Skip to content

Commit f838249

Browse files
author
Jill Grant
authored
Merge pull request #47324 from v-thpra/azure-triage-fix-321064
Fix for User Feedback 321064: UUF - learn-pr - Design to protect availability - Training | Microsoft Learn
2 parents b506a53 + 3ad12c3 commit f838249

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

learn-pr/azure/azure-well-architected-security/5-design-to-protect-availability.yml

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -16,23 +16,23 @@ quiz:
1616
questions:
1717
- content: 'How did Contoso use security controls to respond to an attack that overwhelmed their system?'
1818
choices:
19-
- content: 'They used adopted a design pattern that minimized the blast radius attacks like this one.'
19+
- content: 'They adopted a design pattern that minimized the blast radius attacks like this one.'
2020
isCorrect: true
21-
explanation: 'Correct. By decoupling their application into smaller components, Contoso was able to minimize the blast radius of future similar attacks.'
21+
explanation: 'Correct. Contoso decoupled their application into smaller components, and was able to minimize the blast radius of future similar attacks.'
2222
- content: 'They blocked access to public-facing services.'
2323
isCorrect: false
24-
explanation: "Incorrect. Blocking access to public-facing services would've prevented legitimate users from accessing the application."
24+
explanation: "Incorrect. Blocking access to public-facing services would prevent legitimate users from accessing the application."
2525
- content: 'They invested in a third-party DDoS protection service.'
2626
isCorrect: false
2727
explanation: "Incorrect. The attack wasn't a DDoS attack and they were able to respond to the attack without the help of a third-party service."
2828
- content: 'They increased the number of virtual machines in their application.'
2929
isCorrect: false
30-
explanation: "Incorrect. This measure would've increased the cost of the application without addressing the root cause of the problem."
30+
explanation: "Incorrect. This measure would increase the cost of the application without addressing the root cause of the problem."
3131
- content: 'What is an example of a preventative measure that can be used to limit attack vectors?'
3232
choices:
3333
- content: "Monitoring resource health"
3434
isCorrect: false
35-
explanation: "Incorrect. Monitoring resource health is a reactive measure that can be used to respond to an attack, but it does not prevent the attack from happening."
35+
explanation: "Incorrect. Monitoring resource health is a reactive measure that can be used to respond to an attack, but it doesn't prevent the attack from happening."
3636
- content: 'Using an anti-malware solution'
3737
isCorrect: true
3838
explanation: 'Correct. Using anti-malware software can prevent malware from being installed on a system.'
@@ -41,7 +41,7 @@ quiz:
4141
explanation: "Incorrect. Autoscaling is good for responding to increased requests, but doesn't limit attack vectors."
4242
- content: 'Using Azure Traffic Manager to block malicious traffic'
4343
isCorrect: false
44-
explanation: "Incorrect. Azure Traffic Manager is used to route traffic to different endpoints, but it does not block malicious traffic."
44+
explanation: "Incorrect. Azure Traffic Manager is used to route traffic to different endpoints, but it doesn't block malicious traffic."
4545
- content: "True or false: when running in a recovery environment, it's OK to have a relaxed security posture in comparison to the production environment."
4646
choices:
4747
- content: "True"

0 commit comments

Comments
 (0)