Skip to content

Commit d14a2a8

Browse files
committed
fix knowledge check
1 parent 89a50d5 commit d14a2a8

1 file changed

Lines changed: 19 additions & 31 deletions

File tree

learn-pr/wwl-sci/design-solutions-secure-applications/9-knowledge-check.yml

Lines changed: 19 additions & 31 deletions
Original file line numberDiff line numberDiff line change
@@ -38,48 +38,36 @@ quiz:
3838
- content: "A set of principles designed to integrate security testing and evaluation into the software development lifecycle (SDLC)."
3939
isCorrect: true
4040
explanation: "DevSecOps is short for Development, Security, and Operations, which aims to integrate security activities into all stages of the SDLC to achieve application and infrastructure resilience."
41-
- content: "A method to monitor customer satisfaction after every release of the product to ensure continuous improvement."
42-
isCorrect: false
43-
explanation: "While monitoring customer satisfaction is essential, it's not directly related to DevSecOps. Monitoring is also more of an Operations concern than something taken care of within the Development phase."
44-
- content: "What is a service principal in Microsoft Entra ID?"
41+
- content: "What is the role of a service principal in Microsoft Entra ID?"
4542
choices:
46-
- content: "A managed identity for a specific Azure resource"
43+
- content: "It serves as the local representation of an application in a specific tenant, defining what the application can do and which resources it can access."
4744
isCorrect: true
48-
explanation: "Service principals act as an interface to allow access using OAuth 2.0 protocols between Azure AD and independent software applications."
49-
- content: "An authentication mechanism that authenticates the client application identity"
50-
isCorrect: false
51-
explanation: "This describes the process of OAuth2.0 that allows resources to accept external access, not just a service principal."
52-
- content: "A user identity for a specific Azure resource"
45+
explanation: "A service principal is the local instance of an application in a tenant. While applications are defined globally by application objects, service principals define what an application can actually do in that specific tenant, who can use it, and what resources it can access."
46+
- content: "It provides automatic credential rotation for Azure resources without developer intervention."
5347
isCorrect: false
54-
explanation: "User identities are tied to individual users, Service Client Identities authenticate applications."
55-
- content: "Azure platform tokens revocation mechanism"
48+
explanation: "Automatic credential rotation without developer intervention describes managed identities, which are a special type of service principal. Service principals themselves can use certificates or secrets that require manual management."
49+
- content: "It encrypts all communication between Azure services using mutual TLS."
5650
isCorrect: false
57-
explanation: "Azure platform tokens are time-bound authorization keys issued by Microsoft Entra ID to resources. They've little to do with Service Principal authentication."
58-
- content: "What happens when a particular service account or machine accesses a resource using its Shared Access Signature token?"
51+
explanation: "Service principals handle authentication and authorization, not transport-layer encryption. Mutual TLS is configured separately at the network or service level."
52+
- content: "Why should Azure API Management subscription keys not be used as the sole authentication mechanism for APIs?"
5953
choices:
60-
- content: "The access shows up under the computer's credentials in Microsoft Entra ID's analytics logs."
61-
isCorrect: false
62-
explanation: "Shared Access Signatures don't pertain to Microsoft Entra ID, they're Azure object storage mechanism."
63-
- content: "The resource will only be accessible if the token has the appropriate permission scope."
54+
- content: "Because subscription keys are shared secrets that don't identify individual callers."
6455
isCorrect: true
65-
explanation: "Shared Access Signatures work at the level of the specific bound resource, meaning the permissions granted to the corresponding SAS token apply to this target only."
66-
- content: "It bypasses all permissions set on the resource."
56+
explanation: "Subscription keys identify a subscription, not the specific user or application making the request. For proper authentication, use OAuth 2.0 with Microsoft Entra ID, which validates individual caller identity through JWT tokens. Subscription keys are appropriate for rate limiting and usage tracking."
57+
- content: "Because subscription keys are incompatible with Azure Front Door and Application Gateway."
6758
isCorrect: false
68-
explanation: "Authentication and Authorization are always calculated and checked against the set access control policies and user/role-based authorization mechanisms."
69-
- content: "It triggers event-based alert notifications"
59+
explanation: "Subscription keys can be passed through Azure Front Door and Application Gateway. The limitation is that they don't identify individual callers, not that they're incompatible with other Azure services."
60+
- content: "Because subscription keys can only authenticate requests from Azure-hosted applications."
7061
isCorrect: false
71-
explanation: "Shared Access Signatures are a method still not greatly prevalent in Azure Functionality, and thus don't trigger alerts."
62+
explanation: "Subscription keys can be used by any API consumer regardless of where the application is hosted. The issue is that they are shared secrets that don't provide individual caller identification."
7263
- content: "What type of threats is the Azure web application firewall designed to protect against?"
7364
choices:
74-
- content: "Server level attacks such as shared hosting violations"
65+
- content: "Server-level attacks such as shared hosting violations"
7566
isCorrect: false
76-
explanation: "Azure Web Application Firewall is deployed in front of a web server farm and protects against layer 7 -application-level- distributed denial-of-service (DDoS) attacks."
67+
explanation: "Azure Web Application Firewall protects against layer 7 application-level threats such as injection attacks and cross-site scripting, not server-level hosting violations."
7768
- content: "Phishing attacks and credential stealing attempts"
7869
isCorrect: false
79-
explanation: "As useful as this would be, the WAF is positioned for application-level security only."
80-
- content: "SQL injection, Cross-site scripting attacks, and HTTP protocol violations"
70+
explanation: "WAF inspects incoming HTTP/HTTPS traffic against rule sets for known attack patterns like SQL injection and XSS. It doesn't address phishing or credential theft."
71+
- content: "SQL injection, cross-site scripting attacks, and HTTP protocol violations"
8172
isCorrect: true
82-
explanation: "These are some of the most common web applications' vulnerability exploits, all of which can be programmed into a well-managed web application firewall policy."
83-
- content: "Malware propagation and attack repulsion"
84-
isCorrect: false
85-
explanation: "WAF is position around application-level DDoS attack protection, this does NOT include general-purpose malware repulsion"
73+
explanation: "Azure WAF protects against these common web application vulnerabilities using managed rule sets based on the OWASP Core Rule Set. It also protects against file inclusion, command injection, HTTP request smuggling, and other OWASP Top 10 threats."

0 commit comments

Comments
 (0)