Save
Upgrade to remove ads
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

SC 900

Definition Term
helps organizations safeguard personal data and build a privacy-resilient workplace. Microsoft Priva
is Microsoft's public site for publishing audit reports and other compliance-related information associated with Microsoft's cloud services. users can download audit reports produced by external auditors and gain insight from Microsoft-authored whitepape Service Trust Portal (STP)
Control Transparency Security Strong legal protections No content-based targeting Benefits to you Microsoft's privacy principles
Help understand and manage an organization's compliance needs Compliance Center
Entails analyzing the data that the organization retains, determining its importance and value, and then assigning it to a category. Data Classification
When browsing Microsoft compliance documentation in the Service Trust Portal, you have found several documents that are specific to your industry. What is the best way of ensuring you keep up to date with the latest updates? Save to library
is the process of proving that a person is who they say they are. Authentication (AuthN)
Is the process of establishing what level of access an authenticated person or service has. Authorization (AuthZ)
is the set of things that define or characterize someone or something. identity
Administration Authentication Authorization Auditing Four pillars of an identity infrastructure
customizable Clear text Persistent Sensitivity labels characteristics
Retention label Record Management (locked/unlocked) Regulatory record Three types of retention
A system that can identify critical data, monitor how it is being accessed, and protect it from unauthorized users. Data Loss Prevention (DLP)
refers to any person employed in industry or government or a military job that either willingly or unknowingly or mistakenly allows sensitive information to fall into the wrong hands and therefore be compromised where by its' value is decreased or lost. Insider risk
Data spillage IP theft Fraud Insider trading Sensitive data leaks security violations Confidentiality violations workplace violence policy violation conflicts of interest Workplace harassment Regulatory compliance violations Insider risk examples
Communication compliance Insider Risk Management Information barriers Privileged access management Four insider Risk solutions in M365
Helps minimize communication risks by detect, capture, and take remediation actions for inappropriate messages Communication Compliance
policies and procedures created to prevent misuse of material non-public information (MNPI). Formerly referred to as Chinese Walls. Information Barriers
CanNotDelete, ReadOnly Types of resource locks
prevents resources from being accidentally deleted or changed Resource Locks
Define a repeatable set of AZ resources that implement and adhere to standards, pattern, and requirements. Azure Blueprints
Role Assignments Policy assignments ARM templates Resource groups Azure Blueprints includes
Trust no one and verify everything Zero Trust Model
Verify explicitly Least privileged access Assume Breach Microsoft zero trust model principles
Identities End points Data Apps Infrastructure Networks Microsoft zero trust model pillars
A free tool to assess organizations degree of adoption toward a zero trust model and suggests to improve your current security implementations Zero trust assessment tool
Defines what you and Azure are responsible for when it comes to cloud resources Shared responsibility model
Information & Data, Account & Identities, Endpoints, Access Management Shared responsibility always retained by customer
Data, Application, Compute, Network, Perimeter, Identity and access, Physical Ex: Firewall, NSGs, ACLs, VM Isolation, DDoS protection etc. Defense in Depth (7 layers of security)
Confidentiality, Integrity, Availability Model describes the foundation to security principles and their trade off relationship CIA Triad
A password attack that creates encrypted versions of common dictionary words and compares them against those in a stolen password file. dictionary attack
causing damage to, disrupting the services of, or destroying the network and its contents Disruptive Attacks
SA type of malicious software that when installed holds data, workstation or a network hostage until the ransom has been paid Ransomware
When sensitive or confidential information is copied, transmitted, or viewed by an individual who is not authorized to handle the data. Data breach
the same key is used to encode and decode ex: Advanced Encryption Standard (AES) Symmetric Encryption
two keys are used; one key encodes the message, and the other key decodes the message ex: RSA (Rivest-Shamir-Adleman) Asymmetric Encryption
transforming plaintext of any length into a short code called a hash Hashing
transforming plaintext of any length into a fixed size short code, Can reduce the size of stored value ex: MD5, SHA356, Bcrypt Encryption in Transit
Random string not known to the attacker that the hash function accepts to mitigate the deterministic nature of hashing function Salting
Data is encrypted before being written to disk and decrypted when read from disk. ex: AES, RSA Encryption at rest
a encryption protocol that ensures data security and integrity over public networks, such as the Internet TLS is deprecated in favor of SSL Transport Layer Security (TLS)
Provides real-time or near-real-time analysis of security alerts generated by network hardware and applications Security Information and Event Management (SIEM)
collects data about security threats and respond to security events without human assistance Security orchestration automated response (SOAR)
cross layered detection and response security system Extended Detection and Response (XDR)
combines real-time continuous monitoring and collection of endpoint data with rules based automated response and analysis capabilities EDPs are designed to detect APTs(Advanced Persist Threat) Endpoint Detection and Response (EDR)
sits b/w cloud service users and cloud applications and monitors all activity and enforces security policies Cloud access security brokers (CASB)
A formula to determine the overall effectiveness of a companies security overall defense. Security Posture
identify and remediate risks through security assessments and automated compliance monitoring Cloud Security Posture Management (CSPM)
Giving access to resources only during the time when needed reducing the surface attack based on range of time access Just-in-time (JIT)
giving access to only the specific actions reducing the surface attack by providing least-permissive permissions Just Enough Privilege (JEP)
The information systems and solutions built and deployed by departments other than the IT department. In many cases, the IT department may not even be aware of these efforts. Shadow IT
synchronizes user identities between on-premises Active Directory and Azure AD Azure AD Connect
Windows Hello for Business Microsoft Authentication App FIDO2 security keys Passwordless authentication options that integrate with Azure Active Directory
policy-based access control feature allows organizations to enforce additional security measures and control access to Azure resources based on specific conditions and factors. Conditional Access
provides a way to grant permissions to users, groups, or applications at a granular level, based on their assigned roles, and the roles are associated with specific actions that can be performed on Azure resources. RBAC (Role Based Access Control)
service within Azure Active Directory (Azure AD) that helps organizations manage, control, and monitor privileged access to Azure resources. PIM (privileged identity management)
Needs an Azure AD Premium P2 license PIM (privileged identity management) license
Only user with Privileged role Admin or Global Admin can manage assignments for other admins Roles required for Managing PIM
is the portal for organizations to manage their compliance needs using integrated solutions for information protection, information governance, insider risk management, auditing, and more. Microsoft Purview compliance portal
Global administrator Compliance administrator Compliance data administrator Roles for Purview
Compliances Manager card Solution catalog card Active alerts Default cards in Purview Compliance portal page
helps simplify the way you manage compliance. It calculates a risk-based compliance score that measures progress toward completing recommended actions to reduce risks associated with data protection and regulatory standards. Compliances Manager card
links to collections of integrated solutions to help you manage end-to-end compliance scenarios. Solutions are: Information protection & governance Privacy Insider risk management. Discovery & respond Solution Catalog Card
solutions help organizations classify, protect, and retain your data where it lives and wherever it goes. Included are data lifecycle management, data loss prevention, information protection, and records management. Information protection & governance
help organizations identify, analyze, and remediate internal risks before they cause harm. Insider Risk Management
help organizations quickly find, investigate, and respond with relevant data. Included are Audit, data subject requests, and eDiscovery. Discovery & respond
delivers intelligent security analytics and threat intelligence solution, providing a centralized point for alert detection, threat visibility, proactive hunting and threat response Azure Sentinel
Improvement actions Solutions Assessments Assessment templates Alerts Alert Policies Compliance manager tabs
A new admin has joined the team and needs to be able to access the Microsoft Purview compliance portal. Which of the following roles could the admin use to access the compliance portal? Compliance Administrator role
Trust is not always bi-directional Federation rules
regulations govern the physical locations where data can be stored and how and when it can be transferred, processed, or accessed internationally. These regulations can differ significantly depending on jurisdiction. Data residency
the concept that data, particularly personal data, is subject to the laws and regulations of the country/region in which it's physically collected, held, or processed. Data sovereignty
Providing notice and being transparent about the collection, processing, use, and sharing of personal data are fundamental principles of privacy laws and regulations. Data Privacy
replaces passwords with strong two-factor authentication on devices. This two-factor authentication is a combination of a key or certificate tied to a device and something that the person knows (a PIN) or something that the person is (biometrics). Windows Hello for Business
an open standard that specifies how time-based, one-time password (TOTP) codes are generated. TOTP is implemented using either software or hardware to generate the codes. OATH
is a product family that encompasses all of Microsoft’s identity and access capabilities, including Microsoft Azure Active Directory (Azure AD). Microsoft Entra
Free, Office 365 Apps, Premium P1, and Premium P2 Azure AD Editions
administer users and create groups, synchronize with on-premises Active Directory, create basic reports, configure self-service password change for cloud users, and enable single sign-on across Azure, Microsoft 365, and many popular SaaS apps. Azure Active Directory Free
free version, plus self-service password reset for cloud users, and device write-back, which offers two-way synchronization between on-premises directories and Azure AD. Office 365 Apps
supports advanced administration, such as dynamic groups, self-service group management, Microsoft Identity Manager and cloud write-back capabilities, which allow self-service password reset for your on-premises users. Azure Active Directory Premium P1
offers all the Premium P1 features, and Azure Active Directory Identity Protection and Privileged Identity Management Azure Active Directory Premium P2
users, service principals, managed identities, and devices. Azure AD identity types
a feature within External Identities, includes the capability to add guest users. An organization can securely share applications and services with guest users from another organization. Azure AD B2B
are a type of service principal that are automatically managed in Azure AD and eliminate the need for developers to manage credentials. Managed Identity
system-assigned and user-assigned 2 types of managed identities
a cloud-based service that focuses on mobile device management (MDM) and mobile application management (MAM), to control how an organization’s devices are used. Intune
Azure AD registered devices Azure AD joined Hybrid Azure AD joined devices Device identities
is to provide users with support for bring your own device (BYOD) or mobile device scenarios. In these scenarios, a user can access your organization’s resources using a personal device. Azure AD registered devices
is a device joined to Azure AD through an organizational account, which is then used to sign in to the device. Azure AD joined device
These devices are joined to your on-premises Active Directory and Azure AD requiring organizational account to sign in to the device Hybrid Azure AD joined devices
1) Azure AD password hash synchronization 2) Azure AD pass through authentication 3) Federated authentication Authentication of hybrid identities
Created by: Kupu
 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards