Developing Solutions for Microsoft Azure - Exam Ref AZ-204 Chapter 3 - D306 Azure Developer Associate Questions With Complete Solutions
7 views 0 purchase
Course
Microsoft Azure
Institution
Microsoft Azure
What are the 5 pillars of security? - CORRECT ANSWER Integrity
Availability
Confidentiality
Authorization
Non-Repudiation
What is authentication? - CORRECT ANSWER The action that proves ones identity.
What is Authorization? - CORRECT ANSWER Authorization determines the privileges of authe...
Developing Solutions for Microsoft Azure - Exam Ref AZ-
204 Chapter 3 - D306 Azure Developer Associate
Questions With Complete Solutions
What are the 5 pillars of security? - CORRECT ANSWER Integrity
Availability
Confidentiality
Authorization
Non-Repudiation
What is authentication? - CORRECT ANSWER The action that proves ones identity.
What is Authorization? - CORRECT ANSWER Authorization determines the privileges of authenticated
clients.
What is Token based Authentication? - CORRECT ANSWER A highly scalable way to authenticate users.
Uses a signed token for authenticating and granting requests. Does not contain a username or password.
What is a JWT? - CORRECT ANSWER JSON Web token.
It consists of:
Header- contains the name of the algorithm for signing the token.
Body or Payload- Contains info about the token and the purpose.
Cryptographic Signature- String that validates your token and has not been corrupted.
What is a main advantage of token based authentication? - CORRECT ANSWER You can delegate the
whole authentication process of managing the users to an external security server.
, What is Microsoft Identity Framework - CORRECT ANSWER This is a tool to work with authentication
What does MVC stand for? - CORRECT ANSWER Model View Controller
The Oauth protocol has 4 roles. What are they? - CORRECT ANSWER Resource Owner
Resource Server
Client
Authorization Server
What is a Resource Owner - CORRECT ANSWER Entity that can grant access to resources. Can also be
called the User.
What is the Resource Server? - CORRECT ANSWER Server that hosts the resources that you want to
share.
What is a Client? - CORRECT ANSWER 3rd Party app that needs access to the resource.
What is an Authorization Server - CORRECT ANSWER Server that issues the access token to the client for
accessing resources.
What is the Oauth 2 Series of events? - CORRECT ANSWER 1. Client sends authorization request to
Owner
2. Owner grants authorization request
3. Client sends grant to Authorization server.
4. Authorization server sends client Access token
5. Client sends token to Resource server
6. Resource server sends authorized data
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Victoria108. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $13.99. You're not tied to anything after your purchase.