0
0
Azurecloud~5 mins

Security pillar principles in Azure - Cheat Sheet & Quick Revision

Choose your learning style9 modes available
Recall & Review
beginner
What is the main goal of the Security pillar in cloud architecture?
To protect data, systems, and assets by implementing strong controls and managing risks effectively.
Click to reveal answer
beginner
Name one key practice for managing identity and access in the Security pillar.
Use strong authentication methods like multi-factor authentication (MFA) and least privilege access.
Click to reveal answer
beginner
Why is encryption important in the Security pillar?
Encryption protects data by making it unreadable to unauthorized users, both when stored and during transmission.
Click to reveal answer
intermediate
What does the principle of 'defense in depth' mean in cloud security?
It means using multiple layers of security controls to protect resources, so if one layer fails, others still protect the system.
Click to reveal answer
intermediate
How does continuous monitoring support the Security pillar?
It helps detect and respond to security threats quickly by constantly checking system activity and alerts.
Click to reveal answer
Which of the following is a best practice for identity management in the Security pillar?
AGranting all users admin access by default
BDisabling logging to improve performance
CUsing multi-factor authentication
DSharing passwords among team members
What is the purpose of encrypting data in the cloud?
ATo make data load faster
BTo prevent unauthorized reading of data
CTo reduce storage costs
DTo allow anyone to access data easily
What does 'least privilege' mean in access control?
AAccess is granted permanently without review
BUsers get full access to all resources
CUsers share access credentials
DUsers get access only to what they need
Which security approach uses multiple layers to protect cloud resources?
ADefense in depth
BOpen access
CSingle sign-on
DNo monitoring
Why is continuous monitoring important in cloud security?
ATo detect and respond to threats quickly
BTo ignore security alerts
CTo disable firewalls
DTo increase system downtime
Explain the key principles of the Security pillar in cloud architecture.
Think about how to keep cloud resources safe from unauthorized access and threats.
You got /5 concepts.
    Describe how 'least privilege' and 'multi-factor authentication' improve cloud security.
    Consider how controlling who can do what and verifying identity helps protect resources.
    You got /3 concepts.