You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
- content: "Which Microsoft Entra tool can vary the credentials needed to log in based on signals, such as where the user is located?"
21
-
choices:
22
-
- content: "Conditional Access"
23
-
isCorrect: true
24
-
explanation: "Conditional Access is a tool that Microsoft Entra ID uses to allow (or deny) access to resources based on identity signals. Conditional Access might challenge you for a second authentication factor if your sign-in signals are unusual or from an unexpected location."
25
-
- content: "Guest access"
26
-
isCorrect: false
27
-
explanation: "Guest access is an access method that helps enable collaboration across organizational boundaries, but isn’t an authentication method or a tool to help with authentication."
28
-
- content: "Passwordless"
29
-
isCorrect: false
30
-
explanation: "Passwordless is an authentication method that relies on something you have; plus something you are or something you know. For example, Windows Hello is a passwordless authentication method."
31
-
- content: "Which security model assumes the worst-case security scenario, and protects resources accordingly?"
32
-
choices:
33
-
- content: "Zero Trust"
34
-
isCorrect: true
35
-
explanation: "Zero Trust is a security model that assumes the worst case scenario and protects resources with that expectation."
36
-
- content: "Defense-in-depth"
37
-
isCorrect: false
38
-
explanation: "Defense-in-depth is focused on setting up a system that prevents access to information by unauthorized parties. It’s a proactive model and builds layer upon layer to protect information."
39
-
- content: "Role-based access control"
40
-
isCorrect: false
41
-
explanation: "Role-based access control provides the ability to grant or deny access based on a user or services assigned role."
42
-
- content: "A user is simultaneously assigned multiple roles that use role-based access control. What are their actual permissions? The role permissions are: Role 1 - read || Role 2 - write || Role 3 - read and write."
43
-
choices:
44
-
- content: "Read only"
45
-
isCorrect: false
46
-
explanation: "Role-based access control works on an allow model, so they wouldn’t be limited to the permissions of only one role."
47
-
- content: "Write only"
48
-
isCorrect: false
49
-
explanation: "Role-based access control works on an allow model, so they wouldn’t be limited to the permissions of only one role."
50
-
- content: "Read and write"
51
-
isCorrect: true
52
-
explanation: "Role-based access control, using an allow model, grants all of the permissions assigned in all of the assigned roles."
- content: "Which Microsoft Entra tool can vary the credentials needed to log in based on signals, such as where the user is located?"
21
+
choices:
22
+
- content: "Conditional Access"
23
+
isCorrect: true
24
+
explanation: "Conditional Access is a tool that Microsoft Entra ID uses to allow (or deny) access to resources based on identity signals. Conditional Access might challenge you for a second authentication factor if your sign-in signals are unusual or from an unexpected location."
25
+
- content: "Guest access"
26
+
isCorrect: false
27
+
explanation: "Guest access is an access method that helps enable collaboration across organizational boundaries, but isn’t an authentication method or a tool to help with authentication."
28
+
- content: "Passwordless"
29
+
isCorrect: false
30
+
explanation: "Passwordless is an authentication method that relies on something you have; plus something you are or something you know. For example, Windows Hello is a passwordless authentication method."
31
+
- content: "Which security model assumes the worst-case security scenario, and protects resources accordingly?"
32
+
choices:
33
+
- content: "Zero Trust"
34
+
isCorrect: true
35
+
explanation: "Zero Trust is a security model that assumes the worst case scenario and protects resources with that expectation."
36
+
- content: "Defense-in-depth"
37
+
isCorrect: false
38
+
explanation: "Defense-in-depth is focused on setting up a system that prevents access to information by unauthorized parties. It’s a proactive model and builds layer upon layer to protect information."
39
+
- content: "Role-based access control"
40
+
isCorrect: false
41
+
explanation: "Role-based access control provides the ability to grant or deny access based on a user or services assigned role."
42
+
- content: "A user is simultaneously assigned multiple roles that use role-based access control. What are their actual permissions? The role permissions are: Role 1 - read || Role 2 - write || Role 3 - read and write."
43
+
choices:
44
+
- content: "Read only"
45
+
isCorrect: false
46
+
explanation: "Role-based access control works on an allow model, so they wouldn’t be limited to the permissions of only one role."
47
+
- content: "Write only"
48
+
isCorrect: false
49
+
explanation: "Role-based access control works on an allow model, so they wouldn’t be limited to the permissions of only one role."
50
+
- content: "Read and write"
51
+
isCorrect: true
52
+
explanation: "Role-based access control, using an allow model, grants all of the permissions assigned in all of the assigned roles."
53
+
- content: "Which Azure service is designed to securely store secrets, certificates, and encryption keys for your applications?"
54
+
choices:
55
+
- content: "Azure Key Vault"
56
+
isCorrect: true
57
+
explanation: "Azure Key Vault is used to securely store and manage secrets, certificates, and keys."
58
+
- content: "Azure Policy"
59
+
isCorrect: false
60
+
explanation: "Azure Policy helps enforce governance rules, but it doesn't store application secrets or encryption keys."
61
+
- content: "Azure Monitor"
62
+
isCorrect: false
63
+
explanation: "Azure Monitor provides telemetry and observability, not key and secret storage."
Copy file name to clipboardExpand all lines: learn-pr/wwl-azure/describe-azure-identity-access-security/includes/1-introduction.md
+2-1Lines changed: 2 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,4 +1,4 @@
1
-
In this module, you’ll be introduced to the Azure identity, access, and security services and tools. You’ll learn about directory services in Azure, authentication methods, and access control. You’ll also cover things like Zero Trust and defense in depth, and how they keep your cloud safer. You’ll wrap up with an introduction to Microsoft Defender for Cloud.
1
+
In this module, you'll be introduced to the Azure identity, access, and security services and tools. You'll learn about directory services in Azure, authentication methods, and access control. You'll also cover Zero Trust, defense in depth, and how they keep your cloud safer. Finally, you'll review encryption concepts, key management with Azure Key Vault, and Microsoft Defender for Cloud.
2
2
3
3
## Learning objectives
4
4
@@ -11,4 +11,5 @@ After completing this module, you’ll be able to:
11
11
- Describe Azure Role Based Access Control (RBAC).
12
12
- Describe the concept of Zero Trust.
13
13
- Describe the purpose of the defense in depth model.
14
+
- Describe encryption concepts and key management options in Azure.
14
15
- Describe the purpose of Microsoft Defender for Cloud.
Copy file name to clipboardExpand all lines: learn-pr/wwl-azure/describe-azure-identity-access-security/includes/11-summary.md
+13-1Lines changed: 13 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,4 +1,4 @@
1
-
In this module, you learned about Azure identity, access, and security services and tools. You covered authentication methods, including which ones are more secure. You learned about restricting access based on a role to help create a more secure environment. And, you learned about the Defense In Depth and Zero Trust models.
1
+
In this module, you learned about Azure identity, access, and security services and tools. You covered authentication methods, including which ones are more secure. You learned about restricting access based on a role to help create a more secure environment. You also reviewed encryption concepts and key management options in Azure. And, you learned about the Defense In Depth and Zero Trust models.
2
2
3
3
## Learning objectives
4
4
@@ -11,8 +11,20 @@ You should now be able to:
11
11
- Describe Azure Role Based Access Control (RBAC).
12
12
- Describe the concept of Zero Trust.
13
13
- Describe the purpose of the defense in depth model.
14
+
- Describe encryption concepts and key management options in Azure.
14
15
- Describe the purpose of Microsoft Defender for Cloud.
15
16
16
17
## Additional resources
17
18
18
19
The following resources provide more information on topics in this module or related to this module.<br>[Microsoft Certified: Security, Compliance, and Identity Fundamentals](/learn/certifications/security-compliance-and-identity-fundamentals/) is an entire certification, with associated training, dedicated to helping you better understand and manage Security, Compliance, and identity.
20
+
21
+
## Explore with Copilot
22
+
23
+
> [!TIP]
24
+
> Try one of these prompts in Copilot Chat:
25
+
>
26
+
> - "Use one end-to-end scenario to show how SSO, MFA, Conditional Access, and RBAC work together in a Zero Trust design."
27
+
> - "Explain the difference between Microsoft Entra ID, Microsoft Entra Domain Services, and external identities with practical examples."
28
+
> - "Simulate a security incident and show how encryption, key management, defense in depth, and Microsoft Defender for Cloud reduce risk."
0 commit comments