If a current private key is compromised, which of the following would ensure it cannot be used to decrypt ail historical data?

If a current private key is compromised, which of the following would ensure it cannot be used to decrypt ail historical data?A . Perfect forward secrecyB . Elliptic-curve cryptographyC . Key stretchingD . Homomorphic encryptionView AnswerAnswer: B Explanation: Perfect forward secrecy would ensure that it cannot be used to decrypt...

October 11, 2024 No Comments READ MORE +

What should you do?

Your company has a Microsoft 365 tenant that uses a domain named contoso. The company uses Microsoft Office 365 Message Encryption (OMI) to encrypt email sent to users in fabrikam.com. A user named User1 erroneously sends an email to user2@fabrikam You need to disable [email protected] from accessing the email. What...

October 11, 2024 No Comments READ MORE +

What should you include during the application design phase?

You are creating an application lifecycle management process based on the Microsoft Security Development Lifecycle (SDL). You need to recommend a security standard for onboarding applications to Azure. The standard will include recommendations for application design, development, and deployment. What should you include during the application design phase?A . static...

October 11, 2024 No Comments READ MORE +

What is the Terraform style convention for indenting a nesting level compared to the one above it?

What is the Terraform style convention for indenting a nesting level compared to the one above it?A . With a tabB . With two spacesC . With four spacesD . With three spacesView AnswerAnswer: B Explanation: This is the Terraform style convention for indenting a nesting level compared to the...

October 11, 2024 No Comments READ MORE +

What should a solutions architect do to meet this requirement?

A company has a website hosted on AWS. The website is behind an Application Load Balancer (ALB) that is configured to handle HTTP and HTTPS separately. The company wants to forward all requests to the website so that the requests will use HTTPS. What should a solutions architect do to...

October 11, 2024 No Comments READ MORE +

When a developer designates a Sitecore template field multilist type, what should they do next?

When a developer designates a Sitecore template field multilist type, what should they do next?A . Add standard values to the item.B . Add the list items to the multilist item.C . Set the multilist list item's data source.D . Add a multilist field to the template.View AnswerAnswer: C Explanation:...

October 11, 2024 No Comments READ MORE +

Which solution will meet these requirements?

A company uses NFS to store large video files in on-premises network attached storage. Each video file ranges in size from 1MB to 500 GB. The total storage is 70 TB and is no longer growing. The company decides to migrate the video files to Amazon S3. The company must...

October 11, 2024 No Comments READ MORE +

Which three configurations must each User assigned to a Maps Advanced Visit Plan complete before routes can be generated?

Which three configurations must each User assigned to a Maps Advanced Visit Plan complete before routes can be generated?A . Indicate working hoursB . Set the desired maximum visits per dayC . Set the start & end locationsD . Set the desired buffer time between visitsE . Indicate working daysView...

October 11, 2024 No Comments READ MORE +

What is the effect of applying the policy?

You have a Microsoft OneDrive for Business folder that contains the files shown in the following table. In Microsoft Cloud App Security, you create a file policy to automatically apply a classification. What is the effect of applying the policy?A . The policy will apply to only the .docx and...

October 11, 2024 No Comments READ MORE +