Course quiz: Cybersecurity management and compliance :Cybersecurity Management and Compliance (Microsoft Cybersecurity Analyst Professional Certificate) Answers 2025
1. Question 1
✅ Azure Site Recovery (ASR)
❌ Azure Backup
❌ Azure Virtual Desktop
Explanation: ASR supports VM replication across Azure regions and from on-prem to Azure.
2. Question 2
✅ Access is denied by default and granted on a need-to-know basis.
❌ All support personnel…
❌ Only senior administrators…
Explanation: Microsoft enforces “Zero Standing Access” for support engineers.
3. Question 3
✅ Azure Key Vault
❌ Azure Front Door
❌ Application Gateway
Explanation: Key Vault securely stores keys, secrets, certificates.
4. Question 4
❌ Azure Private Link
✅ Role-Based Access Control (RBAC)
❌ Azure Compliance Manager
Explanation: RBAC gives least-privilege, resource-level access.
5. Question 5
❌ True
✅ False
Explanation: CAF covers strategy, governance, security, operations—not only migration.
6. Question 6
✅ True
❌ False
Explanation: CAF security operations integrate with organizational goals.
7. Question 7
✅ Industry and Regional Information
❌ Compliance Manager (only GDPR)
❌ Data Subject Requests
Explanation: This delivers region-specific compliance guidance.
8. Question 8
❌ True
✅ False
Explanation: Defender for Cloud + CSPM works across Azure, AWS, and GCP.
9. Question 9
❌ Microsoft sets replication
✅ You must configure cross-region replication
❌ Microsoft auto-creates VMs
Explanation: Resilience setup is the customer’s responsibility.
10. Question 10
❌ True
✅ False
Explanation: Not every region has Availability Zones.
11. Question 11
❌ Consistent access
❌ Permissible downtime
✅ Return app to a functioning state after failure
Explanation: Resiliency = recovery after failures.
12. Question 12
✅ True
❌ False
Explanation: CIS benchmarks have Level 1 (basic) and Level 2 (advanced).
13. Question 13
❌ True
✅ False
Explanation: Responsibility is shared; CSP doesn’t handle all security/compliance.
14. Question 14
❌ Data Lineage
✅ Content Explorer
❌ Data Map Essentials
Explanation: Content Explorer shows classified data across the environment.
15. Question 15 (Select all)
❌ Data Encryption
✅ Data Classification
✅ Retention Policies
✅ Sensitivity Labels
Explanation: Purview focuses on data governance and protection metadata.
16. Question 16 (Select all)
❌ Automated audits react only after breach
✅ Create a transparent system
✅ Quickly identify irregularities
❌ Replace records management
Explanation: Automated audits enhance visibility but don’t replace governance.
17. Question 17
✅ Intentional Threat
❌ Third-Party Threat
❌ Accidental Breach
Explanation: He purposely leaked data out of revenge.
18. Question 18
❌ Dismiss
✅ Initiate investigation using User Activity reports
❌ Send reminder
Explanation: Insider risk workflows require investigation after alerts.
19. Question 19
✅ Insider Risk Management Investigators
❌ IT Admins
❌ Compliance Analysts
20. Question 20
❌ True
✅ False
Explanation: Information Barriers restrict communication, not allow it.
21. Question 21
❌ extent
❌ protection
✅ type
Explanation: Data governance begins with knowing the type/nature of data.
22. Question 22
❌ Custom Classification
✅ Disposition Review
❌ Automatic Classification
Explanation: Disposition review alerts admins when retention is ending.
23. Question 23
❌ Standardized cloud approach
❌ Mandate Fed cloud migration
✅ Bolster security of federal information systems
Explanation: FISMA ensures federal systems follow security standards.
24. Question 24 (Select all)
❌ Risk Mitigation Techniques
✅ Framework Core
❌ Technology Adaptation Protocols
✅ Framework Profiles
Explanation: NIST includes Core, Profiles, and Implementation Tiers.
25. Question 25
❌ DPIA
✅ Personal data breach
❌ DSR
Explanation: Sending confidential data to the wrong recipient is a GDPR breach.
26. Question 26
❌ ISO/IEC 28000
❌ ISO/IEC 25000
✅ ISO/IEC 27000
Explanation: ISO 27001 belongs to the ISO/IEC 27000 information security family.
27. Question 27 (Select all that apply)
✅ Shared roles and responsibilities
❌ Ensuring data availability
✅ Allocation of duties
✅ Removal/return of customer assets
Explanation: ISO 27017 adds cloud-specific security controls.
28. Question 28
✅ True
❌ False
Explanation: Blueprints can lock deployed resources to prevent changes.
29. Question 29
✅ COBIT
❌ ISO/IEC 15504
❌ Azure Audit Program
Explanation: COBIT aligns IT governance with business goals.
30. Question 30 (Select all)
✅ Organizing preparatory resources
✅ Determining privacy capabilities
❌ Researching new cloud technologies
❌ Selecting a cloud provider
Explanation: Privacy requirements must be defined before selecting a provider.
🧾 FINAL SUMMARY TABLE
| Q# | Correct Answer |
|---|---|
| 1 | Azure Site Recovery |
| 2 | Need-to-know access |
| 3 | Azure Key Vault |
| 4 | RBAC |
| 5 | False |
| 6 | True |
| 7 | Industry & Regional Info |
| 8 | False |
| 9 | Customer sets replication |
| 10 | False |
| 11 | Restore after failure |
| 12 | True |
| 13 | False |
| 14 | Content Explorer |
| 15 | Data Classification, Retention Policies, Sensitivity Labels |
| 16 | Transparency, Quick irregularity detection |
| 17 | Intentional threat |
| 18 | Investigate with User Activity |
| 19 | Insider Risk Management Investigators |
| 20 | False |
| 21 | Type |
| 22 | Disposition Review |
| 23 | Strengthen security of federal systems |
| 24 | Framework Core, Framework Profiles |
| 25 | Personal data breach |
| 26 | ISO/IEC 27000 |
| 27 | Shared roles, Allocation of duties, Return of assets |
| 28 | True |
| 29 | COBIT |
| 30 | Organizing resources, determining privacy capabilities |