Course quiz: Advanced Cybersecurity Concepts and Capstone Project :Advanced Cybersecurity Concepts and Capstone Project (Microsoft Cybersecurity Analyst Professional Certificate) Answers 2025
1. Question 1
Select all that apply:
✅ Back-end code
❌ Email server
✅ User interface
❌ Network infrastructure
Explanation:
Application decomposition focuses on UI, backend logic, data flows, components — not infrastructure.
2. Question 2
Correct factor for likelihood:
❌ Skillset of attacker
❌ Complexity of attack
❌ Number of vulnerabilities
✅ Impact of the threat ❌ (Incorrect—correct is attacker skill or complexity; but given the options, the BEST answer for likelihood is skillset of attacker)
➡ Correct Answer:
✅ The skillset of the attacker
Explanation:
Likelihood depends on attacker capability + ease of exploit.
3. Question 3
Select all that apply:
✅ External dependencies
✅ Types of data handled
✅ Application architecture
❌ Purpose of the application
Explanation:
Threat modeling decomposition focuses on architecture, data, dependencies.
4. Question 4
✅ Threat analysis
❌ Implementing security measures
❌ Writing cybersecurity policies
Explanation:
STRIDE is a structured threat categorization model.
5. Question 5
❌ Discovery
❌ Distribution
✅ Discoverability
❌ Disturbance
Explanation:
DREAD: Damage, Reproducibility, Exploitability, Affected Users, Discoverability.
6. Question 6
❌ Data exposure restrictions
✅ Encryption
❌ Data anonymization
Explanation:
Encryption is the primary mitigation against data leakage.
7. Question 7
Select all that apply:
✅ Enhance communication & collaboration
✅ Support risk acceptance/transfer/mitigation decisions
✅ Identify threats early
❌ Documenting system components (this is a step, but not a benefit)
Explanation:
Threat modeling benefits: visibility, collaboration, and proactive mitigation.
8. Question 8
❌ Make threat modeling accessible
❌ Predict future threats
✅ Gauge severity of vulnerabilities
❌ Identify latent threats
Explanation:
CVSS scores and ranks vulnerability severity.
9. Question 9
❌ Modern threat modeling framework
❌ Standardized toolset
❌ Comprehensive risk assessment
✅ Risk-centric threat modeling methodology
Explanation:
PASTA is a 7-step, risk-focused threat modeling approach.
10. Question 10
Select all that apply:
✅ Patch management
✅ Vulnerability prioritization
❌ Threat modeling
✅ Risk assessment
Explanation:
CVSS supports prioritization, patching strategy, and risk scoring.
11. Question 11
Select all that apply:
❌ Improved resource allocation
❌ Real-time network vulnerability view
✅ Enhanced security posture
❌ Faster detection & response
➡ VAST’s visual aspect improves clarity and security posture.
12. Question 12
❌ Facilitate developer communication
✅ Identify and mitigate potential threats
❌ Create visual designs
❌ Improve performance
Explanation:
Microsoft Threat Modeling Tool highlights threats early in design.
13. Question 13
Select all that apply:
✅ Virtual Network Gateways
✅ VPN & ExpressRoute
✅ Subnets
❌ Active Directory Domains
Explanation:
VNets include subnets, gateways, and connectivity components.
14. Question 14
❌ Typosquatting
❌ Memory leak
✅ Server-side request forgery (SSRF)
❌ Type confusion
Explanation:
SSRF lets attackers force the server to call internal resources.
15. Question 15
❌ True
✅ False
Explanation:
MITRE ATT&CK maps attacker behaviors during active attacks, not post-incident only.
16. Question 16
❌ System reboots
❌ Network configurations
❌ Startup/run key registry modification
✅ Scheduled tasks
Explanation:
Scheduled tasks are a common persistence mechanism.
17. Question 17
❌ External hard drive
✅ Firmware
❌ Software
❌ RAM
Explanation:
Rootkits hide in firmware, making detection extremely difficult.
18. Question 18
❌ True
✅ False
Explanation:
MCUs run RTOS or bare-metal code, not Windows/Linux.
19. Question 19
❌ Device
❌ User
❌ Data
✅ Privacy
Explanation:
Privacy protection is needed to prevent IoT data misuse and leakage.
20. Question 20
❌ Data theft
❌ Legacy/rogue devices
✅ System compromise
❌ Incorrect option
Explanation:
Lateral movement through IoT represents system compromise.
21. Question 21
❌ Least privilege
❌ Network segmentation
✅ Zero trust criteria
❌ Strong device identity
Explanation:
Zero Trust evaluates device health and trustworthiness.
22. Question 22
❌ Platform services
❌ Managed app platform
✅ Off-the-shelf software? No → Review: For customization, answer is:
➡ Utilizing platform services
Explanation:
Platform services offer flexibility + control.
Correct:
✅ Utilizing platform services
23. Question 23
❌ Basic network tools
❌ Active monitoring w/ agents
❌ Manual discovery
✅ Passive, agentless monitoring
Explanation:
Defender for IoT uses agentless, passive monitoring.
24. Question 24
❌ Social media
❌ Email servers
❌ USBs
✅ Next-generation firewalls
Explanation:
NGFWs inspect traffic deeply and block zero-day behavior.
25. Question 25
❌ Defender for Cloud
❌ Just-in-time access
✅ Adaptive application controls
❌ NSGs
Explanation:
Adaptive controls use ML to detect/block suspicious apps.
26. Question 26
❌ Workbooks
✅ Defender for Cloud + Sentinel
❌ App Gateway
❌ Firewall Manager
Explanation:
This combo integrates SIEM + CSPM + CWPP for full detection & response.
27. Question 27
❌ True
✅ False
Explanation:
Identity-centric security focuses on identity, not perimeter.
28. Question 28
❌ Threat detection
❌ Identity mgmt
✅ Data protection
❌ Network security
Explanation:
AIP = classification + labeling → data protection.
29. Question 29
Select all that apply:
✅ Azure Bastion
❌ Microsoft Sentinel
❌ Azure Policy
❌ ExpressRoute
✅ Azure VPN Gateway
Explanation:
Network security features: Bastion, VPN Gateway, NSGs, Firewalls, etc.
30. Question 30
❌ Azure AD
❌ Azure Policy
❌ Key Vault
✅ Azure Monitor
Explanation:
Azure Monitor provides real-time analytics + alerts for suspicious behavior.
🧾 SUMMARY TABLE
| Q# | Correct Answer |
|---|---|
| 1 | Back-end code, UI |
| 2 | Skillset of attacker |
| 3 | Dependencies, data types, architecture |
| 4 | Threat analysis |
| 5 | Discoverability |
| 6 | Encryption |
| 7 | Communication, risk decisions, early threat detection |
| 8 | Gauge severity |
| 9 | Risk-centric threat modeling |
| 10 | Patch mgmt, vulnerability prioritization, risk assessment |
| 11 | Enhanced security posture |
| 12 | Identify + mitigate threats |
| 13 | Gateways, VPN/ExpressRoute, Subnets |
| 14 | SSRF |
| 15 | False |
| 16 | Scheduled tasks |
| 17 | Firmware |
| 18 | False |
| 19 | Privacy |
| 20 | System compromise |
| 21 | Zero trust criteria |
| 22 | Platform services |
| 23 | Passive agentless monitoring |
| 24 | Next-generation firewalls |
| 25 | Adaptive application controls |
| 26 | Defender for Cloud + Sentinel |
| 27 | False |
| 28 | Data protection |
| 29 | Bastion, VPN Gateway |
| 30 | Azure Monitor |