You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
explanation: "Correct. Multifactor authentication is an example of defense in-depth at the identity and access layer."
39
37
- content: "Ensuring there's no segmentation of your corporate network."
40
38
isCorrect: false
41
-
explanation: "Incorrect. Splitting a network up into multiple sub-networks provides better layered security and is an example of defense in depth at the network layer."
39
+
explanation: "Incorrect. Splitting a network up into multiple subnetworks provides better layered security and is an example of defense in depth at the network layer."
42
40
- content: "The human resources organization wants to ensure that stored employee data is encrypted. Which security mechanism would they use?"
43
41
choices:
44
42
- content: "Hashing."
45
43
isCorrect: false
46
-
explanation: "Incorrect. Hashing uses an algorithm to convert the original text to a *unique* fixed-length hash value but it is different to encryption in that it doesn't use keys, and the hashed value isn't subsequently decrypted back to the original."
44
+
explanation: "Incorrect. Hashing uses an algorithm to convert the original text to a *unique* fixed-length hash value but it's different to encryption in that it doesn't use keys, and the hashed value isn't decrypted back to the original."
47
45
- content: "Encryption in transit."
48
46
isCorrect: false
49
-
explanation: "Incorrect. Encryption in transit is used for encrypting data that is moving from one location to another, not for data that is stored or at rest."
47
+
explanation: "Incorrect. Encryption in transit is used for encrypting data that's moving from one location to another, not for data that is stored or at rest."
50
48
- content: "Encryption at rest."
51
49
isCorrect: true
52
50
explanation: "Correct. Encryption at rest could be part of a security strategy to protect stored employee data."
53
51
- content: "Which of the following best describes the concept of data sovereignty?"
54
52
choices:
55
53
- content: "There are regulations that govern the physical locations where data can be stored and how and when it can be transferred, processed, or accessed internationally."
56
54
isCorrect: false
57
-
explanation: "Incorrect. Regulations that govern the physical locations where data can be stored and how and when it can be transferred, processed, or accessed internationally relates to data residency. Data sovereignty, is the concept that data, particularly personal data, is subject to the laws and regulations of the country/region in which it's physically collected, held, or processed."
58
-
- content: "Data, particularly personal data, is subject to the laws and regulations of the country/region in which it's physically collected, held, or processed."
55
+
explanation: "Incorrect. Regulations that govern the physical locations where data can be stored and how and when it can be transferred, processed, or accessed internationally relates to data residency. Data sovereignty, is the concept that data is subject to the laws and regulations of the country/region in which it's physically collected, held, or processed."
56
+
- content: "Data is subject to the laws and regulations of the country/region in which it's physically collected, held, or processed."
59
57
isCorrect: true
60
-
explanation: "Correct. Data sovereignty is the concept that data, particularly personal data, is subject to the laws and regulations of the country/region in which it's physically collected, held, or processed."
58
+
explanation: "Correct. Data sovereignty is the concept that data is subject to the laws and regulations of the country/region in which it's physically collected, held, or processed."
61
59
- content: "Trust no one, verify everything."
62
60
isCorrect: false
63
-
explanation: "Incorrect. Trust no one, verify everything describes the Zero Trust model. Data sovereignty is the concept that data, particularly personal data, is subject to the laws and regulations of the country/region in which it's physically collected, held, or processed."
61
+
explanation: "Incorrect. Trust no one, verify everything describes the Zero Trust model. Data sovereignty is the concept that data is subject to the laws and regulations of the country/region in which it's physically collected, held, or processed."
As more business data is accessed from locations outside the traditional corporate network, security and compliance are critical concerns for organizations of all sizes. Organizations need to understand how to protect their data, regardless of where it's accessed from and whether it sits on a corporate network, in the cloud, or in AI-powered services. They also need to stay compliant with the growing number of industry and regulatory requirements that govern how data must be handled, stored, and protected.
2
3
3
-
As more business data is being accessed from locations outside of the traditional corporate network, security and compliance have become overriding concerns. Organizations need to understand how they can best protect their data, regardless of where it's accessed from, and whether it sits on their corporate network or in the cloud. In addition, organizations need to ensure they're compliant with industry and regulatory requirements to ensure the protection and privacy of data.
4
-
5
-
This module introduces some important security and compliance concepts. You'll learn about the shared responsibility model, defense in depth, and Zero Trust model. You'll be introduced to the concepts of encryption and hashing as ways to protect data. Lastly, you'll learn about concepts that relate to compliance.
4
+
This module introduces the foundational security and compliance concepts that underpin the Microsoft security, compliance, and identity portfolio. You start with the shared responsibility model, which clarifies which security responsibilities belong to you and which belong to your cloud provider. From there, you explore how a defense-in-depth strategy layers multiple controls to slow and stop attacks, and how the confidentiality, integrity, and availability (CIA) triad frames the goals of any security effort. You learn about the Zero Trust model—and why trusting the network perimeter alone is no longer sufficient in a world where work happens from anywhere. You then explore encryption and hashing as technical mechanisms for protecting data. Finally, you learn about governance, risk, and compliance (GRC) as the structured approach organizations use to manage their obligations and responsibilities.
6
5
7
6
After completing this module, you'll be able to:
8
7
9
-
- Describe the shared responsibility and the defense in-depth security models.
10
-
- Describe the Zero-Trust model.
11
-
- Describe the concepts of encryption and hashing.
12
-
- Describe some basic compliance concepts.
8
+
- Describe the shared responsibility model and how responsibilities shift across on-premises, IaaS, PaaS, and SaaS environments, including AI services.
9
+
- Describe defense-in-depth as a layered security strategy and explain the confidentiality, integrity, and availability (CIA) triad.
10
+
- Describe the Zero Trust model, its guiding principles, and its seven foundational pillars.
11
+
- Describe encryption and hashing as mechanisms for protecting data at rest, in transit, and in use.
12
+
- Describe Governance, Risk, and Compliance (GRC) concepts, including data residency, data sovereignty, and data privacy.
0 commit comments