Security Flashcards

(35 cards)

1
Q

What tool can be used to assess if Security Benchmarks are being followed in your Azure environment?

A

Microsoft Defender for Cloud (Compliance Dashboard)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Network Security Control NS-1?

A

Establish network segmentation boundaries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Network Security Control NS-2?

A

Secure cloud services with network controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Network Security Control NS-3?

A

Deploy a firewall at the edge of the enterprise network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Network Security Control NS-4?

A

Deploy intrusion detection/intrusion prevention systems (IDS/IPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Network Security Control NS-5?

A

Deploy DDOS protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Network Security Control NS-6?

A

Deploy web application firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Network Security Control NS-7?

A

Simplify network security configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Network Security Control NS-8?

A

Detect and disable insecure services and protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Network Security Control NS-9?

A

Connect on-premises or cloud network privately

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Network Security Control NS-10?

A

Ensure Domain Name System (DNS) Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the two tiers of Azure DDoS Protection?

A
  • IP Protection: 15 or fewer IP resources to protect
  • Network Protection: More than 15 IP resources to protect
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Azure DDoS can be combined with what other Service to provide full Layer 3 to Layer 7 DDoS mitigation?

A

Application Gateway WAF (Web Application Firewall)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the three types of DDoS attacks that can be protected against?

A
  • Volumetric Attacks
  • Protocol Attacks
  • Resource/Application Layer Attacks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are three examples of Volumetric DDoS attacks?

A
  • UDP Floods
  • Amplification floods
  • Spoofed-packed floods
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are two examples of Protocol DDoS attacks?

A
  • SYN Floods
  • Reflection Attacks
17
Q

What are three examples of Application Layer DDoS attacks?

A
  • HTTP protocol violations
  • SQL Injection
  • Cross-Site Scripting (XSS)
18
Q

Name the seven (7) key features of Azure DDoS protection

A
  • Native Platform Integration
  • Turnkey protection
  • Always-On Traffic Monitoring
  • Adaptive tuning
  • Attack analysis
  • Attack metrics and alerts
  • Multi-layered protection
19
Q

What are the basic steps to Deploy DDoS to an IP Resource?

A
  • Create a DDoS Plan
  • Enable the DDoS Plan on a VNet (settings)
  • Apply the DDoS Plan to an IP address
  • Enable Metrics/Telemetry on the DDoS Plan
  • Configure DDoS Diagnostics
  • Configure DDoS Alerts
20
Q

What is an NSG and how does it function?

A

Network Security Group - permits or denies traffic based on IP address at the vNIC or Subnet level

21
Q

What is Best Practice for deploying NSGs?

A
  • Deploy at the Subnet level to keep rules simple
  • Deny all traffic by default, permit as needed
22
Q

For each NSG rule, what four (4) elements can be used to filer traffic?

A
  • Source IP
  • Destination IP
  • Port
  • Protocol
23
Q

What two types of NSG rules exist?

A

Inbound
Outbound

24
Q

What are the three (3) SKUs available for Azure Firewall?

A
  • Basic
  • Standard
  • Premium
25
Name the three (3) types of Firewall rules that can be configured in Azure Firewall
- DNAT: translate addresses - Application: filter on FQDN - Network: filter on IP, port, and/or protocol (Inbound and Outbound)
26
What is the default behavior of Azure Firewall in terms of allowing traffic?
Deny all traffic until rules are defined to allow traffic
27
What key elements are required when deploying Azure Firewall?
- VNet - Subnet (purpose: Azure Firewall) - Firewall Rules (or) Firewall Management Policy - IP address (Public)
28
Assuming that Azure Firewall has been deployed to an existing VNet, what general steps are needed to route traffic to the firewall?
- Create a route table - Associate the Route Table with the Subnet - Add a route (default) that points to the inside IP of the firewall - Add a rules to the firewall management policy to permit traffic (
29
What is the purpose of Azure Firewall Manager
Centrally manage configuration and firewall policies for multiple firewalls across an organization
30
Azure Firewall Manager can span which two Azure constructs?
- Span across multiple subscriptions - Span across multiple Regions
31
Name the types (and differences) of Hubs that can be created and managed with Azure Firewall Manager?
- Secured Virtual Hub: Microsoft Managed vWAN hub - Hub Virtual Network: a hub VNet managed by you
32
What are the basic steps to deploy an Azure Firewall Manager?
- Create two or more "Spoke" VNets - Create a secured virtual hub (via Firewall Manager) - Connect the spoke VNets to the Hub - Create a Firewall Policy and Rules - Associate the Firewall Policy to the Secured Virtual Hub - Configure Routing from the Hub for Internet and Private Traffic
33
What are some common attacks that can be defended by Web Application Firewall?
- SQL injection - PHP injection - Cross-Site Scripting - Local file inclusion - Remote command execution - Session fixation (hijacking) - Protocol Attacks (HTTP header injection) - Bots and scanners
34
What are the two protection modes of Web Application Firewall?
- Detection Mode (default) - logs requests matching a rule - Prevention Mode - logs then blocks requests that match a rule
35
What are the common rule sets that Microsoft includes in Web Application Firewall?
- Microsoft Threat Intelligence - Common Vulnerabilities and Exploits (CVE) - Core Based Rules (CRS)