HOTSPOT
For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.
HOTSPOT
Select the answer that correctly completes the sentence.
Explanation:
Reference: https://docs.microsoft.com/en-us/azure/cloud-adoption-framework/get-started/
HOTSPOT
Select the answer that correctly completes the sentence.
Explanation:
eDiscovery
https://docs.microsoft.com/en-us/microsoft-365/compliance/ediscovery?view=o365-worldwide
Reference: https://docs.microsoft.com/en-us/azure/security/fundamentals/customer-lockbox-overview
HOTSPOT
Select the answer that correctly completes the sentence.
Explanation:
Federation is a collection of domains that have established trust.
Reference: https://docs.microsoft.com/en-us/azure/active-directory/hybrid/whatis-fed
HOTSPOT
For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.
Explanation:
Box 1: Yes
System updates reduces security vulnerabilities, and provide a more stable environment for end users. Not applying updates leaves unpatched vulnerabilities and results in environments that are susceptible to attacks.
Box 2: Yes
Box 3: Yes
If you only use a password to authenticate a user, it leaves an attack vector open. With MFA enabled, your accounts are more secure.
Reference: https://docs.microsoft.com/en-us/azure/security-center/secure-score-security-controls
Which score measures an organization’s progress in completing actions that help reduce risks associated to data protection and regulatory standards?
- A . Microsoft Secure Score
- B . Productivity Score
- C . Secure score in Azure Security Center
- D . Compliance score
D
Explanation:
Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/compliance-manager?view=o365-worldwide
https://docs.microsoft.com/en-us/microsoft-365/compliance/compliance-score-calculation?view=o365- worldwide
What do you use to provide real-time integration between Azure Sentinel and another security source?
- A . Azure AD Connect
- B . a Log Analytics workspace
- C . Azure Information Protection
- D . a data connector
D
Explanation:
To on-board Azure Sentinel, you first need to connect to your security sources. Azure Sentinel comes with a number of connectors for Microsoft solutions, including Microsoft 365 Defender solutions, and Microsoft 365 sources, including Office 365, Azure AD, Microsoft Defender for Identity, and Microsoft Cloud App Security, etc.
Reference: https://docs.microsoft.com/en-us/azure/sentinel/overview
Which Microsoft portal provides information about how Microsoft cloud services comply with regulatory standard, such as International Organization for Standardization (ISO)?
- A . the Microsoft Endpoint Manager admin center
- B . Azure Cost Management + Billing
- C . Microsoft Service Trust Portal
- D . the Azure Active Directory admin center
C
Explanation:
The Microsoft Service Trust Portal contains details about Microsoft’s implementation of controls and processes that protect our cloud services and the customer data therein.
Reference: https://docs.microsoft.com/en-us/microsoft-365/compliance/get-started-with-service-trust-portal?view=o365- worldwide
In the shared responsibility model for an Azure deployment, what is Microsoft solely responsible for managing?
- A . the management of mobile devices
- B . the permissions for the user data stored in Azure
- C . the creation and management of user accounts
- D . the management of the physical hardware
HOTSPOT
For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.
Explanation:
Box 1: Yes
Box 2: Yes
Box 3: No
The Zero Trust model does not assume that everything behind the corporate firewall is safe, the Zero Trust model assumes breach and verifies each request as though it originated from an uncontrolled network.
Reference: https://docs.microsoft.com/en-us/security/zero-trust/
HOTSPOT
For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.
Explanation:
Reference: https://privacy.microsoft.com/en-US/
What can you use to provide a user with a two-hour window to complete an administrative task in Azure?
- A . Azure Active Directory (Azure AD) Privileged Identity Management (PIM)
- B . Azure Multi-Factor Authentication (MFA)
- C . Azure Active Directory (Azure AD) Identity Protection
- D . conditional access policies
D
Explanation:
https://docs.microsoft.com/en-us/azure/active-directory/privileged-identity-management/pim-configure
Privileged Identity Management provides time-based and approval-based role activation to mitigate the risks of excessive, unnecessary, or misused access permissions on resources that you care about. Here are some of the key features of Privileged Identity Management: Provide just-in-time privileged access to Azure AD and Azure resources Assign time-bound access to resources using start and end dates Require approval to activate privileged roles Enforce multi-factor authentication to activate any role Use justification to understand why users activate Get notifications when privileged roles are activated Conduct access reviews to ensure users still need roles Download audit history for internal or external audit Prevents removal of the last active Global Administrator role assignment
In a hybrid identity model, what can you use to sync identities between Active Directory Domain Services (AD DS) and Azure Active Directory (Azure AD)?
- A . Active Directory Federation Services (AD FS)
- B . Azure Sentinel
- C . Azure AD Connect
- D . Azure Ad Privileged Identity Management (PIM)
C
Explanation:
Reference: https://docs.microsoft.com/en-us/azure/active-directory/hybrid/whatis-azure-ad-connect
HOTSPOT
For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.
Explanation:
Box 1: Yes
Azure AD supports custom roles.
Box 2: Yes
Global Administrator has access to all administrative features in Azure Active Directory.
Box 3: No
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/roles/concept-understand-roles
https://docs.microsoft.com/en-us/azure/active-directory/roles/permissions-reference
HOTSPOT
For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.
Explanation:
Box 1: No
Azure Active Directory (Azure AD) is a cloud-based user identity and authentication service.
Box 2: Yes
Microsoft 365 uses Azure Active Directory (Azure AD). Azure Active Directory (Azure AD) is included with your Microsoft 365 subscription.
Box 3: Yes
Azure Active Directory (Azure AD) is a cloud-based user identity and authentication service.
Reference: https://docs.microsoft.com/en-us/microsoft-365/enterprise/about-microsoft-365-identity?view=o365-worldwide
HOTSPOT
Select the answer that correctly completes the sentence.
Explanation:
Biometrics templates are stored locally on a device.
Reference: https://docs.microsoft.com/en-us/windows/security/identity-protection/hello-for-business/hello-overview
What is the purpose of Azure Active Directory (Azure AD) Password Protection?
- A . to control how often users must change their passwords
- B . to identify devices to which users can sign in without using multi-factor authentication (MFA)
- C . to encrypt a password by using globally recognized encryption standards
- D . to prevent users from using specific words in their passwords
D
Explanation:
Azure AD Password Protection detects and blocks known weak passwords and their variants, and can also block additional weak terms that are specific to your organization.
With Azure AD Password Protection, default global banned password lists are automatically applied to all users in an Azure AD tenant. To support your own business and security needs, you can define entries in a custom banned password list.
Reference: https://docs.microsoft.com/en-us/azure/active-directory/authentication/concept-password-ban-bad-on-premises
Which Azure Active Directory (Azure AD) feature can you use to evaluate group membership and automatically remove users that no longer require membership in a group?
- A . access reviews
- B . managed identities
- C . conditional access policies
- D . Azure AD Identity Protection
A
Explanation:
Explanation
Azure Active Directory (Azure AD) access reviews enable organizations to efficiently manage group memberships, access to enterprise applications, and role assignments.
Reference: https://docs.microsoft.com/en-us/azure/active-directory/governance/access-reviews-overview
HOTSPOT
Select the answer that correctly completes the sentence.
Explanation:
Multi-factor authentication is a process where a user is prompted during the sign-in process for an additional form of identification, such as to enter a code on their cellphone or to provide a fingerprint scan.
Reference: https://docs.microsoft.com/en-us/azure/active-directory/authentication/concept-mfa-howitworks
HOTSPOT
For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.
Explanation:
Box 1: Yes
Box 2: No
Conditional Access policies are enforced after first-factor authentication is completed.
Box 3: Yes
Reference: https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/overview
HOTSPOT
Select the answer that correctly completes the sentence.
Explanation:
Reference: https://docs.microsoft.com/en-us/defender-for-identity/what-is
HOTSPOT
Select the answer that correctly completes the sentence.
Explanation:
Microsoft Defender for Identity is a cloud-based security solution that leverages your on-premises Active Directory signals to identify, detect, and investigate advanced threats, compromised identities, and malicious insider actions directed at your organization.
Reference: https://docs.microsoft.com/en-us/defender-for-identity/what-is
HOTSPOT
Select the answer that correctly completes the sentence.
Explanation:
Azure Active Directory (Azure AD) is a cloud-based user identity and authentication service.
Reference: https://docs.microsoft.com/en-us/microsoft-365/enterprise/about-microsoft-365-identity?view=o365-worldwide
Which Azure Active Directory (Azure AD) feature can you use to provide just-in-time (JIT) access to manage Azure resources?
- A . conditional access policies
- B . Azure AD Identity Protection
- C . Azure AD Privileged Identity Management (PIM)
- D . authentication method policies
C
Explanation:
Azure AD Privileged Identity Management (PIM) provides just-in-time privileged access to Azure AD and Azure resources
Reference: https://docs.microsoft.com/en-us/azure/active-directory/privileged-identity-management/pim-
configure
HOTSPOT
Select the answer that correctly completes the sentence.
Explanation:
Reference: https://docs.microsoft.com/en-us/cloud-app-security/what-is-cloud-app-security
HOTSPOT
Select the answer that correctly completes the sentence.
Explanation:
Reference: https://docs.microsoft.com/en-us/azure/ddos-protection/ddos-protection-overview
What should you use in the Microsoft 365 security center to view security trends and track the protection status of identities?
- A . Attack simulator
- B . Reports
- C . Hunting
- D . Incidents
B
Explanation:
Reference: https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/reports-and-insights-
in-security- and-compliance?view=o365-worldwide
HOTSPOT
Select the answer that correctly completes the sentence.
Explanation:
Reference: https://docs.microsoft.com/en-us/microsoft-365/security/defender/incidents-overview?view=o365-worldwide
What are two capabilities of Microsoft Defender for Endpoint? Each correct selection presents a complete solution. NOTE: Each correct selection is worth one point.
- A . automated investigation and remediation
- B . transport encryption
- C . shadow IT detection
- D . attack surface reduction
AD
Explanation:
Reference: https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/microsoft-defender-endpoint? view=o365-worldwide
DRAG DROP
Match the Azure networking service to the appropriate description.
To answer, drag the appropriate service from the column on the left to its description on the right. Each service may be used once, more than once, or not at all. NOTE: Each correct match is worth one point.
Explanation:
Box 1: Azure Firewall
Azure Firewall provide Source Network Address Translation and Destination Network Address Translation.
Box 2: Azure Bastion
Azure Bastion provides secure and seamless RDP/SSH connectivity to your virtual machines directly from the Azure portal over TLS.
Box 3: Network security group (NSG)
You can use an Azure network security group to filter network traffic to and from Azure resources in an Azure virtual network.
Reference:
https://docs.microsoft.com/en-us/azure/networking/fundamentals/networking-overview
https://docs.microsoft.com/en-us/azure/bastion/bastion-overview
https://docs.microsoft.com/en-us/azure/firewall/features
https://docs.microsoft.com/en-us/azure/virtual-network/network-security-groups-overview
HOTSPOT
Select the answer that correctly completes the sentence.
Explanation:
Microsoft Azure Sentinel is a scalable, cloud-native, security information event management (SIEM) and security orchestration automated response (SOAR) solution.
Reference: https://docs.microsoft.com/en-us/azure/sentinel/overview
HOTSPOT
For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.
Explanation:
Box 1: Yes
Azure Defender provides security alerts and advanced threat protection for virtual machines, SQL databases, containers, web applications, your network, your storage, and more
Box 2: Yes
Cloud security posture management (CSPM) is available for free to all Azure users.
Box 3: Yes
Azure Security Center is a unified infrastructure security management system that strengthens the security posture of your data centers, and provides advanced threat protection across your hybrid workloads in the cloud – whether they’re in Azure or not – as well as on premises.
Reference:
https://docs.microsoft.com/en-us/azure/security-center/azure-defender
https://docs.microsoft.com/en-us/azure/security-center/defender-for-storage-introduction https://docs.microsoft.com/en-us/azure/security-center/security-center-introduction
HOTSPOT
Select the answer that correctly completes the sentence.
Explanation:
Reference: https://docs.microsoft.com/en-us/microsoft-365/security/defender/threat-analytics?view=o365-
worldwide
HOTSPOT
For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.
Explanation:
Box 1: Yes
The MailItemsAccessed event is a mailbox auditing action and is triggered when mail data is accessed by mail protocols and mail clients.
Box 2: No
Basic Audit retains audit records for 90 days.
Advanced Audit retains all Exchange, SharePoint, and Azure Active Directory audit records for one year. This is accomplished by a default audit log retention policy that retains any audit record that contains the value of Exchange, SharePoint, or AzureActiveDirectory for the Workload property (which indicates the service in which the activity occurred) for one year.
Box 3: yes
Advanced Audit in Microsoft 365 provides high-bandwidth access to the Office 365 Management Activity API.
Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/advanced-audit?view=o365-worldwide
https://docs.microsoft.com/en-us/microsoft-365/compliance/auditing-solutions-overview?view=o365-worldwide#licensing-requirements
https://docs.microsoft.com/en-us/office365/servicedescriptions/microsoft-365-service-descriptions/microsoft-365-tenantlevel-services-licensing-guidance/microsoft-365-security-compliance-licensing-guidance#advanced- audit
HOTSPOT
For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.
Explanation:
Box 1: No
Box 2: Yes
Leaked Credentials indicates that the user’s valid credentials have been leaked.
Box 3: Yes
Multi-Factor Authentication can be required based on conditions, one of which is user risk.
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/identity-protection/overview-identity-protection
https://docs.microsoft.com/en-us/azure/active-directory/identity-protection/concept-identity-protection-risks
https://docs.microsoft.com/en-us/azure/active-directory/authentication/tutorial-risk-based-sspr-mfa
Which Microsoft 365 compliance center feature can you use to identify all the documents on a Microsoft SharePoint Online site that contain a specific key word?
- A . Audit
- B . Compliance Manager
- C . Content Search
- D . Alerts
C
Explanation:
The Content Search tool in the Security & Compliance Center can be used to quickly find email in Exchange mailboxes, documents in SharePoint sites and OneDrive locations, and instant messaging conversations in Skype for Business.
The first step is to starting using the Content Search tool to choose content locations to search and configure a keyword query to search for specific items.
Reference: https://docs.microsoft.com/en-us/microsoft-365/compliance/search-for-content?view=o365-worldwide
Which two tasks can you implement by using data loss prevention (DLP) policies in Microsoft 365? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.
- A . Display policy tips to users who are about to violate your organization’s policies.
- B . Enable disk encryption on endpoints.
- C . Protect documents in Microsoft OneDrive that contain sensitive information.
- D . Apply security baselines to devices.
AC
Explanation:
Reference: https://docs.microsoft.com/en-us/microsoft-365/compliance/dlp-learn-about-dlp?view=o365-
worldwide
HOTSPOT
Select the answer that correctly completes the sentence.
Explanation:
Reference: https://docs.microsoft.com/en-us/microsoft-365/compliance/compliance-score-calculation?view=o365- worldwide#how-compliance-manager-continuously-assesses-controls
HOTSPOT
For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.
Explanation:
Box 1: Yes
You can use sensitivity labels to provide protection settings that include encryption of emails and documents to prevent unauthorized people from accessing this data.
Box 2: Yes
You can use sensitivity labels to mark the content when you use Office apps, by adding watermarks, headers, or footers to documents that have the label applied.
Box 3: NO
https://docs.microsoft.com/en-us/information-protection/deploy-use/configure-policy-markings
Which Microsoft 365 compliance feature can you use to encrypt content automatically based on
specific conditions?
- A . Content Search
- B . sensitivity labels
- C . retention policies
- D . eDiscovery
B
Explanation:
Reference: https://docs.microsoft.com/en-us/microsoft-365/compliance/information-protection?view=o365-worldwide
HOTSPOT
For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.
Explanation:
Box 1: No
Compliance Manager tracks Microsoft managed controls, customer-managed controls, and shared
controls.
Box 2: Yes
Box 3: Yes
Reference: https://docs.microsoft.com/en-us/microsoft-365/compliance/compliance-manager?view=o365-worldwide
HOTSPOT
For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.
Explanation:
Reference: https://docs.microsoft.com/en-us/azure/governance/policy/overview
What is a use case for implementing information barrier policies in Microsoft 365?
- A . to restrict unauthenticated access to Microsoft 365
- B . to restrict Microsoft Teams chats between certain groups within an organization
- C . to restrict Microsoft Exchange Online email between certain groups within an organization
- D . to restrict data sharing to external email recipients
B
Explanation:
Information barriers are supported in Microsoft Teams, SharePoint Online, and OneDrive for Business. A compliance administrator or information barriers administrator can define policies to allow or prevent communications between groups of users in Microsoft Teams. Information barrier policies can be used for situations like these:
What can you use to provision Azure resources across multiple subscriptions in a consistent manner?
- A . Azure Defender
- B . Azure Blueprints
- C . Azure Sentinel
- D . Azure Policy
B
Explanation:
Reference: https://docs.microsoft.com/en-us/azure/governance/blueprints/overview
Which three authentication methods can be used by Azure Multi-Factor Authentication (MFA)? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.
- A . text message (SMS)
- B . Microsoft Authenticator app
- C . email verification
- D . phone call
- E . security question
ABD
Explanation:
Reference: https://docs.microsoft.com/en-us/azure/active-directory/authentication/concept-authentication-methods
HOTSPOT
For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.
Explanation:
You can use an Azure network security group to filter network traffic to and from Azure resources in an Azure virtual network. A network security group contains security rules that allow or deny inbound network traffic to, or outbound network traffic from, several types of Azure resources. For each rule, you can specify source and destination, port, and protocol.
Reference: https://docs.microsoft.com/en-us/azure/virtual-network/network-security-groups-overview
HOTSPOT
For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.
Explanation:
Reference:
https://docs.microsoft.com/en-us/mem/intune/fundamentals/what-is-intune
https://docs.microsoft.com/en-us/mem/intune/fundamentals/what-is-device-management
HOTSPOT
For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.
Explanation:
Reference:
https://docs.microsoft.com/en-us/azure/bastion/bastion-overview
https://docs.microsoft.com/en-us/azure/bastion/tutorial-create-host-portal
HOTSPOT
For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.
Explanation:
Box 1: Yes
A certificate is required that provides a private and a public key.
Box 2: Yes
The public key is used to validate the private key that is associated with a digital signature.
Box 3: Yes
Reference:
https://support.microsoft.com/en-us/office/obtain-a-digital-certificate-and-create-a-digital-signature-e3d9d813-3305-4164-a820-2e063d86e512
https://docs.microsoft.com/en-us/dynamics365/fin-ops-core/fin-ops/organization-administration/electronic-signature-overview
HOTSPOT
Select the answer that correctly completes the sentence.
Explanation:
Reference: https://docs.microsoft.com/en-us/azure/app-service/overview-authentication-authorization
HOTSPOT
Select the answer that correctly completes the sentence.
Explanation:
Reference: https://docs.microsoft.com/en-us/azure/active-directory/external-identities/what-is-b2b
In the Microsoft Cloud Adoption Framework for Azure, which two phases are addressed before the Ready phase? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.
- A . Plan
- B . Manage
- C . Adopt
- D . Govern
- E . Define Strategy
AE
Explanation:
Reference: https://docs.microsoft.com/en-us/azure/cloud-adoption-framework/overview
HOTSPOT
For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.
HOTSPOT
For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.
HOTSPOT
Select the answer that correctly completes the sentence.
Explanation:
Reference: https://docs.microsoft.com/en-us/security/benchmark/azure/baselines/cloud-services-security-baseline
What is an example of encryption at rest?
- A . encrypting communications by using a site-to-site VPN
- B . encrypting a virtual machine disk
- C . accessing a website by using an encrypted HTTPS connection
- D . sending an encrypted email
B
Explanation:
Reference: https://docs.microsoft.com/en-us/azure/security/fundamentals/encryption-atrest
Which Microsoft 365 feature can you use to restrict communication and the sharing of information between members of two departments at your organization?
- A . sensitivity label policies
- B . Customer Lockbox
- C . information Barriers
- D . Privileged Access Management (PAM)
C
Explanation:
Reference: https://docs.microsoft.com/en-us/microsoft-365/compliance/information-barriers
HOTSPOT
For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.
Explanation:
Reference: https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/overview
HOTSPOT
For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.
Explanation:
Box 1: Yes
Conditional access policies can be applied to all users
Box 2: No
Conditional access policies are applied after first-factor authentication is completed.
Box 3: Yes
Users with devices of specific platforms or marked with a specific state can be used when enforcing Conditional Access policies.
Reference: https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/overview
HOTSPOT
Select the answer that correctly completes the sentence.
Explanation:
When you register an application through the Azure portal, an application object and service principal are automatically created in your home directory or tenant.
Reference: https://docs.microsoft.com/en-us/azure/active-directory/develop/howto-create-service-principal-portal
Which three authentication methods does Windows Hello for Business support? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.
- A . fingerprint
- B . facial recognition
- C . PIN
- D . email verification
- E . security question
ABC
Explanation:
Reference: https://docs.microsoft.com/en-us/windows/security/identity-protection/hello-for-business/hello-how-it-works-authentication
HOTSPOT
Select the answer that correctly completes the sentence.
Explanation:
Reference: https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/concept-fundamentals-security-defaults
What feature in Microsoft Defender for Endpoint provides the first line of defense against cyberthreats by reducing the attack surface?
- A . automated remediation
- B . automated investigation
- C . advanced hunting
- D . network protection
D
Explanation:
Network protection helps protect devices from Internet-based events. Network protection is an attack surface reduction capability.
Reference: https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/network-protection?view=o365-worldwide
HOTSPOT
Select the answer that correctly completes the sentence.
Explanation:
Reference: https://docs.microsoft.com/en-us/azure/sentinel/overview
Which two types of resources can be protected by using Azure Firewall? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.
- A . Azure virtual machines
- B . Azure Active Directory (Azure AD) users
- C . Microsoft Exchange Online inboxes
- D . Azure virtual networks
- E . Microsoft SharePoint Online sites
D, E
Explanation:
Firewall is really not directly protecting the Virtual Networks though DDOS would have been ideal for VNETS
You plan to implement a security strategy and place multiple layers of defense throughout a network infrastructure.
Which security methodology does this represent?
- A . threat modeling
- B . identity as the security perimeter
- C . defense in depth
- D . the shared responsibility model
C
Explanation:
Reference: https://docs.microsoft.com/en-us/learn/modules/secure-network-connectivity-azure/2-what-is-defense-in-depth
HOTSPOT
For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.