exam questions

Exam AZ-900 All Questions

View all questions & answers for the AZ-900 exam

Exam AZ-900 topic 1 question 227 discussion

Actual exam question from Microsoft's AZ-900
Question #: 227
Topic #: 1
[All AZ-900 Questions]

DRAG DROP -
You need to complete the defense-in-depth strategy used in a datacenter.
What should you do? To answer, drag the appropriate layers to the correct positions in the model. Each layer may be used once, more than once, or not at all.
You may need to drag the split bar between panes or scroll to view content.
NOTE: Each correct selection is worth one point.
Select and Place:

Show Suggested Answer Hide Answer
Suggested Answer:
Defence in depth layers (from bottom to top):
✑ Data
- In almost all cases attackers are after data.
- Data can be in database, stored on disk inside VMs, on a SaaS application such as Office 365 or in cloud storage.
- Those storing and controlling access to data to ensures that it's properly secured
- Often regulatory requirements dictates controls & processes
- to ensure confidentiality, integrity, and availability.
✑ Application
- Ensure applications are secure and free of vulnerabilities.
- Store sensitive application secrets in a secure storage medium.
- Make security a design requirement for all application development.
- Integrate security into the application development life cycle.
✑ Compute
- Secure access to virtual machines.
- Implement endpoint protection and keep systems patched and current.
- Malware, unpatched systems, and improperly secured systems open your environment to attacks.
✑ Networking
- Limit communication between resources.
- Deny by default.
- Allow only what is required
- Restrict inbound internet access and limit outbound, where appropriate.
- Implement secure connectivity to on-premises networks.
✑ Perimeter
- Use distributed denial of service (DDoS) protection to filter large-scale attacks before they can cause a denial of service for end users.
- Use perimeter firewalls to identify and alert on malicious attacks against your network.
✑ Identity and access
- Control access to infrastructure and change control.
- Access granted is only what is needed
- Use single sign-on and multi-factor authentication.
- Audit events and changes.
✑ Physical security
- Building security & controlling access to computing hardware.
- First line of defense.
Reference:
https://github.com/undergroundwires/Azure-in-bullet-points/blob/master/AZ-900%20Microsoft%20Azure%20Fundamentals/4.2.%20Defence%20in%20Depth.md

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
kamal_004
Highly Voted 1 year, 8 months ago
Physical Security (Top) Identity & Access Perimeter Network Compute Application Data (Bottom)
upvoted 17 times
...
AlexKK
Highly Voted 1 year, 4 months ago
Had that question on (26.02.23). The following questions were included and even a mixture of them. I may repeat a question, but they are repeated here as well. Good luck all. 28,44,46,55,72,80,91,94,95,97,100,107,111,128,134,138,149,151,159,227,258,269,277,278,296,307,331,337,330/350,353,354,394,398,401,405,407
upvoted 12 times
...
liya1
Most Recent 2 months, 1 week ago
got this question on 22nd
upvoted 2 times
...
Sabuniq
3 months, 2 weeks ago
Got this question on 03-24
upvoted 2 times
...
20142365
1 year ago
Physical Security > Perimeter > Application Got this question on June 30, 2023
upvoted 3 times
...
OlikuTR
1 year, 1 month ago
Answer is incorrect First layer is physical security, then identity & access and Perimeter Source : https://learn.microsoft.com/en-us/training/modules/describe-azure-identity-access-security/8-describe-defense-depth
upvoted 1 times
...
aslam8526
1 year, 7 months ago
PIP NC AD for remembering
upvoted 2 times
...
newbie
1 year, 8 months ago
Asked for me..
upvoted 1 times
...
SJ_JHA
2 years, 2 months ago
23.04.2022
upvoted 2 times
...
Krissy90
2 years, 3 months ago
One of the worst diagrams I have ever seen, what does this even try to say?
upvoted 3 times
Vick98
1 year, 6 months ago
I was thinking about OSI protocol, lol
upvoted 2 times
...
[Removed]
2 years, 3 months ago
IaaS, PaaS breakdown... From Physical to Compute is IaaS; App and Data = PaaS.
upvoted 6 times
...
...
usit
2 years, 9 months ago
Asked - 29/09/21
upvoted 4 times
...
Mev4953
2 years, 9 months ago
Correct answer
upvoted 2 times
...
754a
2 years, 9 months ago
Correct
upvoted 4 times
amine11
2 years, 9 months ago
did you pass the test ?
upvoted 1 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago