Self review: Achieving compliance :Cybersecurity Management and Compliance (Microsoft Cybersecurity Analyst Professional Certificate) Answers 2025
1. Question 1
Correct Answer:
✅ Prioritize deploying Azure Active Directory (AAD) as the primary identity provider and enforce Multi-Factor Authentication (MFA) for all users.
❌ Implement an external, third-party identity provider…
❌ Focus on training programs exclusively on disaster recovery…
Explanation:
Azure AD + MFA is core to Microsoft’s Zero Trust and Azure security strategy. It directly supports identity protection, compliance, and secure cloud transformation.
2. Question 2
Correct Answer:
✅ Conduct a comprehensive assessment using Azure CAF to align the company’s cloud strategy with Azure’s best practices…
❌ Implement Azure CAF without any assessments…
❌ Focus solely on scaling cloud infrastructure rapidly…
Explanation:
Azure Cloud Adoption Framework always starts with an assessment (Strategy → Plan). This ensures security, governance, and scalability alignment.
3. Question 3
Correct Answer:
✅ Adopt Azure Data Factory for ETL while simultaneously implementing Azure Policy for compliance.
❌ Implement Azure Policy first…
❌ Prioritize exclusive training on ADF…
Explanation:
Operational efficiency requires ETL orchestration (ADF). Compliance and governance must run in parallel using Azure Policy.
4. Question 4
Correct Answer:
✅ Implement Azure Geo-Replication services and draft an uptime SLA reflecting the redundancy.
❌ Focus only on drafting an SLA…
❌ Rely exclusively on internal disaster recovery mechanisms…
Explanation:
Geo-replication ensures high availability and global redundancy — essential for international operations.
5. Question 5
Correct Answer:
✅ Integrate COBIT with Azure Blueprints and use Azure Compliance Manager for ongoing alignment with standards.
❌ Focus exclusively on COBIT…
❌ Use only Blueprints + Compliance Manager without governance integration…
Explanation:
The best approach is governance (COBIT) + deployment control (Blueprints) + continuous tracking (Compliance Manager).
6. Question 6
Correct Answer:
✅ Use Insider Risk Management + Defender for Identity + Purview Information Protection + Communication Compliance.
❌ Rely solely on Defender for Identity…
❌ Implement AAD + Conditional Access only…
Explanation:
Insider risk requires behavior monitoring, identity protection, data protection, and communication oversight — all must work together.
7. Question 7
Correct Answer:
✅ Initiate classification & protection using AIP + adopt Blob Storage Lifecycle Management for policy-driven data lifecycle.
❌ Focus mainly on user education…
❌ Use lifecycle management only for cost reduction…
Explanation:
AIP secures data; lifecycle management ensures compliance and cost optimization. Both are required for a complete strategy.
8. Question 8
Correct Answer:
✅ Implement integrated monitoring via Azure Blueprints + Compliance Manager, automated checks, rapid remediation, and strong documentation.
❌ Focus mainly on third-party auditors…
❌ Only focus on documentation…
Explanation:
Continuous compliance requires monitoring → checking → remediation → auditing. Azure tools automate most of this.
9. Question 9
Correct Answer:
✅ Azure Blueprints
❌ Azure Security Center
❌ Azure Monitor and Log Analytics
Explanation:
Azure Blueprints creates repeatable, compliant resource deployments aligned with organizational and regulatory standards.
10. Question 10
Correct Answer:
✅ Implement centralized SharePoint repository + templates + automated reporting via Compliance Manager & Power BI.
❌ Use SharePoint only…
❌ Rely only on Azure AD…
Explanation:
A modern compliance workflow requires central storage, automation, dashboards, and compliance tracking.
🧾 Summary Table
| Q# | Correct Answer | Key Concept |
|---|---|---|
| 1 | AAD + MFA | Identity security & Zero Trust |
| 2 | CAF assessment | Cloud Adoption Framework |
| 3 | ADF + Azure Policy | Data orchestration + governance |
| 4 | Geo-Replication + SLA | High availability & redundancy |
| 5 | COBIT + Blueprints + Compliance Manager | Governance + compliance automation |
| 6 | Full insider risk toolset | Holistic insider threat management |
| 7 | AIP + Blob Lifecycle | Data protection + lifecycle management |
| 8 | Monitoring + compliance checks + remediation | Continuous compliance |
| 9 | Azure Blueprints | Compliant resource deployment |
| 10 | SharePoint + Compliance Manager + Power BI | Automated reporting + centralized governance |