Unit2 - Subjective Questions

INT327 • Practice Questions with Detailed Answers

1

Distinguish between Authentication and Authorization in the context of cloud security and identity management. Provide a practical example of how both mechanisms work together.

2

Explain the core principles of the Zero Trust security model. How does it differ from traditional perimeter-based security, and why is it particularly relevant for modern cloud environments?

3

Describe the Shared Responsibility Model in cloud computing. How does it relate to managing identities and access control specifically in an IaaS (Infrastructure as a Service) scenario?

4

Explain the primary purpose and key features of Microsoft Entra ID (formerly Azure Active Directory). How does it serve as the backbone for identity management across Azure and Microsoft 365 services?

5

Outline the steps involved in creating and managing user accounts in Microsoft Entra ID. Discuss the differences between a member user and a guest user.

6

Discuss the benefits of using groups (e.g., Security Groups, Microsoft 365 Groups) in Microsoft Entra ID for managing access efficiently. Provide an example scenario demonstrating this efficiency.

7

Define Role-Based Access Control (RBAC) and explain its advantages over traditional access control methods in cloud environments. What are the three fundamental components of an Azure RBAC role assignment?

8

Describe the key components of Azure RBAC, including roles, role assignments, scope, and security principals. Provide an example to illustrate their relationship.

9

Illustrate with an example how Azure RBAC can be used to grant a developer read-only access to a specific resource group containing development resources, but not to production resources.

10

Explain the concept of "least privilege" in the context of Azure RBAC. Why is it a fundamental security principle, and what are its potential consequences if not followed?

11

What is Identity Governance in the context of cloud environments? Explain its primary objectives and how it addresses the challenges of managing digital identities at scale.

12

Describe how features like entitlement management, access reviews, and privileged identity management (PIM) contribute to robust identity governance in Microsoft Entra ID.

13

Define Microsoft Entra Conditional Access Policies. Explain their purpose and how they enhance the security posture of an organization, distinguishing them from Azure RBAC.

14

Outline a scenario where a Conditional Access policy would be crucial. For instance, requiring multi-factor authentication (MFA) for administrative users accessing Azure management portals from untrusted locations. Describe the conditions and grant controls involved.

15

Discuss the various conditions that can be configured in a Microsoft Entra Conditional Access policy (e.g., users/groups, cloud apps, device platforms, locations, client apps, device state).

16

Explain the "What If" tool for Conditional Access policies in Microsoft Entra ID. Why is it important before deploying policies to production?

17

Compare and contrast the role of Azure RBAC and Microsoft Entra Conditional Access Policies in managing access to Azure resources. Where do their responsibilities overlap and diverge?

18

Define Cloud Security and discuss its unique challenges compared to traditional on-premises security. How does Unit 2's topics (Identity and Governance) address these challenges?

19

You are designing an identity management solution for a hybrid cloud environment where some applications are on-premises, and others are in Azure. How would Microsoft Entra ID facilitate hybrid identity for seamless user experience and consistent access control?

20

You are the cloud administrator for an organization. A new project team requires access to a specific Azure Storage Account to upload and read data. How would you configure user accounts, groups, and Azure RBAC to ensure secure and efficient access for this team?

21

Describe the concept of Privileged Identity Management (PIM) in Microsoft Entra ID. How does it enhance security by implementing Just-in-Time (JIT) and Just-Enough-Access (JEA) for administrative roles?

22

Discuss the various benefits of implementing Multi-Factor Authentication (MFA) in a cloud environment. How can Conditional Access policies be used to enforce MFA strategically?

23

Imagine you are setting up a new Azure subscription. List and briefly describe the initial three to five critical identity and access management (IAM) best practices you would implement using Microsoft Entra ID and Azure RBAC.

24

Discuss the importance of the "Shared Responsibility Model" in understanding the scope of cloud security for an organization. How does it apply to the Identity and Access Management (IAM) domain specifically?

25

What are service principals and managed identities in Azure? Explain their purpose and how they contribute to securing applications and services when accessing Azure resources, rather than using user accounts.

26

Explain the concept of hybrid identity within Microsoft Entra ID. What are the primary ways to achieve hybrid identity, and what are the benefits for organizations operating with both on-premises and cloud resources?

27

A new developer, Jane, has joined your team and needs to access an Azure SQL Database. Explain the process of configuring her access using Microsoft Entra ID user accounts and Azure RBAC, ensuring she has the least privilege necessary.

28

Discuss the various threat vectors that target identities in cloud environments and how the concepts covered in Unit 2 help mitigate these threats.

29

What is the role of management groups in Azure governance, particularly concerning identity and access management for multiple subscriptions?

30

Differentiate between Microsoft Entra ID administrative roles and Azure RBAC roles. Provide examples for each and explain why both are necessary for comprehensive cloud governance.

31

Your organization uses Microsoft 365 and Azure. Describe how Microsoft Entra ID provides Single Sign-On (SSO) capabilities across these diverse services and its benefits.

32

Explain the importance of regularly conducting access reviews in Microsoft Entra ID for maintaining a strong security posture and achieving compliance.

33

Describe two common scenarios where a lack of proper Cloud Governance and Identity Management can lead to significant security vulnerabilities or operational issues in an Azure environment.