Which two actions should you include in the solution?
You need to design a solution to provide administrators with secure remote access to the virtual machines. The solution must meet the following requirements: • Prevent the need to enable ports 3389 and 22 from the internet. • Only provide permission to connect the virtual machines when required. • Ensure...
What should you include in the recommendation?
HOTSPOT You need to recommend a strategy for securing the litware.com forest. The solution must meet the identity requirements. What should you include in the recommendation? To answer, select the appropriate options in the answer area. NOTE; Each correct selection is worth one point. View AnswerAnswer: Explanation:
What should you include in the recommendation?
HOTSPOT You need to recommend a strategy for securing the litware.com forest. The solution must meet the identity requirements. What should you include in the recommendation? To answer, select the appropriate options in the answer area. NOTE; Each correct selection is worth one point. View AnswerAnswer: Explanation:
What should you recommend?
HOTSPOT You need to recommend a multi-tenant and hybrid security solution that meets to the business requirements and the hybrid requirements. What should you recommend? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. View AnswerAnswer:
Does this meet the goal?
You have an Azure subscription that has Microsoft Defender for Cloud enabled. You are evaluating the Azure Security Benchmark V3 report. In the Secure management ports controls, you discover that you have 0 out of a potential 8 points. You need to recommend configurations to increase the score of the...
Which two configurations meet the compliance and privacy requirements?
You are designing security for an Azure landing zone. Your company identifies the following compliance and privacy requirements: • Encrypt cardholder data by using encryption keys managed by the company. • Encrypt insurance claim files by using encryption keys hosted on-premises. Which two configurations meet the compliance and privacy requirements?...
What should you include in the recommendation?
You need to recommend a solution to meet the security requirements for the virtual machines. What should you include in the recommendation?A . an Azure Bastion hostB . a network security group (NSG)C . just-in-time (JIT) VM accessD . Azure Virtual DesktopView AnswerAnswer: A Explanation: The security requirement this question...
Which two configurations should you recommend?
Your company is developing an invoicing application that will use Azure Active Directory (Azure AD) B2C. The application will be deployed as an App Service web app. You need to recommend a solution to the application development team to secure the application from identity related attacks. Which two configurations should...
What should you recommend?
Your company finalizes the adoption of Azure and is implementing Microsoft Defender for Cloud. You receive the following recommendations in Defender for Cloud • Access to storage accounts with firewall and virtual network configurations should be restricted, • Storage accounts should restrict network access using virtual network rules. • Storage...
What should you include in the recommendation?
Your company has a third-party security information and event management (SIEM) solution that uses Splunk and Microsoft Sentinel. You plan to integrate Microsoft Sentinel with Splunk. You need to recommend a solution to send security events from Microsoft Sentinel to Splunk. What should you include in the recommendation?A . Azure...