Physical Address

304 North Cardinal St.
Dorchester Center, MA 02124

Protect on-premises identities with Microsoft Defender for Cloud for Identity Microsoft Quiz Answers

Get Protect on-premises identities with Microsoft Defender for Cloud for Identity Microsoft Quiz Answers

Microsoft Defender for Identity is a cloud-based solution to protect on-premises and hybrid identities. Defender for Identity can act both proactively, to eliminate vulnerabilities, and reactively, to detect active threats.

Prerequisites:

  • An understanding of basic security concepts

Enroll on Microsoft

Module 1: Introduction to Microsoft Defender for Identity

Get an introduction to Microsoft Defender for Identity and its capabilities that help you to protect your users’ identities by monitoring profile user behavior and activities and protecting hybrid environments.

Learning objectives:

By the end of this module, you’ll be able to:

  • Understand the capabilities of Microsoft Defender for Identity.
  • Understand Microsoft Defender for Identity privacy.

Prerequisites:

  • None

Quiz 1: Knowledge check

Q1. What is advanced hunting?

  • Advanced hunting is a threat hunting tool that can search for known and potential threats across your network.
  • Advanced hunting is a cyber-attack technique using lateral movement paths.
  • Advanced hunting aggregates data across devices and users to display each incident

Q2. How does Microsoft Defender for Identity protect AD FS?

  • Microsoft Defender for Identity protects AD FS by detecting cloud-based attacks on AD FS to enable you to ensure that your whole hybrid environment is protected.
  • Microsoft Defender for Identity protects AD FS by detecting on-premises attacks on AD FS to enable you to ensure that your whole hybrid environment is protected.
  • Microsoft Defender for Identity protects AD FS by detecting on-premises and cloud-based attacks on AD FS to enable you to ensure that your whole hybrid environment is protected.

Q3. Where is my Microsoft Defender for Identity data stored?

  • Microsoft Defender for Identity data is stored in the country data center closest to the geographical location of your Azure Active Directory tenant.
  • The data location is specified on initial configuration of Microsoft Defender for Identity.
  • Microsoft Defender for Identity data is stored in one security data center for all customers globally.

Module 2: Plan for Microsoft Defender for Identity

Get an overview of the concepts and tools that will help you implement Microsoft Defender for Identity in your organization including components, such as the sensors, the portal, capacity planning, the setup process, and more.

Learning objectives:

By the end of this module, you’ll be able to:

  • Understand the architecture of Microsoft Defender for Identity.
  • Understand capacity planning for Microsoft Defender for Identity.
  • Understand the setup process for Microsoft Defender for Identity.

Prerequisites:

  • None

Quiz 1: Knowledge check

Q1. What are the high-level tasks you’ll carry out during the setup process for Microsoft Defender for Identity?

  • Remove sensors, then connect your Microsoft Defender for Identity instance to Active Directory.
  • Download and install sensors, then create and connect your Microsoft Defender for Identity instance to your Active Directory.
  • Create and connect your Microsoft Defender for Identity instance to your Active Directory, then download and install sensors.

Q2. Where can you install your Microsoft Defender for Identity sensors

  • Domain controllers and on AD FS servers
  • Domain controllers and on standalone DNS servers
  • Domain controllers and DHCP servers

Q3. What is the recommended, and simplest, way to determine capacity for your Microsoft Defender for Identity deployment?

  • Perform a domain controller traffic estimation.
  • Run Task Manager.
  • Use the Microsoft Defender for Identity Sizing Tool.

Module 3: Defend against attacks with Microsoft Defender for Identity

Learn how Microsoft Defender for Identity helps you to protect your environment against different types of threats by enabling you to detect and investigate attempts to compromise credentials, lateral movement attacks, reconnaissance activity, and more.

Learning objectives:

By the end of this module, you’ll be able to:

  • Understand threat detection in Microsoft Defender for Identity.
  • Understand threat investigation in Microsoft Defender for Identity.

Prerequisites:

  • None

Quiz 1: Knowledge check

Q1. What is a lateral movement path?

  • A potential link between two accounts caused by sharing access to resources.
  • A means of transferring data from a machine on one network to a machine on another network.
  • A mechanism for decrypting data that doesn’t require an encryption key.

Q2. What is the exfiltration phase?

  • When an attacker attempts to guess your users’ user names in your domain by sending sign-in requests to see which credentials works.
  • When an attacker transfers account and security data to an off-site location for subsequent use.
  • When an attacker modifies the security structure of the domain, replace encryption keys, grant and deny rights to users, and read or write any data in the domain.

Q3. You’re investigating an attack associated with a specific user account. Which fact about the account should you consider suspicious?

  • The user account has been used to sign into a single computer.
  • The user has failed to sign in twice in the past hour.
  • The user account has low privileges on the local computer but high-level access to a spreadsheet on a shared folder.
Conclusion:

I hope this Protect on-premises identities with Microsoft Defender for Cloud for Identity Microsoft Quiz Answers would be useful for you to learn something new from this problem. If it helped you then don’t forget to bookmark our site for more Coding Solutions.

This Problem is intended for audiences of all experiences who are interested in learning about Data Science in a business context; there are no prerequisites.

Keep Learning!

More Coding Solutions >>

LeetCode Solutions

Hacker Rank Solutions

CodeChef Solutions

Leave a Reply

Your email address will not be published. Required fields are marked *