Which type of Microsoft Sentinel data connector should you use to meet the security requirements?
You are planning the deployment of Microsoft Sentinel. Which type of Microsoft Sentinel data connector should you use to meet the security requirements?A . Threat Intelligence - TAXIIB . Azure Active DirectoryC . Microsoft Defender for CloudD . Microsoft Defender for IdentityView AnswerAnswer: D Explanation: Reference: https://docs.microsoft.com/en-us/defender-for-identity/cas-isp-legacy-protocols
Does this meet the goal?
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...
Does this meet the goal?
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...
Which three actions should you perform in sequence?
DRAG DROP Your network contains an Active Directory Domain Services (AD DS) domain. You need to implement a solution that meets the following requirements: ✑ Ensures that the members of the Domain Admins group are allowed to sign in only to domain controllers ✑ Ensures that the lifetime of Kerberos...
Does this meet the goal?
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...
Which extension should you enable on the virtual machines?
You have an Azure subscription that has Microsoft Defender for Cloud enabled. You have 50 Azure virtual machines that run Windows Server. You need to ensure that any security exploits detected on the virtual machines are forwarded to Defender for Cloud. Which extension should you enable on the virtual machines?A...
Which GPOs should you apply to the Domain Controllers OU and the Domain Servers OU?
HOTSPOT Your network contains an Active Directory Domain Services (AD DS) domain named contoso.com. The domain contains the organizational units (OUs) shown in the following table. In the domain, you create the Group Policy Objects (GPOs) shown in the following table. You need to implement IPsec authentication to ensure that...
Which storage account type and authorization method should you configure?
HOTSPOT You have a failover cluster named FC1 that contains two nodes named Server1 and Server2. FC1 is configured to use a file share witness. You plan to configure FC1 to use a cloud witness. You need to configure Azure Storage accounts for the cloud witness. Which storage account type...
Does this meet the goal?
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...
What is the effective minimum password length for User1 and Admin1?
HOTSPOT What is the effective minimum password length for User1 and Admin1? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. View AnswerAnswer: Explanation: Box 1: 9 When multiple PSOs apply to a user, the PSO with the highest precedence (lowest...