Skip to content

Course quiz: Identity and access solutions :Cybersecurity Identity and Access Solutions using Azure AD (Microsoft Cybersecurity Analyst Professional Certificate) Answers 2025

Correct Answers + Explanations


1. Key function of Microsoft Entra ID

❌ Securing physical data centers
❌ Providing hardware reports
Managing identities and governing access to resources
❌ Replacing faulty devices

Explanation:
Microsoft Entra ID is primarily an identity and access management (IAM) system.


2. Tool for securing & managing devices

❌ Microsoft Teams
❌ Azure Monitor
Microsoft Intune
❌ Task Manager

Explanation:
Intune provides device management & security.


3. Feature in Entra ID P1 vs Free

Dynamic groups for automatic user management
❌ Basic authentication
❌ Simple SSO
❌ Group-based licensing

Explanation:
P1 includes dynamic groups, a premium automation feature.


4. How Entra Connect simplifies identity

❌ Creates temporary accounts
❌ Encrypts credentials
❌ Manages roles
Syncs on-prem directory changes automatically

Explanation:
Entra Connect syncs AD → Microsoft Entra.


5. Stage where access changes due to promotion

❌ Employment
❌ Onboarding
❌ Offboarding
Role change

Explanation:
Job promotion → permissions updated during role change.


6. Difference between B2C and B2B

❌ Org use only
❌ Only Microsoft accounts
B2C is customer-facing
❌ Replaces Entra ID

Explanation:
B2C = consumer identity; B2B = partner/guest collaboration.


7. Key feature of dynamic groups

❌ Bypass compliance
❌ Restricted to locations
❌ Manual assignment
Automatic membership based on attributes

Explanation:
Dynamic groups auto-update.


8. Managed identity reusable across resources

❌ System-assigned
❌ Temporary-assigned
❌ Multi-assigned
User-assigned

Explanation:
User-assigned identities are reusable.


9. Protocol for SSO

❌ OAuth2
SAML
❌ WS-FED
❌ OIDC

Explanation:
SAML is widely used for SSO with enterprise apps.


10. Role of tenant scope

❌ App permissions only
Governs all resources within the tenant
❌ Restrict resource groups
❌ Single subscription

Explanation:
Tenant = top-level boundary for identity.


11. Final step migrating from on-prem AD

❌ Set up MFA
❌ Force password reset
❌ Remove on-prem AD
Migrate applications and services

Explanation:
Apps must be migrated last so users can authenticate.


12. Benefit of biometric authentication

❌ Easy patterns
❌ Shared data
❌ Universal repository
Adds layer of security using physical traits

Explanation:
Biometrics verify something you are.


13. How SSO simplifies access

Login once → access many apps
❌ Eliminates risk
❌ Removes passwords
❌ Auto logout

Explanation:
SSO reduces repeated logins.


14. Why RBA is adaptive

❌ Blocks all untrusted devices
❌ Applies strict rules always
Uses context (location/device) to adjust authentication
❌ Requires biometrics every time

Explanation:
RBA adapts security per risk level.


15. Why choose hybrid identity

❌ No authentication
❌ Reduce security tool cost
Use on-prem directories + cloud services together
❌ No cloud breaches

Explanation:
Hybrid identity bridges AD + Entra ID.


16. Challenge solved by SSPR

❌ Sync passwords across devices
❌ Replace password policy
Reduces support tickets for password resets
❌ Prevent forgetting passwords

Explanation:
SSPR lowers IT helpdesk load.


17. How Azure Key Vault helps security

❌ Biometric storage
❌ Share keys easily
❌ No password policy
Encrypts & stores keys/credentials securely

Explanation:
Key Vault protects secrets, keys, certs.


18. How MFA protects access

❌ Admin approval needed
❌ No authentication
❌ Remove password validation
Adds additional verification factor

Explanation:
Even if passwords are stolen, MFA blocks attacks.


19. Conditional Access security vs usability

❌ No password policy
❌ No risk evaluation
❌ Enforce 2FA always
Triggers MFA only for high-risk attempts

Explanation:
Adaptive enforcement reduces user friction.


20. Step that enforces Conditional Access

Enable the Policy
❌ Access Controls
❌ Assignments
❌ Conditions

Explanation:
A policy does nothing unless enabled.


21. Benefit of phased Conditional Access rollout

❌ Avoid high-risk users
❌ No testing
Allows testing and reduces disruptions
❌ Apply org-wide immediately

Explanation:
Gradual rollout avoids breaking user access.


22. How CA templates save time

❌ Remove need for CA
❌ Enforce automatically
Provide pre-configured policies
❌ Skip user assignments

Explanation:
Templates accelerate deployment.


23. Role of “scope” in role assignment

❌ Assigns roles
Defines where permissions apply
❌ Determines directory role
❌ Specifies permissions granted

Explanation:
Scope = resource boundary.


24. CA alignment with Zero Trust

❌ Broad guest access
🥇 It enforces identity-based access controls
❌ Unrestricted trusted networks
❌ Disable MFA internally

Explanation:
Zero Trust = never trust, always verify.


25. Purpose of privileged access lifecycle mgmt

❌ Remove guests
❌ Password resets
Secure access to sensitive resources
❌ Automate account creation

Explanation:
Manages privileged access end-to-end.


26. How identity lifecycle mgmt enhances security

❌ SSPR
Auto-deactivation of terminated users
❌ Assign privileged roles
❌ View permissions

Explanation:
It ensures access is removed automatically.


27. Practical MFA example

❌ Block untrusted devices
❌ Passwordless login
❌ Secure network
Password + mobile app code

Explanation:
MFA = two or more authentication factors.


28. Example of risk signal

❌ Unpatched software
Atypical travel
❌ Weak password
❌ Email frequency

Explanation:
Identity Protection detects suspicious sign-in behavior.


29. Benefit of automated user provisioning

❌ No password resets
❌ Unrestricted guest access
❌ Give everyone global admin
Reduces errors in account creation & removal

Explanation:
Automation increases accuracy + security.


30. Why MFA is essential

Adds a second verification step
❌ Blocks unfamiliar locations
❌ Replaces passwords
❌ Removes Conditional Access needs

Explanation:
MFA drastically reduces compromised accounts.


🧾 Summary Table

Q Answer Key Concept
1 Managing identities IAM
2 Intune Device management
3 Dynamic groups Entra ID P1
4 Sync directories Entra Connect
5 Role change Lifecycle
6 B2C = customer Identity models
7 Auto membership Dynamic groups
8 User-assigned Managed identity
9 SAML SSO
10 Tenant governs all Tenant scope
11 Migrate apps Migration
12 Physical trait security Biometrics
13 One login, many apps SSO
14 Context-aware RBA
15 Hybrid identity AD + Cloud
16 Reduce password tickets SSPR
17 Encrypt keys Key Vault
18 Extra verification MFA
19 Trigger MFA only on risk Conditional Access
20 Enable policy Enforcement
21 Minimize disruption Phased rollout
22 Pre-configured policies Templates
23 Defin