You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: learn-pr/azure/azure-well-architected-security/5-design-to-protect-availability.yml
+6-6Lines changed: 6 additions & 6 deletions
Original file line number
Diff line number
Diff line change
@@ -16,23 +16,23 @@ quiz:
16
16
questions:
17
17
- content: 'How did Contoso use security controls to respond to an attack that overwhelmed their system?'
18
18
choices:
19
-
- content: 'They used adopted a design pattern that minimized the blast radius attacks like this one.'
19
+
- content: 'They adopted a design pattern that minimized the blast radius attacks like this one.'
20
20
isCorrect: true
21
-
explanation: 'Correct. By decoupling their application into smaller components, Contoso was able to minimize the blast radius of future similar attacks.'
21
+
explanation: 'Correct. Contoso decoupled their application into smaller components, and was able to minimize the blast radius of future similar attacks.'
22
22
- content: 'They blocked access to public-facing services.'
23
23
isCorrect: false
24
-
explanation: "Incorrect. Blocking access to public-facing services would've prevented legitimate users from accessing the application."
24
+
explanation: "Incorrect. Blocking access to public-facing services would prevent legitimate users from accessing the application."
25
25
- content: 'They invested in a third-party DDoS protection service.'
26
26
isCorrect: false
27
27
explanation: "Incorrect. The attack wasn't a DDoS attack and they were able to respond to the attack without the help of a third-party service."
28
28
- content: 'They increased the number of virtual machines in their application.'
29
29
isCorrect: false
30
-
explanation: "Incorrect. This measure would've increased the cost of the application without addressing the root cause of the problem."
30
+
explanation: "Incorrect. This measure would increase the cost of the application without addressing the root cause of the problem."
31
31
- content: 'What is an example of a preventative measure that can be used to limit attack vectors?'
32
32
choices:
33
33
- content: "Monitoring resource health"
34
34
isCorrect: false
35
-
explanation: "Incorrect. Monitoring resource health is a reactive measure that can be used to respond to an attack, but it does not prevent the attack from happening."
35
+
explanation: "Incorrect. Monitoring resource health is a reactive measure that can be used to respond to an attack, but it doesn't prevent the attack from happening."
36
36
- content: 'Using an anti-malware solution'
37
37
isCorrect: true
38
38
explanation: 'Correct. Using anti-malware software can prevent malware from being installed on a system.'
@@ -41,7 +41,7 @@ quiz:
41
41
explanation: "Incorrect. Autoscaling is good for responding to increased requests, but doesn't limit attack vectors."
42
42
- content: 'Using Azure Traffic Manager to block malicious traffic'
43
43
isCorrect: false
44
-
explanation: "Incorrect. Azure Traffic Manager is used to route traffic to different endpoints, but it does not block malicious traffic."
44
+
explanation: "Incorrect. Azure Traffic Manager is used to route traffic to different endpoints, but it doesn't block malicious traffic."
45
45
- content: "True or false: when running in a recovery environment, it's OK to have a relaxed security posture in comparison to the production environment."
0 commit comments