NIST 800-53 compliance - Answers A set of security controls and guidelines established by the
National Institute of Standards and Technology for federal information systems.
Privileged Access Workstations (PAWs) - Answers Specialized devices used by administrators
to perform privileged tasks in a secure manner, isolated from the regular network and hardened
to minimize the risk of compromise.
Recovery plan for ransomware attacks - Answers A defined strategy that includes secure
backups, incident response procedures, user communication, and system restoration processes
to effectively respond to a ransomware attack.
Dynamic application security testing (DAST) - Answers A security testing method that simulates
real-world attacks on an application to identify vulnerabilities and weaknesses.
Penetration testing - Answers Authorized simulated attacks on an application to identify
security vulnerabilities that could be exploited by an attacker.
Cloud infrastructure entitlement management - Answers A practice of managing user
authentication and access control across multiple cloud platforms.
Microsoft Security Best Practices - Answers Guidelines and recommendations provided by
Microsoft to enhance security and mitigate risks in IT environments.
Azure Policy - Answers A service in Azure that allows you to create, assign, and manage policies
to enforce specific rules and effects on your resources.
Microsoft Defender for Cloud - Answers A cloud security posture management solution that
helps protect Azure resources and provides security recommendations.
Microsoft Sentinel - Answers A cloud-native SIEM (Security Information and Event Management)
solution that provides intelligent security analytics and threat intelligence.
Data encryption at rest - Answers The process of encrypting data stored on disk to protect it
from unauthorized access.
Threat intelligence and monitoring - Answers The collection and analysis of information about
threats to inform security decisions and improve defenses.
Regular data backups - Answers The practice of creating copies of data at regular intervals to
prevent data loss.
Incident response procedures - Answers Steps and protocols established to respond to security
incidents effectively.
User communication - Answers The process of informing users about security incidents and
,necessary actions.
System restoration processes - Answers Procedures for recovering systems and data after a
security incident.
Security code review - Answers The process of examining source code to identify security
vulnerabilities.
Static code analysis - Answers The analysis of source code without executing it to find potential
vulnerabilities.
Unit testing - Answers A software testing method where individual components of the software
are tested in isolation.
Automated backup and recovery system - Answers A system that automatically creates
backups of data and restores it when needed.
Centralized data storage solution - Answers A system that consolidates data storage for cloud-
based applications into a single location.
Cloud-based applications - Answers Applications that are hosted and run on cloud infrastructure
rather than on local servers.
Security testing strategy - Answers A comprehensive plan that outlines the methods and
practices used to test the security of applications.
Vulnerabilities - Answers Weaknesses in a system that can be exploited by attackers.
Azure Backup - Answers Uses the Resource Guard as an additional authorization mechanism
for a Recovery Services vault or a Backup vault.
Soft delete on backups - Answers A safeguard to prevent compromised administrator from
disabling the backups on MARS agent before encrypting the servers.
Multi-user authorization using Resource Guard - Answers A safeguard in Azure Backup to
enhance security by requiring multiple approvals for critical operations.
Microsoft Cloud App Security - Answers A security solution that helps organizations protect
their cloud applications.
Azure Information Protection - Answers A cloud-based solution that helps organizations classify
and protect their documents and emails.
Microsoft Purview - Answers Automates the process of data classification by applying
predefined rules and policies to label and categorize data based on its content, sensitivity, or
other attributes.
, Zero Trust security - Answers A security model that requires strict identity verification for every
person and device trying to access resources on a private network.
Automation and orchestration - Answers Streamline security operations, automate repetitive
tasks, and enable faster response times to security incidents.
Cloud Adoption Framework - Answers A comprehensive set of guidance and best practices
designed to assist organizations in their cloud journey and optimize their cloud investments.
Data classification - Answers The process of labeling and categorizing data based on its
content, sensitivity, or other attributes.
Ransomware attacks - Answers Cyber threats that target and encrypt on-premises servers,
requiring robust recovery solutions.
Recovery Services vault - Answers A storage entity in Azure Backup that holds backup data.
MARS agent - Answers Microsoft Azure Recovery Services agent used to protect virtual
machines in Azure Backup.
Security Best Practices - Answers Guidelines provided by Microsoft to enhance security in cloud
environments.
Centralized view of security data - Answers Improves visibility and control in security operations.
Complex data transformations and aggregations - Answers Processes that Microsoft Purview
does not perform.
Real-time data access and retrieval - Answers A capability not specifically provided by Microsoft
Purview.
Advanced data analytics capabilities - Answers A feature not primarily associated with
Microsoft Purview.
Human decision-making in security - Answers Not completely replaced by automation and
orchestration in security operations.
Comprehensive defense against emerging threats - Answers Enhanced by automation and
orchestration in security processes.
Seamless and error-free security management - Answers Not the primary goal of automation
and orchestration.
Guidelines for secure applications - Answers Provided by the Cloud Adoption Framework.
Methodology for cloud infrastructure - Answers Outlined by the Cloud Adoption Framework.
Seamless migration of workloads - Answers Facilitated by the Cloud Adoption Framework.