sc900 Review

1234567891011121314151617
Across
  1. 2. Federation is used to establish a ----- relationship between organisations
  2. 3. This abbreviation is used to ensure that users have just enough access, just in time
  3. 5. These reviews are done to evaluate group membership and role assignments to ensure that the correct users are in the correct places
  4. 9. ......... is one of the goals of the cyber security strategy which is ensuring data or messages haven’t been tampered with
  5. 11. This identity can be used for authentication and authorization to on-premises and cloud resources
  6. 13. ........... access policies can be used to examine signals such as location, device, ip address and either allow or block access to Azure
  7. 15. ........ as a Service solutions allows users to access and use applications over the internet - eg Microsoft 365
  8. 16. .......... a file means the data in the file is only readable to users with the appropriate key
  9. 17. This score measures an organisation's progress in completing actions that reduce risks associated with data protection and regulatory standards
Down
  1. 1. This is the process of verifying who you are
  2. 4. This is the abbreviation used to describe the login process when it requires users to enter more information than just a password.
  3. 6. ........... management allows multicloud discovery, remediation, and monitoring of privileged access across Azure, AWS, and GCP
  4. 7. This is the process of verifying whether a signed in user can access a specific resource
  5. 8. The ---- trust model assumes each request as though it was originated from an uncontrolled network. Verify explicitly - assume breach
  6. 10. uses an algorithm to convert the original text to a unique fixed-length hash value
  7. 12. Microsoft is responsible for managing the physical hardware in their datacentres in a ------ responsibility model
  8. 14. A layer of the defence in depth policy where you would find DDoS protection and Firewall
  9. 15. This acronym allows users to reset their own passwords without involving the IT Service Desk