Self-review: Securing virtual machines :Cybersecurity Solutions and Microsoft Defender (Microsoft Cybersecurity Analyst Professional Certificate) Answers 2025
1. Successfully deployed Service_VM?
✅ Yes
❌ No
Explanation:
In the exercise, you should have deployed the Service_VM.
2. Successfully created a hub network with VNet peering?
✅ Yes
❌ No
Explanation:
The hub-spoke topology setup includes VNet peering.
3. Successfully deployed Azure Standard Firewall?
✅ Yes
❌ No
Explanation:
Step 3 requires deploying and configuring Azure Firewall Standard.
4. Feature that restricts inbound access to specific IPs
❌ Load balancing rules
✅ Network rules
❌ NAT
❌ Custom application rules
Explanation:
Firewall network rules allow IP-based filtering for inbound/outbound traffic.
5. Successfully configured JIT access on Services_VM?
✅ Yes
❌ No
Explanation:
JIT improves VM security by restricting port access unless requested.
6. Successfully configured and deployed Azure Bastion?
✅ Yes
❌ No
Explanation:
Azure Bastion allows secure browser-based RDP/SSH without exposing ports.
7. Protocols supported by Azure Bastion (Select all that apply)
❌ HTTP
✅ RDP
❌ FTP
✅ SSH
Explanation:
Azure Bastion supports secure RDP and SSH sessions over the Azure portal.
8. Connected to Services_VM using Bastion + JIT?
✅ Yes
❌ No
Explanation:
JIT opens ports temporarily; Bastion handles the connection.
9. Successfully deployed Microsoft Sentinel?
✅ Yes
❌ No
Explanation:
Sentinel is deployed on a Log Analytics workspace.
10. What does Microsoft Sentinel help organizations with?
❌ Analyzing financial data
❌ Managing customer relationships
✅ Detecting and responding to security threats
Explanation:
Sentinel is a SIEM + SOAR system focused on cybersecurity.
11. Name of the Bastion instance from Step 5
❌ BastionVM
❌ AccessBastion
✅ Services_Bastion
❌ SecureBastion
Explanation:
The lab exercise names it Services_Bastion.
12. Purpose of creating a hub network with VNet peering
❌ Deploy Azure Firewall
❌ Connect to the public internet
✅ Enable communication between virtual networks for enhanced security
❌ Provide VM remote access
Explanation:
Hub-and-spoke architecture centralizes security and connectivity.
13. Purpose of deploying Azure Standard Firewall
❌ Monitor testing
✅ Protect and secure the network
❌ Provide RDP access
❌ Manage JIT
Explanation:
Azure Firewall filters traffic and enforces network security policies.
14. Workspace type created when implementing Sentinel
❌ Application Insights
✅ Log Analytics Workspace
❌ Sentinel Workspace
❌ Logic App Workspace
Explanation:
Sentinel always runs on a Log Analytics Workspace.
15. Main purpose of enabling JIT access
✅ Enhance security by limiting remote access windows
❌ Deploy updates
❌ Restrict access only by time
❌ Allow unrestricted access
Explanation:
JIT reduces the VM attack surface by opening ports only when requested.
🧾 Summary Table
| Q | Correct Answer | Key Concept |
|---|---|---|
| 1 | Yes | VM deployment |
| 2 | Yes | Hub-spoke networking |
| 3 | Yes | Firewall deployment |
| 4 | Network rules | IP filtering |
| 5 | Yes | JIT configuration |
| 6 | Yes | Bastion deployment |
| 7 | RDP, SSH | Bastion protocols |
| 8 | Yes | Remote access |
| 9 | Yes | Sentinel deployment |
| 10 | Threat detection & response | Sentinel |
| 11 | Services_Bastion | Bastion instance |
| 12 | VNet communication | Hub-spoke |
| 13 | Protect network | Azure Firewall |
| 14 | Log Analytics Workspace | Sentinel |
| 15 | Control remote access | JIT |