Forum Discussion
Trevor_Rusher
Community Manager
Feb 21, 2025Microsoft Security Fun Friday Week 4! This week's game- FACT OR FICTION
Hey there Security Tech Community! We're back with Week 4 of our Security Fun Fridays. This week's game will be Fact or Fiction! Below are FIVE statements related to cybersecurity and it is up to YOU to determine whether the statements are Facts (true) or Fiction (false). The first THREE people to respond below in the comments with all five correct answers will earn our new "Microsoft Security Star" Badge to add to their profile. I will give everyone until TUESDAY 2/25 before I post the answer key and award the badges (so even if 3 people answer before you, they may not be correct). Good luck!
Note: This badge is only given out during Fun Friday games or by being an outstanding member of the community, so it is very exclusive!
STATEMENTS:
- An organization has deployed Microsoft 365 applications to all employees. Per the shared responsibility model, Microsoft is responsible for the accounts and identities relating to these employees.
- Data sovereignty is the concept that data, particularly personal data, is subject to the laws and regulations of the country/region in which it's physically collected, held, or processed.
- Multifactor authentication works by requiring a user to provide multiple forms of identification to verify that they are who they claim to be.
- The Zero Trust model operates on the principle of “constantly be collecting information about your systems, vulnerabilities, and attacks.”
- Wardriving is the name of a common network attack where the cybercriminal compromises a router in the network to eavesdrop on, or alter, data.
- False
- True
- True
- False
- False
- Trevor_Rusher
Community Manager
Hi All,
Apologies for the delay, but I am here with the answer key!
- FICTION (False) Source: https://learn.microsoft.com/en-us/training/modules/describe-security-concepts-methodologies/2-describe-shared-responsibility-model
- FACT (True) Source: https://learn.microsoft.com/en-us/training/modules/describe-security-concepts-methodologies/6-describe-compliance-concepts
- FACT (True) Source: https://learn.microsoft.com/en-us/training/modules/describe-security-concepts-methodologies/4-describe-zero-trust-model
- FICTION (False) Source: https://learn.microsoft.com/en-us/training/modules/describe-security-concepts-methodologies/4-describe-zero-trust-model
- FICTION (False) Source: https://www.ibm.com/think/topics/man-in-the-middle
It looks like everyone but Towel got tripped up by question 4! Reminder that the 'Zero Trust' model operates on the principle of “trust no one, verify everything.” Attackers’ ability to bypass conventional access controls is ending any illusion that traditional security strategies are sufficient. By no longer trusting the integrity of the corporate network (Zero Trust), security is strengthened.
Enjoy your new badge Towel! Thanks for playing everyone!
- gthiru06Copper Contributor
- False
- True
- True
- True
- False
- bfletchCopper Contributor
False, True, True, True, False
- TowelCopper Contributor
- False
- True
- True
- False
- False
- lucheteSteel Contributor
False
True
True
True
False - mdntechCopper Contributor
- False
- True
- True
- True
- False