Which two configurations should you include in the recommendation?

You are planning the security requirements for Azure Cosmos DB Core (SQL) API accounts. You need to recommend a solution to audit all users that access the data in the Azure Cosmos DB accounts. Which two configurations should you include in the recommendation? Each correct answer presents part of the...

September 28, 2023 No Comments READ MORE +

What should you include in the recommendation?

Your company has a Microsoft 365 E5 subscription. The company wants to identify and classify data in Microsoft Teams, SharePoint Online, and Exchange Online. You need to recommend a solution to identify documents that contain sensitive information. What should you include in the recommendation?A . data classification content explorerB ....

September 28, 2023 No Comments READ MORE +

Where should you integrate code scanning for each phase?

HOTSPOT Your company has an Azure App Service plan that is used to deploy containerized web apps. You are designing a secure DevOps strategy for deploying the web apps to the App Service plan. You need to recommend a strategy to integrate code scanning tools into a secure software development...

September 28, 2023 No Comments READ MORE +

What should you use?

You have an Azure subscription that has Microsoft Defender for Cloud enabled. You need to enforce ISO 2700V2013 standards for the subscription. The solution must ensure that noncompliant resources are remediated automatically What should you use?A . the regulatory compliance dashboard in Defender for CloudB . Azure PolicyC . Azure...

September 28, 2023 No Comments READ MORE +

After remediating the threat which policy definition should you assign to prevent the threat from reoccurring?

You receive a security alert in Microsoft Defender for Cloud as shown in the exhibit. (Click the Exhibit tab.) After remediating the threat which policy definition should you assign to prevent the threat from reoccurring?A . Storage account public access should be disallowedB . Azure Key Vault Managed HSM should...

September 27, 2023 No Comments READ MORE +

Which identity service should you include in the recommendation?

You have an on-premises network that has several legacy applications. The applications perform LDAP queries against an existing directory service. You are migrating the on-premises infrastructure to a cloud-only infrastructure. You need to recommend an identity solution for the infrastructure that supports the legacy applications. The solution must minimize the...

September 27, 2023 No Comments READ MORE +

What should you include in the recommendation?

You need to recommend a solution to scan the application code. The solution must meet the application development requirements. What should you include in the recommendation?A . Azure Key VaultB . GitHub Advanced SecurityC . Application Insights in Azure MonitorD . Azure DevTest LabsView AnswerAnswer: B Explanation: https://docs.microsoft.com/en-us/learn/modules/introduction-github-advanced-security/2-what-is-github-advanced-security

September 27, 2023 No Comments READ MORE +

Which two services should you leverage in the strategy?

You need to design a strategy for securing the SharePoint Online and Exchange Online data. The solution must meet the application security requirements. Which two services should you leverage in the strategy? Each correct answer presents part of the solution. NOTE; Each correct selection is worth one point.A . Azure...

September 26, 2023 No Comments READ MORE +

What should you include in the recommendation?

HOTSPOT You need to recommend a strategy for securing the litware.com forest. The solution must meet the identity requirements. What should you include in the recommendation? To answer, select the appropriate options in the answer area. NOTE; Each correct selection is worth one point. View AnswerAnswer: Explanation:

September 26, 2023 No Comments READ MORE +

What should you include in the recommendation for each activity?

DRAG DROP You have a Microsoft 365 subscription You need to recommend a security solution to monitor the following activities: • User accounts that were potentially compromised • Users performing bulk file downloads from Microsoft SharePoint Online What should you include in the recommendation for each activity? To answer, drag...

September 26, 2023 No Comments READ MORE +