Which type of Microsoft Sentinel data connector should you use to meet the security requirements?
You are planning the deployment of Microsoft Sentinel. Which type of Microsoft Sentinel data connector should you use to meet the security requirements?A . Threat Intelligence - TAXIIB . Azure Active DirectoryC . Microsoft Defender for CloudD . Microsoft Defender for IdentityView AnswerAnswer: D Explanation: Reference: https://docs.microsoft.com/en-us/defender-for-identity/cas-isp-legacy-protocols
What should you use to perform the migration?
You are planning the data share migration to support the on-premises migration plan. What should you use to perform the migration?A . Storage Migration ServiceB . Microsoft File Server Migration ToolkitC . File Server Resource Manager (FSRM)D . Windows Server Migration ToolsView AnswerAnswer: A Explanation: Reference: https://docs.microsoft.com/en-us/windows-server/storage/storage-migration-service/migrate-data
Does this meet the goal?
Topic 3, Misc. Questions Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a...
What is a prerequisite for implementing Azure Disk Encryption?
You have an Azure virtual machine named VM1 that runs Windows Server. You need to encrypt the contents of the disks on VM1 by using Azure Disk Encryption. What is a prerequisite for implementing Azure Disk Encryption?A . Customer Lockbox for Microsoft AzureB . an Azure key vaultC . a...
Which extension should you enable on the virtual machines?
You have an Azure subscription that has Microsoft Defender for Cloud enabled. You have 50 Azure virtual machines that run Windows Server. You need to ensure that any security exploits detected on the virtual machines are forwarded to Defender for Cloud. Which extension should you enable on the virtual machines?A...
To which group in contoso.com should you add User1?
You need to meet the technical requirements for User1. To which group in contoso.com should you add User1?A . Domain AdminsB . Account OperatorsC . Schema AdminsD . Backup OperatorsView AnswerAnswer: A
Which storage account type and authorization method should you configure?
HOTSPOT You have a failover cluster named FC1 that contains two nodes named Server1 and Server2. FC1 is configured to use a file share witness. You plan to configure FC1 to use a cloud witness. You need to configure Azure Storage accounts for the cloud witness. Which storage account type...
Which service should you use to enforce the security policy, and what should you use to manage the policy settings?
HOTSPOT You need to implement a security policy solution to authorize the applications. The solution must meet the security requirements. Which service should you use to enforce the security policy, and what should you use to manage the policy settings? To answer, select the appropriate options in the answer area....
What should you include in the solution?
You need to meet the technical requirements for Cluster3. What should you include in the solution?A . Enable integration services on all the virtual machines.B . Add a Windows Server server role.C . Configure a fault domain doe the cluster.D . Add a failover cluster role.View AnswerAnswer: D Explanation: The...
What should you do on Cluster1 and in Azure before you perform the migration?
HOTSPOT You are planning the migration of APP3 and APP4 to support the Azure migration plan. What should you do on Cluster1 and in Azure before you perform the migration? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. View AnswerAnswer:...