Skip to content

Course quiz: Cybersecurity management and compliance :Cybersecurity Management and Compliance (Microsoft Cybersecurity Analyst Professional Certificate) Answers 2025

1. Question 1

Azure Site Recovery (ASR)
❌ Azure Backup
❌ Azure Virtual Desktop

Explanation: ASR supports VM replication across Azure regions and from on-prem to Azure.


2. Question 2

Access is denied by default and granted on a need-to-know basis.
❌ All support personnel…
❌ Only senior administrators…

Explanation: Microsoft enforces “Zero Standing Access” for support engineers.


3. Question 3

Azure Key Vault
❌ Azure Front Door
❌ Application Gateway

Explanation: Key Vault securely stores keys, secrets, certificates.


4. Question 4

❌ Azure Private Link
Role-Based Access Control (RBAC)
❌ Azure Compliance Manager

Explanation: RBAC gives least-privilege, resource-level access.


5. Question 5

❌ True
False

Explanation: CAF covers strategy, governance, security, operations—not only migration.


6. Question 6

True
❌ False

Explanation: CAF security operations integrate with organizational goals.


7. Question 7

Industry and Regional Information
❌ Compliance Manager (only GDPR)
❌ Data Subject Requests

Explanation: This delivers region-specific compliance guidance.


8. Question 8

❌ True
False

Explanation: Defender for Cloud + CSPM works across Azure, AWS, and GCP.


9. Question 9

❌ Microsoft sets replication
You must configure cross-region replication
❌ Microsoft auto-creates VMs

Explanation: Resilience setup is the customer’s responsibility.


10. Question 10

❌ True
False

Explanation: Not every region has Availability Zones.


11. Question 11

❌ Consistent access
❌ Permissible downtime
Return app to a functioning state after failure

Explanation: Resiliency = recovery after failures.


12. Question 12

True
❌ False

Explanation: CIS benchmarks have Level 1 (basic) and Level 2 (advanced).


13. Question 13

❌ True
False

Explanation: Responsibility is shared; CSP doesn’t handle all security/compliance.


14. Question 14

❌ Data Lineage
Content Explorer
❌ Data Map Essentials

Explanation: Content Explorer shows classified data across the environment.


15. Question 15 (Select all)

❌ Data Encryption
Data Classification
Retention Policies
Sensitivity Labels

Explanation: Purview focuses on data governance and protection metadata.


16. Question 16 (Select all)

❌ Automated audits react only after breach
Create a transparent system
Quickly identify irregularities
❌ Replace records management

Explanation: Automated audits enhance visibility but don’t replace governance.


17. Question 17

Intentional Threat
❌ Third-Party Threat
❌ Accidental Breach

Explanation: He purposely leaked data out of revenge.


18. Question 18

❌ Dismiss
Initiate investigation using User Activity reports
❌ Send reminder

Explanation: Insider risk workflows require investigation after alerts.


19. Question 19

Insider Risk Management Investigators
❌ IT Admins
❌ Compliance Analysts


20. Question 20

❌ True
False

Explanation: Information Barriers restrict communication, not allow it.


21. Question 21

❌ extent
❌ protection
type

Explanation: Data governance begins with knowing the type/nature of data.


22. Question 22

❌ Custom Classification
Disposition Review
❌ Automatic Classification

Explanation: Disposition review alerts admins when retention is ending.


23. Question 23

❌ Standardized cloud approach
❌ Mandate Fed cloud migration
Bolster security of federal information systems

Explanation: FISMA ensures federal systems follow security standards.


24. Question 24 (Select all)

❌ Risk Mitigation Techniques
Framework Core
❌ Technology Adaptation Protocols
Framework Profiles

Explanation: NIST includes Core, Profiles, and Implementation Tiers.


25. Question 25

❌ DPIA
Personal data breach
❌ DSR

Explanation: Sending confidential data to the wrong recipient is a GDPR breach.


26. Question 26

❌ ISO/IEC 28000
❌ ISO/IEC 25000
ISO/IEC 27000

Explanation: ISO 27001 belongs to the ISO/IEC 27000 information security family.


27. Question 27 (Select all that apply)

Shared roles and responsibilities
❌ Ensuring data availability
Allocation of duties
Removal/return of customer assets

Explanation: ISO 27017 adds cloud-specific security controls.


28. Question 28

True
❌ False

Explanation: Blueprints can lock deployed resources to prevent changes.


29. Question 29

COBIT
❌ ISO/IEC 15504
❌ Azure Audit Program

Explanation: COBIT aligns IT governance with business goals.


30. Question 30 (Select all)

Organizing preparatory resources
Determining privacy capabilities
❌ Researching new cloud technologies
❌ Selecting a cloud provider

Explanation: Privacy requirements must be defined before selecting a provider.


🧾 FINAL SUMMARY TABLE

Q# Correct Answer
1 Azure Site Recovery
2 Need-to-know access
3 Azure Key Vault
4 RBAC
5 False
6 True
7 Industry & Regional Info
8 False
9 Customer sets replication
10 False
11 Restore after failure
12 True
13 False
14 Content Explorer
15 Data Classification, Retention Policies, Sensitivity Labels
16 Transparency, Quick irregularity detection
17 Intentional threat
18 Investigate with User Activity
19 Insider Risk Management Investigators
20 False
21 Type
22 Disposition Review
23 Strengthen security of federal systems
24 Framework Core, Framework Profiles
25 Personal data breach
26 ISO/IEC 27000
27 Shared roles, Allocation of duties, Return of assets
28 True
29 COBIT
30 Organizing resources, determining privacy capabilities