To which type of resource can Azure Bastion provide secure access?
To which type of resource can Azure Bastion provide secure access?A . Azure Files B. Azure SQL Managed Instances C. Azure virtual machines D. Azure App ServiceView AnswerAnswer: C Explanation: Azure Bastion provides secure and seamless RDP/SSH connectivity to your virtual machines directly from the Azure portal over TLS. Reference:...
For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point
HOTSPOT For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point. View AnswerAnswer: Explanation: Graphical user interface, text, application, email Description automatically generated
What can you use to provision Azure resources across multiple subscriptions in a consistent manner?
What can you use to provision Azure resources across multiple subscriptions in a consistent manner?A . Azure Defender B. Azure Blueprints C. Azure Sentinel D. Azure PolicyView AnswerAnswer: B Explanation: Reference: https://docs.microsoft.com/en-us/azure/governance/blueprints/overview
Which Azure Active Directory (Azure AD) feature can you use to provide just-in-time (JIT) access to manage Azure resources?
Which Azure Active Directory (Azure AD) feature can you use to provide just-in-time (JIT) access to manage Azure resources?A . conditional access policies B. Azure AD Identity Protection C. Azure AD Privileged Identity Management (PIM) D. authentication method policiesView AnswerAnswer: C Explanation: Azure AD Privileged Identity Management (PIM) provides just-in-time...
Select the answer that correctly completes the sentence
HOTSPOT Select the answer that correctly completes the sentence. View AnswerAnswer: Explanation: playbooks https://docs.microsoft.com/en-us/azure/sentinel/tutorial-respond-threats-playbook
What are three uses of Microsoft Cloud App Security? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.
What are three uses of Microsoft Cloud App Security? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.A . to discover and control the use of shadow IT B. to provide secure connections to Azure virtual machines C. to protect sensitive information hosted anywhere...
For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point
HOTSPOT For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point. View AnswerAnswer: Explanation: Graphical user interface, text, application, email Description automatically generated Box 1: No Azure Active Directory (Azure AD) is a cloud-based user identity...
Which service should you use to view your Azure secure score?
HOTSPOT Which service should you use to view your Azure secure score? To answer, select the appropriate service in the answer area. View AnswerAnswer: Explanation: Security Center
In the shared responsibility model for an Azure deployment, what is Microsoft solely responsible for managing?
In the shared responsibility model for an Azure deployment, what is Microsoft solely responsible for managing?A . the management of mobile devices B. the permissions for the user data stored in Azure C. the creation and management of user accounts D. the management of the physical hardwareView AnswerAnswer: D
Which two types of resources can be protected by using Azure Firewall? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.
Which two types of resources can be protected by using Azure Firewall? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.A . Azure virtual machines B. Azure Active Directory (Azure AD) users C. Microsoft Exchange Online inboxes D. Azure virtual networks E. Microsoft SharePoint...