What is MIG?
Microsoft Information Governance (MIG) is a collection of features to govern your data for compliance or regulations.
What is the difference between Retention Policies and RM?
While Records Management (RM) leverages Retention Policies, they perform differently.
Retention labels keep a copy of the content hidden from the user (but they can still delete/modify content from the UI), but RM blocks actions in the UI.
6 Pillars of Zero Trust
What are the THREE features you can configure to provide automated Data classification?
Trainable classifiers
Sensitive Information Types
Exact Data Matches
Sensitivity labels are an example of Data classification. List THREE other areas.
What FOUR actions can you view with the activity explorer?
True/False: Azure Active Directory (Azure AD) Identity Protection can be used to invoke Multi-Factor Authentication based on a user’s risk level
True. CA is a feature provided by Identity Protection
Hot Area:
Answer Area
______ can use conditional access policies to control sessions in real time.
Cloud App Security /
MS Defender for Cloud
How many trainable classifiers and specific file extensions can be applied to a single Insider Risk Policy?
5 classifiers / 50 file extensions
What is a Sequence, in regards to Insider Risk Management?
A sequence is a group of two or more potentially risky activities performed one after the other that might suggest an elevated risk.
What FOUR categories of activity could trigger alerts for the Data leaks by the priority users sequence?
What’s required for an organisation to use Peer groups for cumulative exfiltration detection?
Your organisation agrees to share Azure AD data with the compliance portal, including organisation hierarchy and job titles.
What data is typically contained in a security token (claim)?
Issuer
Audience
Expiry/Issued at/Not valid before
Subject
OID/TID
Name
Signature
What tech is the MS ID platform built on?
OpenID Connect
How does Peer groups for cumulative exfiltration detection work?
It looks for peers outside the organisation, based on the following criteria:
What TWO secondary authentication TYPES are supported in AAD?
OAuth software/hardware, voice-call verification
What SIX authentication methods are available for SSPR?
What licence is required to allow banned password lists?
Banned password lists are a feature of Azure AD Premium P1
What licence is required to allow PIM?
Azure AD Premium P2
True/False: NSGs can deny inbound traffic from the Internet
TRUE, NSGs deny all in-bound Internet Traffic by default.
What’s an Access Package?
A group of access entitlements needed to fulfil a specific role
What licence is needed to allow Entitlement Management?
Azure AD Premium P2
What licence is needed to allow Access Reviews?
Azure Ad Premium P2
What THREE secondary authentication TECHNOLOGIES are supported in AAD?
Authenticator
Hello for Business
FIDO 2 keys