solutions.