4.12 Check My Knowledge

14-18 hours · Module 4

Check My Knowledge

Module 4 — Check My Knowledge (20 questions)

1. What is the difference between CSPM and CWP in Defender for Cloud?

CSPM continuously assesses resource configurations against security benchmarks (proactive — finds misconfigurations). CWP provides runtime threat detection for specific workload types (reactive — detects active attacks). Together they form CNAPP: CSPM prevents the conditions that enable attacks, CWP detects attacks against the remaining surface.
CSPM is for Azure, CWP is for AWS and GCP
CSPM generates alerts, CWP generates recommendations
They are the same — CSPM is the old name for CWP

2. Your organisation has 100 on-premises servers. You want Defender for Cloud CSPM assessment and CWP threat detection. What do you need?

Azure Arc + Defender for Servers. Arc-enable each server (install the Connected Machine agent), then enable Defender for Servers on the subscription. Auto-provisioning deploys MDE and the monitoring agent. The servers receive both CSPM recommendations and CWP alerts — the same protection as Azure VMs.
Move servers to Azure — on-premises is not supported
Install MDE only — Defender for Cloud is Azure-only
VPN connection to Azure is sufficient

3. You connect an AWS account for CSPM. Do you need agents on EC2 instances?

Not for CSPM — it is API-based. Defender for Cloud reads AWS resource configurations through the IAM role. For CWP (runtime threat detection) on EC2 instances, you need Arc + MDE agents.
Yes — all EC2 instances need the Arc agent for any protection
No — CWP also works without agents on AWS
AWS is not supported by Defender for Cloud

4. Your Secure Score dropped from 75% to 68% this week. Nothing was changed on existing resources. What happened?

New resources were deployed without security controls. New non-compliant resources increase the total recommendation count (denominator), reducing the percentage. Implement governance rules and deployment policies to ensure new resources include security controls from day one.
Microsoft changed the scoring algorithm
A Defender plan was disabled
An attacker modified the score

5. An attack path shows: Internet → VM with public IP and CVE → lateral movement to SQL → customer database. You can fix one link. Which one?

Patch the CVE on the entry-point VM. This eliminates the exploitation opportunity at step 1, preventing the entire chain. A known CVE with public exploit code on an internet-facing VM is the most immediately exploitable link.
Enable encryption on the database
Restrict network between VM and SQL
Remove the VM's public IP

6. A production web server receives thousands of brute-force SSH attempts daily. Which Defender for Servers feature eliminates this attack surface?

Just-in-time (JIT) VM access. JIT closes port 22 by default and opens it only on demand, only from the requester's IP, only for a limited time. Closed ports cannot be brute-forced.
Adaptive application controls
File integrity monitoring
Vulnerability assessment

7. A zero-day malware executes on a server with adaptive application controls in enforce mode. What happens?

The malware is blocked. Adaptive controls allowlist known-good applications. Unknown applications — including zero-day malware — are blocked by default. The malware does not need to be identified as malicious; it is blocked because it is not identified as legitimate.
The malware runs — adaptive controls only detect, not block
The malware runs — zero-day means undetectable
MDE blocks it first — adaptive controls are secondary

8. Defender for Storage alerts: "Access from a Tor exit node using account key." What is the most urgent action?

Rotate all storage account keys immediately. The key has been compromised. Rotation invalidates all existing keys, stopping any ongoing or future access by the attacker using the stolen key.
Block the Tor exit node IP in the NSG
Disable the storage account
Investigate first — this may be a false positive

9. Defender for SQL detects "Potential SQL injection" on your database. How do you determine if it was successful?

Check the database audit log for data access from the same session and check the application HTTP response (200 OK with data = likely successful; 500 error = likely failed). Block the source IP immediately while investigating.
The alert automatically indicates success or failure
SQL injection attempts always fail if parameterised queries are used
Ignore it — automated scanners never succeed

10. A crypto mining alert fires on a VM. The kill chain intent is "Execution." What does this mean about the attack stage?

The VM is already compromised and running the attacker's payload. Execution is a mid-stage kill chain phase — the attacker has completed initial access and is actively operating. The mining software is running right now. Immediate containment required.
The attack is just starting — early stage
The VM is being scanned but not yet compromised
Informational only — monitor but no containment needed

11. After containing a compromised VM, you check Defender for Cloud recommendations and find the VM was non-compliant with 3 recommendations that existed before the incident. How do you use this?

Document in the incident report as root cause enabling factors. The pre-existing recommendations represent posture gaps that enabled the attack. This evidence supports the posture improvement step (step 4 of cloud IR) and justifies remediation investment to management: "These recommendations existed before the incident. Had they been implemented, the attack would have been prevented or detected earlier."
Ignore — recommendations are not related to incidents
Report the compliance failure to the auditor
Remove the recommendations to prevent them showing up again

12. Your organisation needs PCI DSS compliance evidence for an audit. How does Defender for Cloud help?

Add PCI DSS to the regulatory compliance dashboard. Defender for Cloud maps its recommendations to PCI controls, showing pass/fail status. Export the report as audit evidence. Remediate failing controls before the audit.
Defender for Cloud automatically makes your environment PCI compliant
A separate compliance tool is required
PCI DSS is not supported by Defender for Cloud

13. Which Defender for Cloud capability is free for all Azure subscriptions?

Foundational CSPM — providing Secure Score, basic security recommendations, and Azure Security Benchmark assessment. It is enabled by default on every Azure subscription. Paid plans add advanced CSPM (attack paths, governance) and CWP (threat detection per workload).
Defender for Servers Plan 1
All Defender plans are free for the first 30 days
Nothing — all Defender for Cloud capabilities are paid

14. The Azure Activity Log shows an unknown identity created a VM in Brazil South at 03:16. Your organisation only operates in UK South and West Europe. What does this indicate?

Credential compromise with crypto mining deployment. An attacker obtained Azure admin credentials and is deploying a mining VM in an unused region to avoid detection. Immediate actions: investigate the compromised identity, delete the VM, revoke the role assignment, implement Azure Policy restricting VM deployment to authorised regions.
A developer testing in a new region
Azure load balancing to a closer region
False positive — Defender for Cloud is too sensitive

15. An attacker compromises admin credentials and runs storageAccounts/listKeys at 03:22. You discover this at 08:00. What containment action stops ongoing data access via the stolen keys?

Rotate all storage account keys. The attacker has the keys and can use them independently of the identity — key-based access does not require Entra ID authentication. Password reset and session revocation do not invalidate storage keys. Only key rotation stops key-based access.
Reset the admin password
Revoke the admin's sessions
Block the attacker's IP in the NSG

16. A container image in ACR has a critical CVE. It is deployed to 15 production pods. What is the remediation approach?

Patch the base OS in the container image, rebuild the image, push to ACR, then trigger a rolling deployment to replace running pods with the patched image. Additionally, implement admission control policies that block deployment of images with critical CVEs in the future.
Terminate all 15 pods immediately
Patch the OS on each container individually
Containers are ephemeral — the CVE will resolve itself

17. Which posture improvement prevents credential compromise from leading to Azure resource abuse?

Conditional access requiring compliant device + trusted location for Azure Resource Manager access. Even with valid stolen credentials, the attacker is blocked at authentication because their device and location do not meet the conditional access requirements. This prevents all subsequent ARM operations.
MFA — it blocks stolen credentials
Azure Policy restricting VM regions
Defender for Cloud alerts

18. What is the Foundational CSPM Secure Score based on?

The percentage of Defender for Cloud security recommendations that are implemented. Each recommendation evaluates a specific configuration against the Azure Security Benchmark. Implemented recommendations = passed controls. Unimplemented recommendations = failed controls. The score is earned points / total possible points × 100%.
The number of active security alerts
The number of Defender plans enabled
An AI-generated assessment of overall security

19. Where do Defender for Cloud security alerts appear for SOC investigation?

Three places: the Defender for Cloud alerts page in the Azure portal, the Defender XDR unified incident queue (if integration enabled), and Microsoft Sentinel (SecurityAlert table, if connector configured). The SOC typically triages in Defender XDR and investigates deeply in Sentinel.
Only in the Azure portal
Only in Sentinel
Only in the Defender XDR portal

20. After a cloud security incident, you add "posture improvement" as step 4 of your investigation workflow. Why is this step unique to cloud IR compared to traditional endpoint IR?

Cloud infrastructure is defined by configuration — misconfigurations that enabled the attack can be fixed programmatically (Azure Policy, ARM templates, Terraform) to prevent recurrence across the entire environment. Traditional endpoint IR fixes individual machines. Cloud IR fixes the configuration template that governs all machines. Posture improvement means fixing the root cause at the infrastructure-as-code level, not just on the compromised resource, so the same misconfiguration cannot exist on any resource in the environment.
Posture improvement is not unique to cloud — it applies to all IR
Cloud IR does not include containment — only posture improvement
Posture improvement means upgrading to more expensive Defender plans