If a current private key is compromised, which of the following would ensure it cannot be used to decrypt ail historical data?
If a current private key is compromised, which of the following would ensure it cannot be used to decrypt ail historical data?A . Perfect forward secrecyB . Elliptic-curve cryptographyC . Key stretchingD . Homomorphic encryptionView AnswerAnswer: B Explanation: Perfect forward secrecy would ensure that it cannot be used to decrypt...
What should you do?
Your company has a Microsoft 365 tenant that uses a domain named contoso. The company uses Microsoft Office 365 Message Encryption (OMI) to encrypt email sent to users in fabrikam.com. A user named User1 erroneously sends an email to user2@fabrikam You need to disable [email protected] from accessing the email. What...
Which of these are default user roles?
False 19. Which of these are default user roles?A . AdministratorB . Admin VacationC . MarketingD . Sales ManagerE . Sales Manager's AssistantF . Sales UserView AnswerAnswer: A, C, D, F Explanation: These are the default user roles that are included with Marketing Cloud Account Engagement1. They have different levels...
What should you include during the application design phase?
You are creating an application lifecycle management process based on the Microsoft Security Development Lifecycle (SDL). You need to recommend a security standard for onboarding applications to Azure. The standard will include recommendations for application design, development, and deployment. What should you include during the application design phase?A . static...
What is the Terraform style convention for indenting a nesting level compared to the one above it?
What is the Terraform style convention for indenting a nesting level compared to the one above it?A . With a tabB . With two spacesC . With four spacesD . With three spacesView AnswerAnswer: B Explanation: This is the Terraform style convention for indenting a nesting level compared to the...
What should a solutions architect do to meet this requirement?
A company has a website hosted on AWS. The website is behind an Application Load Balancer (ALB) that is configured to handle HTTP and HTTPS separately. The company wants to forward all requests to the website so that the requests will use HTTPS. What should a solutions architect do to...
When a developer designates a Sitecore template field multilist type, what should they do next?
When a developer designates a Sitecore template field multilist type, what should they do next?A . Add standard values to the item.B . Add the list items to the multilist item.C . Set the multilist list item's data source.D . Add a multilist field to the template.View AnswerAnswer: C Explanation:...
Which solution will meet these requirements?
A company uses NFS to store large video files in on-premises network attached storage. Each video file ranges in size from 1MB to 500 GB. The total storage is 70 TB and is no longer growing. The company decides to migrate the video files to Amazon S3. The company must...
Which three configurations must each User assigned to a Maps Advanced Visit Plan complete before routes can be generated?
Which three configurations must each User assigned to a Maps Advanced Visit Plan complete before routes can be generated?A . Indicate working hoursB . Set the desired maximum visits per dayC . Set the start & end locationsD . Set the desired buffer time between visitsE . Indicate working daysView...
What is the effect of applying the policy?
You have a Microsoft OneDrive for Business folder that contains the files shown in the following table. In Microsoft Cloud App Security, you create a file policy to automatically apply a classification. What is the effect of applying the policy?A . The policy will apply to only the .docx and...