Skip to content

Self-review: Securing virtual machines :Cybersecurity Solutions and Microsoft Defender (Microsoft Cybersecurity Analyst Professional Certificate) Answers 2025

1. Successfully deployed Service_VM?

Yes
❌ No

Explanation:
In the exercise, you should have deployed the Service_VM.


2. Successfully created a hub network with VNet peering?

Yes
❌ No

Explanation:
The hub-spoke topology setup includes VNet peering.


3. Successfully deployed Azure Standard Firewall?

Yes
❌ No

Explanation:
Step 3 requires deploying and configuring Azure Firewall Standard.


4. Feature that restricts inbound access to specific IPs

❌ Load balancing rules
Network rules
❌ NAT
❌ Custom application rules

Explanation:
Firewall network rules allow IP-based filtering for inbound/outbound traffic.


5. Successfully configured JIT access on Services_VM?

Yes
❌ No

Explanation:
JIT improves VM security by restricting port access unless requested.


6. Successfully configured and deployed Azure Bastion?

Yes
❌ No

Explanation:
Azure Bastion allows secure browser-based RDP/SSH without exposing ports.


7. Protocols supported by Azure Bastion (Select all that apply)

❌ HTTP
RDP
❌ FTP
SSH

Explanation:
Azure Bastion supports secure RDP and SSH sessions over the Azure portal.


8. Connected to Services_VM using Bastion + JIT?

Yes
❌ No

Explanation:
JIT opens ports temporarily; Bastion handles the connection.


9. Successfully deployed Microsoft Sentinel?

Yes
❌ No

Explanation:
Sentinel is deployed on a Log Analytics workspace.


10. What does Microsoft Sentinel help organizations with?

❌ Analyzing financial data
❌ Managing customer relationships
Detecting and responding to security threats

Explanation:
Sentinel is a SIEM + SOAR system focused on cybersecurity.


11. Name of the Bastion instance from Step 5

❌ BastionVM
❌ AccessBastion
Services_Bastion
❌ SecureBastion

Explanation:
The lab exercise names it Services_Bastion.


12. Purpose of creating a hub network with VNet peering

❌ Deploy Azure Firewall
❌ Connect to the public internet
Enable communication between virtual networks for enhanced security
❌ Provide VM remote access

Explanation:
Hub-and-spoke architecture centralizes security and connectivity.


13. Purpose of deploying Azure Standard Firewall

❌ Monitor testing
Protect and secure the network
❌ Provide RDP access
❌ Manage JIT

Explanation:
Azure Firewall filters traffic and enforces network security policies.


14. Workspace type created when implementing Sentinel

❌ Application Insights
Log Analytics Workspace
❌ Sentinel Workspace
❌ Logic App Workspace

Explanation:
Sentinel always runs on a Log Analytics Workspace.


15. Main purpose of enabling JIT access

Enhance security by limiting remote access windows
❌ Deploy updates
❌ Restrict access only by time
❌ Allow unrestricted access

Explanation:
JIT reduces the VM attack surface by opening ports only when requested.


🧾 Summary Table

Q Correct Answer Key Concept
1 Yes VM deployment
2 Yes Hub-spoke networking
3 Yes Firewall deployment
4 Network rules IP filtering
5 Yes JIT configuration
6 Yes Bastion deployment
7 RDP, SSH Bastion protocols
8 Yes Remote access
9 Yes Sentinel deployment
10 Threat detection & response Sentinel
11 Services_Bastion Bastion instance
12 VNet communication Hub-spoke
13 Protect network Azure Firewall
14 Log Analytics Workspace Sentinel
15 Control remote access JIT