eigene sc100 fragen

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/63

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 11:34 AM on 3/24/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

64 Terms

1
New cards

You need a solution that collects logs from multiple sources and allows querying and correlation

Security Information and Event Management (SIEM)

2
New cards

You need automated playbooks to respond to security incidents

Security Orchestration, Automation and Response (SOAR)

3
New cards

You need unified detection across identity, endpoint, email, and apps

Extended Detection and Response (XDR)

4
New cards

You want Microsoft’s integrated cross-domain detection and response platform

Microsoft Defender XDR (XDR)

5
New cards

You need a central platform combining SIEM and SOAR capabilities

Microsoft Sentinel (SIEM + SOAR)

6
New cards

You need to assess security posture and detect threats in Azure resources

Microsoft Defender for Cloud (CSPM + CWPP)

7
New cards

You need to identify misconfigurations in your cloud environment

Cloud Security Posture Management (CSPM)

8
New cards

You need to protect running workloads like VMs and containers

Cloud Workload Protection Platform (CWPP)

9
New cards

You want recommendations to improve your cloud security configuration

Cloud Security Posture Management (CSPM)

10
New cards

You need runtime protection for workloads against attacks

Cloud Workload Protection Platform (CWPP)

11
New cards

You must verify identity, device, and context before granting access

Verify Explicitly (Zero Trust Principle)

12
New cards

Users should only have access to what they need and nothing more

Least Privilege (Zero Trust Principle)

13
New cards

Your design assumes attackers may already be inside your environment

Assume Breach (Zero Trust Principle)

14
New cards

You need a structured plan to implement Zero Trust

Zero Trust Rapid Modernization Plan (RAMP)

15
New cards

You need Microsoft guidance for adopting and operating in the cloud

Microsoft Cloud Adoption Framework (CAF)

16
New cards

You want to evaluate the quality and best practices of your architecture

Microsoft Well-Architected Framework (WAF)

17
New cards

You need a preconfigured and secure cloud environment baseline

Landing Zone (LZ)

18
New cards

You need a structured way of thinking about architecture decisions

Framework

19
New cards

You want to integrate security into your CI/CD pipeline

Development, Security, and Operations (DevSecOps)

20
New cards

You need to analyze source code without executing it

Static Application Security Testing (SAST)

21
New cards

You need to test a running application from an attacker perspective

Dynamic Application Security Testing (DAST)

22
New cards

You want a quick validation that core security controls are working

Security Smoke Test

23
New cards

You want to systematically identify threats in a system design

STRIDE Threat Modeling Framework (STRIDE)

24
New cards

An attacker pretends to be another user

Spoofing (STRIDE)

25
New cards

Data is modified without authorization

Tampering (STRIDE)

26
New cards

A user denies performing an action

Repudiation (STRIDE)

27
New cards

Sensitive data is exposed to unauthorized users

Information Disclosure (STRIDE)

28
New cards

A system is made unavailable

Denial of Service (DoS)

29
New cards

A user gains higher permissions than intended

Elevation of Privilege (EoP)

30
New cards

You analyze systems by thinking like an attacker

MITRE ATT&CK Thinking (MITRE)

31
New cards

You need a private network in Azure to host resources

Azure Virtual Network (VNet)

32
New cards

You need to logically separate resources within a network

Subnet

33
New cards

You want to reduce attack surface by separating network areas

Network Segmentation

34
New cards

You need very granular communication control between workloads

Microsegmentation

35
New cards

You want centralized security and shared services with isolated workloads

Hub-and-Spoke Architecture

36
New cards

You need private access to Azure services without using the public internet

Private Endpoint

37
New cards

You want to control traffic inside a VNet using allow/deny rules

Network Security Group (NSG)

38
New cards

You need to filter malicious HTTP/HTTPS traffic before it reaches your app

Azure Web Application Firewall (WAF)

39
New cards

You need a global entry point with load balancing and routing

Azure Front Door

40
New cards

You want to cache and deliver content globally with low latency

Azure Content Delivery Network (CDN)

41
New cards

You need guidance on web application security best practices

Open Worldwide Application Security Project (OWASP)

42
New cards

You need to host a web application without managing infrastructure

Azure App Service

43
New cards

You need the compute resources behind your app hosting

App Service Plan (ASP)

44
New cards

You want a portable and isolated application package

Docker Container

45
New cards

You need a machine that runs containers

Node

46
New cards

You need the environment where code executes

Runtime Environment

47
New cards

You need to run containers without managing servers

Azure Container Instances (ACI)

48
New cards

You need orchestration for many containers

Azure Kubernetes Service (AKS)

49
New cards

You need the smallest deployable unit in Kubernetes

Pod

50
New cards

You need a group of nodes managed together

Cluster

51
New cards

You want to control what containers are allowed to do

Pod Security

52
New cards

You want simplified serverless containers without Kubernetes complexity

Azure Container Apps (ACA)

53
New cards

You need a cloud-based solution to secure access to apps from anywhere

Security Service Edge (SSE)

54
New cards

You need an intermediary that forwards requests between client and server

Proxy Server

55
New cards

You need advanced endpoint protection with behavioral detection

Microsoft Defender for Endpoint (MDE)

56
New cards

You need to discover all internet-facing assets of your organization

Microsoft Defender External Attack Surface Management (EASM)

57
New cards

You need to monitor and protect IoT and industrial devices without agents

Microsoft Defender for IoT

58
New cards

You need a managed relational database in Azure

Azure SQL Database

59
New cards

You need to analyze large-scale data

Azure Synapse Analytics

60
New cards

You need storage for raw, unstructured big data

Azure Data Lake Storage (ADLS)

61
New cards

You need temporary, limited access to storage resources

Shared Access Signature (SAS)

62
New cards

You need to manage on-prem and multi-cloud resources from Azure

Azure Arc

63
New cards

You need secure RDP/SSH access without exposing public IPs

Azure Bastion

64
New cards

You need a browser-based CLI for Azure management

Azure Cloud Shell