Which type of Microsoft Sentinel data connector should you use to meet the security requirements?
You are planning the deployment of Microsoft Sentinel. Which type of Microsoft Sentinel data connector should you use to meet the security requirements?A . Threat Intelligence - TAXII B. Azure Active Directory C. Microsoft Defender for Cloud D. Microsoft Defender for IdentityView AnswerAnswer: D Explanation: Reference: https://docs.microsoft.com/en-us/defender-for-identity/cas-isp-legacy-protocols
What should you do?
Topic 3, Misc. Questions You have three servers named Server1. Server1 and Server3 that run Windows Server and have the hyper V server rote installed. Server 1 hosts an Azure Migrate appliance named Migrate1. You plan to migrate virtual machines to Azure. You need to ensure that any new virtual...
How should you configure WebApp1?
HOTSPOT You are planning the www.fabrikam.com website migration to support the Azure migration plan. How should you configure WebApp1? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. View AnswerAnswer: Explanation: Box 1: Add a custom domain name To migrate www.fabrikam.com...
What should you use to onboard the servers to Microsoft Sentinel?
You have a Microsoft Sentinel deployment and 100 Azure Arc-enabled on-premises servers. All the Azure Arc enabled resources are in the same resource group. You need to onboard the servers to Microsoft Sentinel. The solution must minimize administrative effort. What should you use to onboard the servers to Microsoft Sentinel?A...
Which type of Microsoft Sentinel data connector should you use to meet the security requirements?
You are planning the deployment of Microsoft Sentinel. Which type of Microsoft Sentinel data connector should you use to meet the security requirements?A . Threat Intelligence - TAXIIB . Azure Active DirectoryC . Microsoft Defender for CloudD . Microsoft Defender for IdentityView AnswerAnswer: D Explanation: Reference: https://docs.microsoft.com/en-us/defender-for-identity/cas-isp-legacy-protocols Secure Windows Server...
Which authentication method should you configure in a connection security rule?
You have 10 servers that run Windows Server in a workgroup. You need to configure the servers to encrypt all the network traffic between the servers. The solution must be as secure as possible. Which authentication method should you configure in a connection security rule?A . NTLMv2B . pre-shared keyC...
Which service should you use to enforce the security policy, and what should you use to manage the policy settings?
HOTSPOT You need to implement a security policy solution to authorize the applications. The solution must meet the security requirements. Which service should you use to enforce the security policy, and what should you use to manage the policy settings? To answer, select the appropriate options in the answer area....
What should you do?
You have an on-premises Active Directory Domain Services (AD DS) domain that syncs with an Azure Active Directory (Azure AD) tenant by using password hash synchronization. You have a Microsoft 365 subscription. All devices are hybrid Azure AD-joined. Users report that they must enter their password manually when accessing Microsoft...
Does this meet the goal?
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...
What should you do?
DRAG DROP You have an on-premises Active Directory Domain Services (AD DS) domain that syncs with an Azure Active Directory (Azure AD) tenant. The AD DS domain contains a domain controller named DC1. DC1 does NOT have internet access. You need to configure password security for on-premises users. The solution...