Module quiz: Laws and standards :Cybersecurity Management and Compliance (Microsoft Cybersecurity Analyst Professional Certificate) Answers 2025
1. Question 1
What is the primary purpose of FISMA?
-
❌ To create standardized cloud services for federal agencies.
-
✅ To bolster the security framework around federal information systems.
-
❌ To regulate private sector companies and their data security.
Explanation:
FISMA focuses on strengthening the security of federal information systems through standards and risk management.
2. Question 2
Primary purpose of the NIST Framework?
-
❌ It is a set of regulations companies must legally follow.
-
❌ It is solely focused on technological aspects.
-
✅ It provides a comprehensive structure to manage and mitigate cybersecurity risks.
Explanation:
NIST CSF is a voluntary, flexible risk-management framework.
3. Question 3
True or False: One primary component of NIST Framework is the “Risk Management Tier.”
-
❌ True
-
✅ False
Explanation:
NIST Framework components are Core, Implementation Tiers, and Profiles — not “Risk Management Tier.”
4. Question 4
True or False: SOX Section 404 mandates evaluating external marketing strategies.
-
❌ True
-
✅ False
Explanation:
Section 404 is about internal control over financial reporting (ICFR), not marketing.
5. Question 5
GDPR – How does Microsoft assist as a data processor?
-
❌ Microsoft will assess privacy risks and notify DPA.
-
❌ Microsoft will delete all data.
-
✅ Microsoft will notify you of the breach unless data accessed is unintelligible (e.g., encrypted).
Explanation:
Under GDPR, processors must notify controllers of data breaches unless the data is protected and unreadable.
6. Question 6
ISO 27001 controls — select all that apply
-
✅ Vendor management
-
✅ Business continuity management
-
❌ Employee training programs
-
✅ Information security policies
Explanation:
Employee training is important but not listed as a standalone ISO 27001 control. The others are official Annex A control domains.
7. Question 7
Azure service to enforce compliant deployments?
-
✅ Azure Blueprints
-
❌ Azure Storage
-
❌ ARM templates
Explanation:
Azure Blueprints allow packaging policies, RBAC, and templates to ensure compliance across deployments.
8. Question 8
ISACA guide to evaluate Azure services for compliance?
-
❌ COBIT Performance Management System
-
❌ COBIT Design and Implementation Guides
-
✅ Azure Audit Program
Explanation:
Azure Audit Program contains cloud-specific audit steps and control evaluation guidance.
9. Question 9
Best recommendation for privacy evaluation of Azure deployment?
-
❌ Ignore COBIT
-
✅ Use the Azure Audit Program for detailed control statements and testing procedures
-
❌ Only focus on the NIST Privacy Framework
Explanation:
Azure Audit Program is specifically built for auditing Azure services, including privacy aspects.
10. Question 10
Purpose of a Privacy Risk Assessment (PRA)?
-
❌ Only to ensure GDPR/HIPAA compliance
-
✅ Identify, analyze, evaluate, and address privacy risks for personal data in cloud environments
-
❌ Evaluate technical capabilities of the cloud provider
Explanation:
PRA is a holistic privacy risk identification and mitigation process.
🧾 Summary Table
| Q No. | Correct Answer | Key Concept |
|---|---|---|
| 1 | To bolster security framework | FISMA purpose |
| 2 | NIST manages & mitigates cyber risk | NIST Framework |
| 3 | False | NIST Components |
| 4 | False | SOX Section 404 |
| 5 | Microsoft notifies controller | GDPR processor responsibility |
| 6 | Vendor mgmt, Business continuity, InfoSec policies | ISO 27001 controls |
| 7 | Azure Blueprints | Compliance enforcement |
| 8 | Azure Audit Program | ISACA cloud auditing |
| 9 | Azure Audit Program | Cloud privacy audit |
| 10 | Systematic privacy risk identification | PRA |