For the AZ-900: Microsoft Azure Fundamentals exam, which covers various topics, I can provide 100 practice questions related to Azure Governance and Security. I’ll break them down into relevant categories, and for each question, I’ll give a brief, one-liner answer.
Azure Governance and Security
1. Azure Governance Basics
-
What is Azure governance?
Azure governance helps manage and control resources in Azure to meet business needs and ensure compliance. -
What is Azure Policy?
Azure Policy allows you to enforce organizational standards and assess compliance across resources. -
What is the purpose of an Azure Management Group?
Management Groups help organize resources and subscriptions hierarchically for governance. -
What is the Azure Resource Manager (ARM)?
ARM is the deployment and management service for Azure resources. -
What are Azure Blueprints?
Azure Blueprints help define a repeatable set of Azure resources and policies for deployments. -
What is a subscription in Azure?
An Azure subscription is a container for Azure resources, including services and billing. -
How are resources organized in Azure?
Resources are organized in resource groups within a subscription. -
What is Azure Resource Locks?
Resource Locks prevent accidental deletion or modification of resources. -
What is a resource group in Azure?
A resource group is a container that holds related Azure resources for management. -
What is the purpose of Azure Cost Management?
Azure Cost Management helps track and manage Azure spending and optimize costs.
2. Role-Based Access Control (RBAC)
-
What is Azure RBAC?
Azure RBAC (Role-Based Access Control) allows you to assign roles to users to control access to resources. -
What are the different types of Azure RBAC roles?
The types of roles are Owner, Contributor, and Reader, with additional custom roles. -
What is the difference between Owner and Contributor roles in Azure?
Owner has full access, including permissions to manage roles, while Contributor can manage resources but not roles. -
What is the Reader role in Azure?
The Reader role allows users to view resources but not modify them. -
What is a custom role in Azure RBAC?
A custom role allows you to define specific permissions for a user or service principal. -
What is an Azure AD role?
Azure AD roles manage access to Azure Active Directory resources, not Azure resources. -
What is the least privilege principle?
The least privilege principle means granting the minimum level of access necessary to perform a job. -
What is a service principal in Azure?
A service principal is an identity created for applications or services to access Azure resources. -
How can roles be assigned in Azure?
Roles can be assigned at the subscription, resource group, or resource level. -
What is Azure AD Conditional Access?
Conditional Access allows you to enforce policies based on user conditions, such as location or device compliance.
3. Security in Azure
-
What is Azure Security Center?
Azure Security Center provides unified security management and threat protection for Azure resources. -
What is the Azure Security Benchmark?
The Azure Security Benchmark is a set of security controls and best practices for securing Azure environments. -
What is Azure Sentinel?
Azure Sentinel is a cloud-native SIEM (Security Information and Event Management) service. -
What is Azure Key Vault?
Azure Key Vault is a service that securely stores and manages sensitive information like keys and secrets. -
What are Azure Active Directory (Azure AD) users?
Azure AD users represent identities that authenticate to Azure and other resources. -
What is multi-factor authentication (MFA) in Azure?
MFA adds an extra layer of security by requiring two or more verification methods. -
What is the role of Azure AD Identity Protection?
Azure AD Identity Protection helps detect potential vulnerabilities and risks in user identities. -
What is Azure Advanced Threat Protection (ATP)?
Azure ATP detects and investigates advanced threats, compromised identities, and malicious insider actions. -
What is Azure Firewall?
Azure Firewall is a managed network security service that protects Azure virtual networks. -
What is the purpose of Azure DDoS Protection?
Azure DDoS Protection helps safeguard against Distributed Denial of Service (DDoS) attacks.
4. Monitoring and Reporting
-
What is Azure Monitor?
Azure Monitor collects, analyzes, and acts on telemetry from cloud and on-premises environments. -
What is Azure Log Analytics?
Azure Log Analytics collects and analyzes data from resources in Azure to provide insights. -
What is Azure Application Insights?
Azure Application Insights helps monitor application performance and usage. -
What is Azure Service Health?
Azure Service Health provides personalized alerts and guidance when Azure services are affected. -
What is Azure Activity Log?
Azure Activity Log provides a record of operations on resources, such as create, delete, or update. -
What are Azure Alerts?
Azure Alerts notify users of specific events or conditions in their resources. -
What is the purpose of Azure Automation?
Azure Automation simplifies management and automation of Azure resources. -
What is Azure Network Watcher?
Azure Network Watcher allows monitoring and diagnosing network issues in Azure. -
What is Azure Resource Graph?
Azure Resource Graph provides exploration and query capabilities for large-scale Azure environments. -
What is Azure Security Center Standard Tier?
The Standard Tier provides advanced security management and threat protection for Azure resources.
5. Identity and Access Management (IAM)
-
What is Azure Active Directory (Azure AD)?
Azure AD is a cloud-based identity and access management service. -
What is an Azure AD tenant?
An Azure AD tenant represents an instance of Azure AD that holds and manages users and applications. -
What is Single Sign-On (SSO) in Azure?
SSO enables users to log in once to access multiple applications without re-entering credentials. -
What is Azure AD B2C?
Azure AD B2C enables you to provide access to your applications for external users. -
What is Azure AD Connect?
Azure AD Connect is a tool that synchronizes on-premises directories with Azure AD. -
What is Azure AD Domain Services?
Azure AD Domain Services provides domain-join, group policy, and other Active Directory features in Azure. -
What is Azure AD Privileged Identity Management (PIM)?
PIM helps manage, control, and monitor access to critical Azure resources. -
What is a conditional access policy in Azure AD?
Conditional access policies control access to applications based on certain conditions like location and device state. -
What is the purpose of Azure AD Application Proxy?
Azure AD Application Proxy allows users to securely access on-premises applications from anywhere. -
What is Azure AD Connect Health?
Azure AD Connect Health provides monitoring and insights into the health of your Azure AD Connect synchronization.
6. Compliance and Risk Management
-
What is Azure Compliance Manager?
Azure Compliance Manager helps manage compliance with regulations and standards within Azure. -
What is the purpose of Azure Blueprints in compliance?
Azure Blueprints help ensure that Azure resources are deployed in compliance with organizational policies. -
What is Azure Policy Remediation?
Remediation helps apply necessary changes to non-compliant resources to align with policy rules. -
What is the Azure Trust Center?
The Azure Trust Center provides information on Azure’s compliance with security and privacy standards. -
What is a regulatory compliance certification in Azure?
Regulatory compliance certifications are assessments verifying that Azure meets specific security and compliance requirements. -
What is the purpose of the Azure Compliance Certifications page?
It provides a list of regulatory certifications Azure has obtained, helping organizations ensure compliance. -
What is the significance of Azure Government?
Azure Government provides cloud services specifically for U.S. government customers with strict compliance needs. -
What is an audit log in Azure?
An audit log records changes and access attempts within an Azure environment for compliance and security tracking. -
What is the purpose of Azure Resource Locks?
Resource locks prevent critical resources from being accidentally deleted or modified. -
What is Azure Risk Management?
Azure Risk Management helps identify, assess, and mitigate potential risks across your Azure environment.
7. Azure Security Best Practices
-
What is Azure Security Center’s Secure Score?
Secure Score evaluates the security state of your Azure environment and provides recommendations for improvement. -
What are the benefits of Azure AD Identity Protection?
Identity Protection detects, investigates, and responds to risky behaviors and accounts in Azure AD. -
What is the role of Azure Firewall in security?
Azure Firewall provides network security by filtering traffic to and from resources in Azure. -
What is Network Security Group (NSG) in Azure?
NSG is used to filter network traffic to and from Azure resources. -
What is the purpose of Azure Bastion?
Azure Bastion provides secure and seamless RDP and SSH connectivity to Azure VMs without public IP addresses. -
What is the role of VPN Gateway in Azure?
VPN Gateway provides secure, encrypted connectivity between on-premises networks and Azure. -
What is the role of Azure Load Balancer in security?
Azure Load Balancer distributes traffic across resources, helping to ensure the availability and security of applications. -
What is the purpose of the Azure AD Conditional Access?
Conditional Access ensures users meet certain requirements before accessing resources. -
What is the role of a Web Application Firewall (WAF) in Azure?
WAF protects web applications by filtering and monitoring HTTP traffic for malicious activity. -
What is Azure Application Gateway?
Azure Application Gateway provides web traffic load balancing and WAF features for your web applications.
8. Data Security
-
What is Azure Storage Encryption?
Azure Storage Encryption automatically encrypts data at rest within Azure Storage accounts. -
What is Azure Disk Encryption?
Azure Disk Encryption provides encryption for Windows and Linux virtual machine disks. -
What is Azure Security Center’s data encryption feature?
It ensures sensitive data is encrypted at rest, transit, and at runtime. -
What is Azure Information Protection?
Azure Information Protection helps classify, label, and protect data based on sensitivity. -
What is Azure Rights Management?
Azure Rights Management allows the protection of sensitive information by restricting access based on policies. -
What is Azure Key Vault’s role in data protection?
Azure Key Vault securely stores and controls access to secrets, keys, and certificates. -
What is the Azure Storage Access Key?
The access key provides full access to Azure Storage accounts, enabling programmatic access to the storage resources. -
What is Azure SQL Database Transparent Data Encryption (TDE)?
TDE helps protect SQL databases by encrypting data at rest. -
What is Azure Disk Encryption for VMs?
Azure Disk Encryption encrypts Windows and Linux OS disks and data disks in Azure VMs. -
What is the purpose of Azure Data Lake Storage?
Azure Data Lake Storage provides a scalable and secure platform for storing large amounts of data.
9. Encryption and Key Management
-
What is the Azure Encryption Key Vault?
It securely manages and controls access to cryptographic keys used for data encryption. -
What is Azure Key Vault Managed HSM?
Managed HSM is a fully managed hardware security module (HSM) that supports key management in the cloud. -
What is Bring Your Own Key (BYOK) in Azure Key Vault?
BYOK allows customers to use their own encryption keys within Azure Key Vault for greater control. -
What is the difference between Key Vault and Azure AD?
Key Vault manages cryptographic keys and secrets, while Azure AD handles identity and access management. -
What is the role of encryption at rest in Azure?
Encryption at rest ensures data is securely encrypted when stored in Azure services. -
What is encryption in transit in Azure?
Encryption in transit protects data during transfer between systems. -
What is Azure Key Vault’s role in secure application development?
It helps developers securely store sensitive application information, such as API keys, connection strings, and passwords. -
What is customer-managed key encryption in Azure?
It allows customers to control and manage the encryption keys used to protect their data in Azure. -
What is Azure Key Vault’s key rotation?
Key rotation helps maintain the security of encryption keys by periodically changing them. -
What are the compliance standards related to encryption in Azure?
Azure follows various encryption and security standards like FIPS 140-2, GDPR, and ISO/IEC standards.
10. Incident Response and Disaster Recovery
-
What is Azure Backup?
Azure Backup provides a simple and reliable cloud-based backup solution for Azure resources. -
What is Azure Site Recovery?
Azure Site Recovery provides disaster recovery as a service, ensuring business continuity. -
What is the role of Azure Security Center in incident response?
It provides security recommendations and alerts about potential security incidents in Azure. -
What is the Azure Incident Response plan?
It outlines steps to detect, respond to, and recover from security incidents. -
What is the Azure Security Center’s Threat Protection feature?
It helps detect and mitigate potential threats, such as malware and malicious activity. -
What are Azure backup recovery points?
Recovery points are saved versions of data that can be used to restore the system during a disaster. -
What is Azure disaster recovery in the context of a virtual machine?
It involves replicating VMs to another region for high availability in case of a failure. -
What is Azure Monitor’s role in incident response?
Azure Monitor provides metrics and logs that help identify and troubleshoot potential security incidents. -
What is the purpose of security alerts in Azure Security Center?
Security alerts inform you about potential security issues and allow you to take appropriate action. -
What is a recovery plan in Azure Site Recovery?
A recovery plan is a set of automated actions for recovering your application in case of a disaster.