SC-900 Security, Compliance, and Identity
Fundamentals
Physical Security
Identity and Access
Perimeter
Network
Compute
Application
Data - ANS-What are the 6 layers of Microsoft's Defense in Depth security approach?
Verify explicitly
Use lease privileged access
Assume breach - ANS-What are the 3 Zero Trust principles?
Global Data Protection Regulation - ANS-What does GDPR stand for?
Data Breach
Malware
Phishing
Denial of Service - ANS-What are 4 common security threats?
Symmetrical
Asymmetrical - ANS-What are the two types of encryption?
Asymmetrical Encryption - ANS-What type of encryption requires a public and a private
key?
Transport Layer Security - ANS-What does TLS stand for?
Transparent Data Encryption - ANS-What is TDE?
BitLocker - ANS-What is the Windows based data encryption at rest solution?
Digital Signatures - ANS-What is password hash used for?
,Microsoft Service Trust Portal - ANS-What provides a variety of content, tools, and other
resources about Microsoft security, privacy, and compliance practices as well as
contains details about Microsoft's implementation of controls and processes that protect
our cloud services and the customer data therein?
Confidentiality
Integrity
Availability - ANS-What does the CIA stand for?
Data Beach - ANS-What is it referred to when data is stolen?
Dictionary Attack - ANS-What is a type of identity attack where a hacker attempts to
steal an identity by trying a large number of known passwords?
Malware - ANS-What are malicious applications and code that can cause damage and
disrupt normal use of devices?
Ransomware - ANS-What is a type of malware that encrypts files and folders,
preventing access to important files?
Hashing - ANS-What uses an algorithm to convert the original text to a unique
fixed-length hash value?
Password-based attacks - ANS-What includes password spray attacks and brute force
attacks?
Phishing - ANS-Type of attack when a hacker sends an email that appears to come
from a reputable source?
Spear Phishing - ANS-Type of attack where Hackers build databases of information
about users, which can be used to create highly credible emails?
Identity - ANS-What is the primary security perimeter?
Administration
Authentication
Authorization
Auditing - ANS-What are the 4 pillars of identity?
, Identity Provider - ANS-With modern authentication, all services, including all
authentication services, are supplied by a central?
Federation - ANS-What enables the access of services across organizational or domain
boundaries by establishing trust relationships between the respective domain's identity
provider?
Active Directory - ANS-What is a set of directory services developed by Microsoft as
part of Windows 2000 for on-premises domain-based networks?
Active Directory Domain Services - ANS-What stores information about members of the
domain, including devices and users, verifies their credentials, and defines their access
rights?
Free
Office 365
Premium P1
Premium P2 - ANS-What 4 versions is Azure AD available in?
Service Principal - ANS-What is a security identity used by applications or services to
access specific Azure resources?
Managed Identities - ANS-What is automatically managed in Azure AD and typically
used to manage the credentials for authenticating a cloud application with an Azure
service?
System-assigned
User-assigned - ANS-What are the two types of Managed Identities?
Azure AD joined - ANS-What type of devices exist only in the cloud, are owned by an
organization and signed in with their account?
Hybrid Azure AD joined devices - ANS-What type of devices can be Windows 7, 8.1, or
10, or Windows Server 2008, or newer, owned by an organization and signed in with an
Active Directory Domain Services account belonging to that organization.
They exist in the cloud and on-premises.
Azure AD External Entities - ANS-What is a set of capabilities that enable organizations
to allow access to external users, such as customers or partners?
Los beneficios de comprar resúmenes en Stuvia estan en línea:
Garantiza la calidad de los comentarios
Compradores de Stuvia evaluaron más de 700.000 resúmenes. Así estas seguro que compras los mejores documentos!
Compra fácil y rápido
Puedes pagar rápidamente y en una vez con iDeal, tarjeta de crédito o con tu crédito de Stuvia. Sin tener que hacerte miembro.
Enfócate en lo más importante
Tus compañeros escriben los resúmenes. Por eso tienes la seguridad que tienes un resumen actual y confiable.
Así llegas a la conclusión rapidamente!
Preguntas frecuentes
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
100% de satisfacción garantizada: ¿Cómo funciona?
Nuestra garantía de satisfacción le asegura que siempre encontrará un documento de estudio a tu medida. Tu rellenas un formulario y nuestro equipo de atención al cliente se encarga del resto.
Who am I buying this summary from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller EXAMQA. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy this summary for $10.49. You're not tied to anything after your purchase.