Skip to content

Commit 82ee5d5

Browse files
committed
fix for acrolynx
1 parent 0a34f76 commit 82ee5d5

File tree

5 files changed

+18
-18
lines changed

5 files changed

+18
-18
lines changed

learn-pr/wwl-sci/case-study-design-security-operations-identity-compliance-capabilities/6-knowledge-check.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ uid: learn.wwl.case-study-design-security-operations-identity-compliance-capabil
33
title: Knowledge check
44
metadata:
55
title: Knowledge check
6-
description: "Knowledge check for case study on: Design security operations, identity and compliance capabilities."
6+
description: "Knowledge check for case study on: Design security operations, identity, and compliance capabilities."
77
ms.date: 4/5/2023
88
author: ceperezb
99
ms.author: ceperezb

learn-pr/wwl-sci/case-study-design-security-solutions-applications-data/6-knowledge-check.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ quiz:
3030
choices:
3131
- content: "A practice that ensures system uptime by maintaining optimal replica volumes."
3232
isCorrect: false
33-
explanation: "DevSecOps isn't concerned with replica volumes of systems, which details replication strategies used in high availability deployment scenarios."
33+
explanation: "DevSecOps isn't concerned with replica volumes of systems, which detail replication strategies used in high availability deployment scenarios."
3434
- content: "A security model used by developers to certify that code changes do not affect production environments."
3535
isCorrect: false
3636
explanation: "There's no certification process involved in DevSecOps. The idea behind DevSecOps is that security mechanisms are integrated throughout the development cycle to increase the overall security posture."
@@ -53,7 +53,7 @@ quiz:
5353
explanation: "These are some of the most common web applications' vulnerability exploits, all of which can be programmed into a well-managed web application firewall policy."
5454
- content: "Malware propagation and attack repulsion"
5555
isCorrect: false
56-
explanation: "WAF is position around application-level DDoS attack protection, this does NOT include general-purpose malware repulsion"
56+
explanation: "WAF is position around application-level DDoS attack protection. This does NOT include general-purpose malware repulsion"
5757
- content: What are the benefits of using Azure Key Vault for data encryption in Azure?
5858
choices:
5959
- content: It provides a centralized key management solution.

learn-pr/wwl-sci/case-study-design-security-solutions-infrastructure/6-knowledge-check.yml

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -36,10 +36,10 @@ quiz:
3636
explanation: "This statement is referring to another concept called hybrid and multicloud connectivity."
3737
- content: "To enable users to prevent and respond to threats, automate compliance requirements, and assess the security posture of their cloud environment."
3838
isCorrect: true
39-
explanation: "CSPM helps users ensure their cloud environment is secure by assessing, identifying, preventing and responding to threats or vulnerabilities that could compromise it. Additionally, it automates compliance tasks and monitors security configuration across all cloud resources or services."
39+
explanation: "CSPM helps users ensure their cloud environment is secure by assessing, identifying, preventing, and responding to threats or vulnerabilities that could compromise it. Additionally, it automates compliance tasks and monitors security configuration across all cloud resources or services."
4040
- content: "To provide endpoint protection against advanced attacks."
4141
isCorrect: false
42-
explanation: "Endpoint protection refers to a different approach to security which involves securing individual endpoints like devices or servers."
42+
explanation: "Endpoint protection refers to a different approach to security, which involves securing individual endpoints like devices or servers."
4343
- content: "What is Cloud Workload Protection in Microsoft Defender for Cloud?"
4444
choices:
4545
- content: "A feature that provides external attack surface management."
@@ -53,18 +53,18 @@ quiz:
5353
explanation: "Workload protection is designed specifically for addressing threats targeting cloud workloads such as applications or containers."
5454
- content: "A feature that provides security controls for DevOps teams and their CI/CD pipelines."
5555
isCorrect: false
56-
explanation: "This statement is referring to another feature called Azure Defender for Kubernetes which provides native security controls for CI/CD pipelines."
56+
explanation: "This statement is referring to another feature called Azure Defender for Kubernetes, which provides native security controls for CI/CD pipelines."
5757
- content: "What is Azure Arc used for?"
5858
choices:
5959
- content: "To automatically scale compute resources in cloud environments."
6060
isCorrect: false
61-
explanation: "This statement describes auto scaling which is related but distinct from Azure Arc."
61+
explanation: "This statement describes auto scaling, which is related but distinct from Azure Arc."
6262
- content: "To monitor network traffic and detect anomalies in cloud environments."
6363
isCorrect: false
64-
explanation: "This statement describes a network monitoring tool, rather than Azure Arc which is more focused on enabling hybrid cloud management."
64+
explanation: "This statement describes a network monitoring tool, rather than Azure Arc, which is more focused on enabling hybrid cloud management."
6565
- content: "To extend Azure management capabilities and tools to manage resources running outside of Azure datacenters."
6666
isCorrect: true
6767
explanation: "Azure Arc enables enterprises to manage their infrastructure centrally from Azure portal, including servers, Kubernetes clusters, and applications running in distributed environments."
6868
- content: "To perform virtual machine backups and disaster recovery for cloud environments."
6969
isCorrect: false
70-
explanation: "This statement generally refers to another feature within Azure called Azure Site Recovery which focuses on ensuring business continuity and disaster recovery."
70+
explanation: "This statement generally refers to another feature within Azure called Azure Site Recovery, which focuses on ensuring business continuity and disaster recovery."

learn-pr/wwl-sci/case-study-design-solutions-security-best-practices-priorities/6-knowledge-check.yml

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -33,27 +33,27 @@ quiz:
3333
explanation: "The Cloud Adoption Framework provides guidance on how to adopt and implement cloud technologies securely, efficiently and effectively."
3434
- content: "To help organizations build secure applications and infrastructure in the cloud"
3535
isCorrect: true
36-
explanation: "The Cloud Adoption Framework helps organizations to design, deploy and operate cloud workloads that are consistent with their business objectives and meet security and compliance requirements."
36+
explanation: "The Cloud Adoption Framework helps organizations to design, deploy, and operate cloud workloads that are consistent with their business objectives and meet security and compliance requirements."
3737
- content: "To establish security standards within the organization"
3838
isCorrect: false
3939
explanation: "The Cloud Adoption Framework does not specifically address establishing security standards within an organization."
4040
- content: "To provide guidance on network architecture for hybrid environments"
4141
isCorrect: false
42-
explanation: "The Cloud Adoption Framework does not specifically address network architecture for hybrid environments."
42+
explanation: "The Cloud Adoption Framework doesn't specifically address network architecture for hybrid environments."
4343
- content: "Which of the following is a key principle of the Well-Architected Framework?"
4444
choices:
4545
- content: "Optimize for ease of use"
4646
isCorrect: false
47-
explanation: "A key principle of the Well-Architected Framework is 'optimize for cost', which means making trade-offs between the cost of running your workloads and the value they provide to your organization."
47+
explanation: "A key principle of the Well-Architected Framework is 'optimize for cost,' which means making trade-offs between the cost of running your workloads and the value they provide to your organization."
4848
- content: "Plan for failure"
4949
isCorrect: true
50-
explanation: "Another key principle of the Well-Architected Framework is 'design for failure', which means planning for potential problems and creating resilient systems that can withstand failures without significant downtime or data loss."
50+
explanation: "Another key principle of the Well-Architected Framework is 'design for failure,' which means planning for potential problems and creating resilient systems that can withstand failures without significant downtime or data loss."
5151
- content: "Choose proprietary technology solutions over open source options"
5252
isCorrect: false
53-
explanation: "The Well-Architected Framework does not make any recommendations regarding the choice of proprietary vs open source technology solutions."
54-
- content: "Maximize use of third-party services for application development"
53+
explanation: "The Well-Architected Framework doesn't make any recommendations regarding the choice of proprietary vs open source technology solutions."
54+
- content: "Maximize use of non-Microsoft services for application development"
5555
isCorrect: false
56-
explanation: "While the Well-Architected Framework does encourage the use of managed services provided by cloud service providers, it does not specifically recommend maximizing the use of third-party services for application development."
56+
explanation: "While the Well-Architected Framework does encourage the use of managed services provided by cloud service providers, it doesn't specifically recommend maximizing the use of non-Microsoft services for application development."
5757
- content: "What is a critical component of business resiliency planning?"
5858
choices:
5959
- content: "Strict adherence to company policies and procedures"

learn-pr/wwl-sci/case-study-design-solutions-security-best-practices-priorities/index.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,14 +2,14 @@
22
uid: learn.wwl.case-study-design-solutions-security-best-practices-priorities
33
metadata:
44
title: "Case study: Design solutions that align with security best practices and priorities"
5-
description: "Apply your cybersecurity architect skills on a real business scenario in the area of security operations, identity, and compliance. You analyze design requirements, answer conceptual and technical questions and design a solution to meet the business needs."
5+
description: "Apply your cybersecurity architect skills on a real business scenario in the area of security best practices. You analyze design requirements, answer conceptual and technical questions and design a solution to meet the business needs."
66
ms.date: 07/01/2025
77
author: ceperezb
88
ms.author: ceperezb
99
ms.topic: module
1010
ms.service: security
1111
title: "Case study: Design solutions that align with security best practices and priorities"
12-
summary: "Apply your cybersecurity architect skills on a real business scenario in the area of security operations, identity, and compliance. You analyze design requirements, answer conceptual and technical questions and design a solution to meet the business needs."
12+
summary: "Apply your cybersecurity architect skills on a real business scenario in the area of security best practices. You analyze design requirements, answer conceptual and technical questions and design a solution to meet the business needs."
1313
abstract: |
1414
You learn:
1515
- How to analyze business requirements

0 commit comments

Comments
 (0)