You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/case-study-design-security-operations-identity-compliance-capabilities/6-knowledge-check.yml
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/case-study-design-security-solutions-applications-data/6-knowledge-check.yml
+2-2Lines changed: 2 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -30,7 +30,7 @@ quiz:
30
30
choices:
31
31
- content: "A practice that ensures system uptime by maintaining optimal replica volumes."
32
32
isCorrect: false
33
-
explanation: "DevSecOps isn't concerned with replica volumes of systems, which details replication strategies used in high availability deployment scenarios."
33
+
explanation: "DevSecOps isn't concerned with replica volumes of systems, which detail replication strategies used in high availability deployment scenarios."
34
34
- content: "A security model used by developers to certify that code changes do not affect production environments."
35
35
isCorrect: false
36
36
explanation: "There's no certification process involved in DevSecOps. The idea behind DevSecOps is that security mechanisms are integrated throughout the development cycle to increase the overall security posture."
@@ -53,7 +53,7 @@ quiz:
53
53
explanation: "These are some of the most common web applications' vulnerability exploits, all of which can be programmed into a well-managed web application firewall policy."
54
54
- content: "Malware propagation and attack repulsion"
55
55
isCorrect: false
56
-
explanation: "WAF is position around application-level DDoS attack protection, this does NOT include general-purpose malware repulsion"
56
+
explanation: "WAF is position around application-level DDoS attack protection. This does NOT include general-purpose malware repulsion"
57
57
- content: What are the benefits of using Azure Key Vault for data encryption in Azure?
58
58
choices:
59
59
- content: It provides a centralized key management solution.
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/case-study-design-security-solutions-infrastructure/6-knowledge-check.yml
+6-6Lines changed: 6 additions & 6 deletions
Original file line number
Diff line number
Diff line change
@@ -36,10 +36,10 @@ quiz:
36
36
explanation: "This statement is referring to another concept called hybrid and multicloud connectivity."
37
37
- content: "To enable users to prevent and respond to threats, automate compliance requirements, and assess the security posture of their cloud environment."
38
38
isCorrect: true
39
-
explanation: "CSPM helps users ensure their cloud environment is secure by assessing, identifying, preventing and responding to threats or vulnerabilities that could compromise it. Additionally, it automates compliance tasks and monitors security configuration across all cloud resources or services."
39
+
explanation: "CSPM helps users ensure their cloud environment is secure by assessing, identifying, preventing, and responding to threats or vulnerabilities that could compromise it. Additionally, it automates compliance tasks and monitors security configuration across all cloud resources or services."
40
40
- content: "To provide endpoint protection against advanced attacks."
41
41
isCorrect: false
42
-
explanation: "Endpoint protection refers to a different approach to security which involves securing individual endpoints like devices or servers."
42
+
explanation: "Endpoint protection refers to a different approach to security, which involves securing individual endpoints like devices or servers."
43
43
- content: "What is Cloud Workload Protection in Microsoft Defender for Cloud?"
44
44
choices:
45
45
- content: "A feature that provides external attack surface management."
@@ -53,18 +53,18 @@ quiz:
53
53
explanation: "Workload protection is designed specifically for addressing threats targeting cloud workloads such as applications or containers."
54
54
- content: "A feature that provides security controls for DevOps teams and their CI/CD pipelines."
55
55
isCorrect: false
56
-
explanation: "This statement is referring to another feature called Azure Defender for Kubernetes which provides native security controls for CI/CD pipelines."
56
+
explanation: "This statement is referring to another feature called Azure Defender for Kubernetes, which provides native security controls for CI/CD pipelines."
57
57
- content: "What is Azure Arc used for?"
58
58
choices:
59
59
- content: "To automatically scale compute resources in cloud environments."
60
60
isCorrect: false
61
-
explanation: "This statement describes auto scaling which is related but distinct from Azure Arc."
61
+
explanation: "This statement describes auto scaling, which is related but distinct from Azure Arc."
62
62
- content: "To monitor network traffic and detect anomalies in cloud environments."
63
63
isCorrect: false
64
-
explanation: "This statement describes a network monitoring tool, rather than Azure Arc which is more focused on enabling hybrid cloud management."
64
+
explanation: "This statement describes a network monitoring tool, rather than Azure Arc, which is more focused on enabling hybrid cloud management."
65
65
- content: "To extend Azure management capabilities and tools to manage resources running outside of Azure datacenters."
66
66
isCorrect: true
67
67
explanation: "Azure Arc enables enterprises to manage their infrastructure centrally from Azure portal, including servers, Kubernetes clusters, and applications running in distributed environments."
68
68
- content: "To perform virtual machine backups and disaster recovery for cloud environments."
69
69
isCorrect: false
70
-
explanation: "This statement generally refers to another feature within Azure called Azure Site Recovery which focuses on ensuring business continuity and disaster recovery."
70
+
explanation: "This statement generally refers to another feature within Azure called Azure Site Recovery, which focuses on ensuring business continuity and disaster recovery."
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/case-study-design-solutions-security-best-practices-priorities/6-knowledge-check.yml
+7-7Lines changed: 7 additions & 7 deletions
Original file line number
Diff line number
Diff line change
@@ -33,27 +33,27 @@ quiz:
33
33
explanation: "The Cloud Adoption Framework provides guidance on how to adopt and implement cloud technologies securely, efficiently and effectively."
34
34
- content: "To help organizations build secure applications and infrastructure in the cloud"
35
35
isCorrect: true
36
-
explanation: "The Cloud Adoption Framework helps organizations to design, deploy and operate cloud workloads that are consistent with their business objectives and meet security and compliance requirements."
36
+
explanation: "The Cloud Adoption Framework helps organizations to design, deploy, and operate cloud workloads that are consistent with their business objectives and meet security and compliance requirements."
37
37
- content: "To establish security standards within the organization"
38
38
isCorrect: false
39
39
explanation: "The Cloud Adoption Framework does not specifically address establishing security standards within an organization."
40
40
- content: "To provide guidance on network architecture for hybrid environments"
41
41
isCorrect: false
42
-
explanation: "The Cloud Adoption Framework does not specifically address network architecture for hybrid environments."
42
+
explanation: "The Cloud Adoption Framework doesn't specifically address network architecture for hybrid environments."
43
43
- content: "Which of the following is a key principle of the Well-Architected Framework?"
44
44
choices:
45
45
- content: "Optimize for ease of use"
46
46
isCorrect: false
47
-
explanation: "A key principle of the Well-Architected Framework is 'optimize for cost', which means making trade-offs between the cost of running your workloads and the value they provide to your organization."
47
+
explanation: "A key principle of the Well-Architected Framework is 'optimize for cost,' which means making trade-offs between the cost of running your workloads and the value they provide to your organization."
48
48
- content: "Plan for failure"
49
49
isCorrect: true
50
-
explanation: "Another key principle of the Well-Architected Framework is 'design for failure', which means planning for potential problems and creating resilient systems that can withstand failures without significant downtime or data loss."
50
+
explanation: "Another key principle of the Well-Architected Framework is 'design for failure,' which means planning for potential problems and creating resilient systems that can withstand failures without significant downtime or data loss."
51
51
- content: "Choose proprietary technology solutions over open source options"
52
52
isCorrect: false
53
-
explanation: "The Well-Architected Framework does not make any recommendations regarding the choice of proprietary vs open source technology solutions."
54
-
- content: "Maximize use of third-party services for application development"
53
+
explanation: "The Well-Architected Framework doesn't make any recommendations regarding the choice of proprietary vs open source technology solutions."
54
+
- content: "Maximize use of non-Microsoft services for application development"
55
55
isCorrect: false
56
-
explanation: "While the Well-Architected Framework does encourage the use of managed services provided by cloud service providers, it does not specifically recommend maximizing the use of third-party services for application development."
56
+
explanation: "While the Well-Architected Framework does encourage the use of managed services provided by cloud service providers, it doesn't specifically recommend maximizing the use of non-Microsoft services for application development."
57
57
- content: "What is a critical component of business resiliency planning?"
58
58
choices:
59
59
- content: "Strict adherence to company policies and procedures"
title: "Case study: Design solutions that align with security best practices and priorities"
5
-
description: "Apply your cybersecurity architect skills on a real business scenario in the area of security operations, identity, and compliance. You analyze design requirements, answer conceptual and technical questions and design a solution to meet the business needs."
5
+
description: "Apply your cybersecurity architect skills on a real business scenario in the area of security best practices. You analyze design requirements, answer conceptual and technical questions and design a solution to meet the business needs."
6
6
ms.date: 07/01/2025
7
7
author: ceperezb
8
8
ms.author: ceperezb
9
9
ms.topic: module
10
10
ms.service: security
11
11
title: "Case study: Design solutions that align with security best practices and priorities"
12
-
summary: "Apply your cybersecurity architect skills on a real business scenario in the area of security operations, identity, and compliance. You analyze design requirements, answer conceptual and technical questions and design a solution to meet the business needs."
12
+
summary: "Apply your cybersecurity architect skills on a real business scenario in the area of security best practices. You analyze design requirements, answer conceptual and technical questions and design a solution to meet the business needs."
0 commit comments