What should you include in the recommendation?
Your company is developing a serverless application in Azure that will have the architecture shown in the following exhibit. You need to recommend a solution to isolate the compute components on an Azure virtual network. What should you include in the recommendation?A . Azure Active Directory (Azure AD) enterprise applications...
What should you include in the recommendation?
You need to recommend a solution to scan the application code. The solution must meet the application development requirements. What should you include in the recommendation?A . Azure Key Vault B. GitHub Advanced Security C. Application Insights in Azure Monitor D. Azure DevTest LabsView AnswerAnswer: B
What should you configure for each landing zone?
You need to recommend a solution for securing the landing zones. The solution must meet the landing zone requirements and the business requirements. What should you configure for each landing zone?A . Azure DDoS Protection Standard B. an Azure Private DNS zone C. Microsoft Defender for Cloud D. an ExpressRoute...
What should you include in the recommendation?
Your company has an on-premises network, an Azure subscription, and a Microsoft 365 E5 subscription. The company uses the following devices: • Computers that run either Windows 10 or Windows 11 • Tablets and phones that run either Android or iOS You need to recommend a solution to classify and...
What should you include in the recommendation?
Your company has on-premises Microsoft SQL Server databases. The company plans to move the databases to Azure. You need to recommend a secure architecture for the databases that will minimize operational requirements for patching and protect sensitive data by using dynamic data masking. The solution must minimize costs. What should...
What should you create in Azure AD to meet the Contoso developer requirements?
HOTSPOT What should you create in Azure AD to meet the Contoso developer requirements? View AnswerAnswer:
To meet the application security requirements, which two authentication methods must the applications support? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.
To meet the application security requirements, which two authentication methods must the applications support? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.A . Security Assertion Markup Language (SAML) B. NTLMv2 C. certificate-based authentication D. KerberosView AnswerAnswer: A,D
What should you use to delegate the access?
You need to recommend a solution to meet the security requirements for the InfraSec group. What should you use to delegate the access?A . a subscription B. a custom role-based access control (RBAC) role C. a resource group D. a management groupView AnswerAnswer: B
What should you include in the recommendation?
You have Windows 11 devices and Microsoft 365 E5 licenses. You need to recommend a solution to prevent users from accessing websites that contain adult content such as gambling sites. What should you include in the recommendation?A . Microsoft Endpoint Manager B. Compliance Manager C. Microsoft Defender for Cloud Apps...
What should you recommend?
HOTSPOT You need to recommend a SIEM and SOAR strategy that meets the hybrid requirements, the Microsoft Sentinel requirements, and the regulatory compliance requirements. What should you recommend? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. View AnswerAnswer: